diff --git a/Makefile b/Makefile index 1d55dd69c..ec88c2e49 100644 --- a/Makefile +++ b/Makefile @@ -67,7 +67,7 @@ CFLAGS := -DVERSION=$(VERSION) \ -I src/include \ -mips2 -C_FILES := $(shell find src -name '*.c') +C_FILES := $(shell find src/boot src/lib src/game src/inflate src/gvars -name '*.c') O_FILES := $(patsubst %.c, %.o, $(C_FILES)) ASSET_AUDIO_FILES := Arecep01M Arecep02M Arecep03M Arecep04M Arecep05M Arecep06M Arlguard1M Arltech01M Arltech02M Arltech03M Arltech04M Arltech05M Arltech06M Ascie2aM Ascie2bM Ascie2cM Ascie2dM Ascie2eM Ascie2fM Ascie2gM Ascie3aM Ascie3bM Ascie3cM Ascie3dM Ascie3eM Ascie3gM Ascien10aM Ascien2_aM Ascien3_aM Ascien4_aM Ascien5_aM Ascien6_aM Ascien7_aM Ascien9_aM AvilgrimM Awepgd01M Awepgd02M Awepgd03M Awepsc01M Awepsc02M Awepsc03M Aa51elv01M Aa51elv02M Aa51elv03M Aa51grd01M Aa51grd02M Aa51grd03M Aa51grd04M Aa51grd05M Aa51grd06M Aa51grd07M Aa51grd08M Aa51grd09M Aa51grd10M Aa51jo1M Aa51jo2M Aa51jo3M Aa51jo4M Aa51jo5M Aa51jo6M Aa51jon01M Aa51jon02M Aa51jon03M Aa51jon04M Aa51jon05M Aa51jon06M Aa51jon07M Aa51jon08M Aa51jon09M Aa51jon10M Aa51jon11M Aa51jon12M Aa51jon14M Aa51jon15M Aa51sci1M Aaf1jo01M Aaf1jo02M Aaf1jo03M Aaf1pr01M Aaf1pr02M Aaf1pr03M Aaf1pr04M Aaf1pr05M Aaf1pr06M Aaf1pr07M Aaf1pr08M Aaf1pr09M Aaf1pr10M Aaf1tr01M Aaf1tr02M Aaf1tr03M Aairbgd01M Aairbgd02M Aairbgd03M Aairbgd04M Aairbgd05M Aairbgd06M Aairbgd07M Aairbgd08M Aairbgd09M Aairbgd10M Aairbgd11M Aairbgd12M Aairbgd13M Aairbgd14M Aairbgd15M Aairbgd16M Aairstw01M Aairstw02M Aairstw03M Aassael01M Aassael02M Aassael03M Aassael04M Aassael05M Aassael06M Absewrk01M Absewrk02M Absewrk03M Absewrk04M Absewrk05M Acetael01M Achdroid1M Achdroid2M Acsec01M Acsec02M Acsec03M Acstan1M Acstan2M Adevr01M Adevr02M Adevr03M Adevr04M Adevr05M Adevr06M Adevr07M Adevr08M Adevr09M Adevr10M Adevr11M Adevr12M Aexec01M Aexec02M Aexec04M Aexec05M Aexec06M Aexec07M Aexec08M Aexec09M Aexec10M Aexec11M Aexec12M Aexec13M Aexec14M Ahelic01M Ahelic02M Ahelic03M Ahologd01M AholohopkM Ainvcar01M Ainvcar02M Ainvcar03M Ainvcar04M Ainvcar05M Ainvcar06M Ainvcar07M Ainvcar08M Ainvcar09M Ainvcar10M Ainvcar11M Ainvcar12M AinvfarrM AinvfemaM AinvfostM AinvgrimM AinvhopkM AinvmaleM Ajoexec01M Ajoexec02M Ajosci01M Ajosci02M Ajosci03M Alabacc1M Alabacc2M Alabacc3M Alabacc4M Alabacc5M Alabacc6M Alabtech1M Alabtech2M Alabtech3M Alabtech5M Alabtech6M Alabtech7M Alabtech8M Alabtech9M Aoffwrk01M Aoffwrk02M Aoffwrk03M Aoffwrk04M Am1_l1_aM Am1_l1_bM Am1_l1_cM Am1_l1_dM Am1_l2_aM Am1_l2_bM Am1_l2_cM Am1_l2_dM Am1_l3_aM Am1_l3_bM Am1_l3_cM Am1_l3_dM Am2_l1_aM Am2_l1_bM Am2_l1_cM Am2_l1_dM Am3_l1_aM Am3_l1_bM Am3_l1_cM Am3_l1_dM Am3_l2_aM Am3_l2_bM Am3_l2_cM Am3_l2_dM Am4_l1_aM Am4_l1_bM Am4_l1_cM Am4_l1_dM Am4_l2_aM Am4_l2_bM Am4_l2_cM Am4_l2_dM Am4_l3_aM Am4_l3_bM Am4_l3_cM Am4_l3_dM Am5_l1_aM Am5_l1_bM Am5_l1_cM Am5_l1_dM Am5_l2_aM Am5_l2_bM Am5_l2_cM Am5_l2_dM Am5_l3_aM Am5_l3_bM Am5_l3_cM Am5_l3_dM Am6_l1_aM Am6_l1_bM Am6_l1_cM Am6_l1_dM Am6_l2_aM Am6_l2_bM Am6_l2_cM Am6_l2_dM Am7_l1_aM Am7_l1_bM Am7_l1_cM Am7_l1_dM Am8_l1_aM Am8_l1_bM Am8_l1_cM Am8_l1_dM Am9_l1_aM Am9_l1_bM Am9_l1_cM Am9_l1_dM Ap1_01_joM Ap1_02_caM Ap1_03_joM Ap1_04_caM Ap1_05_joM Ap1_06_caM Ap1_07_joM Ap1_08_caM Ap2_01_joM Ap2_02_joM Ap2_03_drM Ap2_04_joM Ap2_05_joM Ap2_06_drM Ap2_07_drM Ap3_01_gdM Ap3_02_joM Ap3_03_joM Ap4_01_dvM Ap4_02_joM Ap4_03_dvM Ap4_04_joM Ap4_05_dvM Ap4_06_joM Ap4_07_blM Ap4_08_dvM Ap4_09_dvM Ap5_01_joM Ap5_02_joM Ap5_03_joM Ap6_01_joM Ap6_02_caM Ap6_03_joM Ap6_04_caM Ap6_05_joM Ap6_06_caM Ap7_01_caM Ap7_02_joM Ap7_03_caM Ap7_04_joM Ap8_01_dvM Ap8_02_blM Ap8_03_dvM Ap8_04_blM Ap8_06_blM Ap8_07_trM Ap8_08_dvM Ap8_09_trM Ap8_10_blM Ap9_01_joM Ap9_02_caM Ap9_03_joM Ap10_01_caM Ap10_02_caM Ap10_03_caM Ap10_04_caM Ap10_05_joM Ap10_06_caM Ap10_07_joM Ap10_08_caM Ap10_09_joM Ap11_01_jnM Ap11_02_joM Ap11_03_jnM Ap11_04_joM Ap11_05_jnM Ap11_06_joM Ap11_07_jnM Ap11_08_joM Ap12_01_jnM Ap12_02_joM Ap12_03_jnM Ap12_04_joM Ap12_05_jnM Ap12_06_joM Ap12_07_jnM Ap12_08_joM Ap12_09_jnM Ap12_10_joM Ap13_01_joM Ap13_02_suM Ap13_03_joM Ap13_04_suM Ap13_06_suM Ap14_03_suM Ap14_04_joM Ap14_05_suM Ap14_07_joM Ap15_01_elM Ap15_02_elM Ap15_03_joM Ap15_04_jnM Ap15_05_elM Ap15_06_joM Ap15_07_elM Ap15_08_joM Ap15_09_elM Ap15_10_joM Ap15_11_elM Ap16_01_joM Ap16_02_caM Ap16_04_caM Ap16_05_joM Ap16_06_caM Ap17_01_trM Ap17_02_prM Ap17_03_trM Ap17_04_prM Ap17_05_trM Ap17_06_trM Ap18_01_joM Ap18_02_elM Ap18_03_elM Ap18_04_joM Ap18_05_elM Ap19_01_caM Ap19_02_caM Ap19_03_joM Ap19_04_caM Ap19_05_joM Ap19_06_joM Ap20_01_joM Ap20_02_prM Ap20_03_joM Ap20_04_prM Ap20_05_joM Ap20_06_blM Ap20_07_trM Ap20_08_trM Ap21_01_elM Ap21_02_joM Ap21_03_elM Ap21_04_joM Ap22_01_elM Ap22_02_joM Ap22_03_elM Ap22_04_joM Ap23_01_joM Ap23_02_drM Ap23_03_joM Ap23_04_drM Ap23_05_joM Ap23_06_drM Ap23_07_joM Ap23_08_drM Ap24_01_caM Ap24_02_joM Ap24_03_caM Ap24_04_joM Ap24_05_caM Ap24_06_caM Ap24_07_joM Ap24_08_joM Ap25_01_joM Ap25_02_joM Ap26_01_joM Ap26_02_dvM Ap26_03_joM Ap26_04_dvM Ap26_05_dvM Ap26_06_joM Ap26_07_dvM Ap26_08_dvM Ap27_01_joM Ap27_02_elM Ap27_03_elM Ap27_04_joM Ap27_05_joM Ap27_06_elM Ap28_01_elM Ap28_02_joM Ap28_03_elM Ap28_04_joM Ap28_05_elM Ap28_06_joM Ap29_01_elM Ap29_02_joM Ap29_03_elM Ap29_04_joM Ap29_05_joM Ap29_06_elM Ap29_07_joM Ap29_08_elM Ap29_09_joM Ap29_10_elM Apelelv01M Apelgrd01M Ap29_11_joM Am3l2carrM Aelvcet01M Aelvcet02M Ajorep01M Ajorep02M Ajorep03M Ajorep04M Ajorpld01M Ajorpld02M Ajorpld03M Ajorpld04M Atrjo01M Atrgrim01M Atrgrim02M Atrcarr06M Atrcarr07M Atrcarr08M Atrcarr01M Atrcarr02M Atrcarr03M Atrcarr04M Atrcarr05M Atrcarr12M Abnblde01M Abncass01M Apelelv02M Avault2M Ap29_12_elM Ap14_09_joM Ap19_07_joM Ap19_08_joM Acicarr06M Acicarr11M Acifarr08M Acifarr12M Acifema01M Acifema04M Acifema07M Acifema08M Acifema09M Acifema14M Acifost08M Acifost12M Acigrim05M Acigrim06M Acigrim07M Acigrim08M Acigrim09M Acigrim10M Acihopk09M Acihopk11M Acimale02M Acimale03M Acimale07M Acimale09M Acimale11M Acimale13M Aciroge08M Aciroge12M Atrfost01M Atrfost02M Atrfost03M Atrcarr09M Atrcarr10M Atrcarr11M Acifarr01M Acifarr02M Acifarr03M Acigrim01M Acigrim03M Acigrim04M Acihopk01M Acihopk04M Acihopk06M Aciroge01M Aciroge02M Atrroge01M Acicarr07M Acicarr08M Ajoinst01M Ajoinst02M Ajoinst03M Ajoinst04M Ap25_03_joM Ap29_13_joM Ap29_14_joM Acicarr09M Acicarr10M Ap29_15_joM Ap16_03_joM Acarrbye02M Asaucerexp1M @@ -186,7 +186,7 @@ guns: $(ASSET_GUN_FILES) ################################################################################ # Lang files -$(B_DIR)/files/L%.elf: src/files/lang/%.o +$(B_DIR)/files/L%.elf: src/files/lang/$(ROMID)/%.o @mkdir -p $(B_DIR)/files/lang cp $< build/zero.tmp.o $(TOOLCHAIN)-ld -T ld/zero.ld -o $@ @@ -303,6 +303,9 @@ $(B_DIR)/files/%.o: $(B_DIR)/files/% $(TOOLCHAIN)-as -mabi=32 -mips2 -I src/include -EB -o $@ $(B_DIR)/file.s rm -f file.s +src/files/lang/%.o: src/files/lang/%.c + $(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) $< -o $@ -O2 + %.o: %.c /usr/bin/env python3 tools/asmpreproc/asm-processor.py -O2 $< | $(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) tools/asmpreproc/include-stdin.c -o $@ -O2 /usr/bin/env python3 tools/asmpreproc/asm-processor.py -O2 $< --post-process $@ --assembler "$(TOOLCHAIN)-as -march=vr4300 -mabi=32" --asm-prelude tools/asmpreproc/prelude.s diff --git a/src/files/lang/ameE.c b/src/files/lang/jap-final/ameE.c similarity index 100% rename from src/files/lang/ameE.c rename to src/files/lang/jap-final/ameE.c diff --git a/src/files/lang/jap-final/ameJ.c b/src/files/lang/jap-final/ameJ.c new file mode 100644 index 000000000..4cc1f99ae --- /dev/null +++ b/src/files/lang/jap-final/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\n♂d゚≧ムマ凍ヅataDyneпメ♀ラ゚dヨヒ∀シぢ≫∩≒≠艪ヨヒマ縲マぅうマ繞怐諱コ≪÷ヵス♂d゚≧ムマ┨刀ソ≒おぁナ⇔セナ⊇∀メャソ∵⊆エ∨ツくぞぽモ謔モ£≠ネラ縺メマタ└∈チ≠、刀マツテナ∨∧⊂Åツニ≫∀刀モぽ∈トΡナ=テメ£≠ネラ縺ク翌ネτマゐツ√≒√≫≡⊂マ≠ロ∈ムマ♀ルマ縲dナ≡⊂∀ナ⇔⊇≫≒ナ⊇メÅツ\n\n|ヨヒマ縲マセ\n\nテ√モぉメ喝ヤпÅ∵≠艪ュkマ∀エ⇔クケマχャ∃ハロヘマÅ=ヘミマ艢ツ♀ラ゚dヨヒメきマが∩∵づテ≫掾マ≠ェ∀ナ⇔⌒お⊇ぁト∃チ⇔モ∃≒∃⊇ツリ∨=奄о゚≧ムマ刀メ£≠ネラ縺謔モ汲ェ∃メ∩=セト⊃⇔∪チョャ⌒⊆≫ツハロヘマンメτ∃┛Χモ÷クのはメメ┳マご∈煤スミテ∀Åツルd♀ヨdモ辜痺∵Κタ⇔⊇≫メル痺ワ♭⊆≫テ∀∈り√∃⊇≡⊂マツ\n\n|しじ操セ梟朽ユるれはu∈あいマ\n\n′nメ梟朽ユメモ高驍黷ヘu∵′ヒぶメたマuト√⇔⊇≫ツ梳怙ヲムマ∈エ⇔はu∈あいマナ>梟朽ユマが⌒Γ≒∃⊇≡⊂マニ≫メÅツ梳怙ヲムマメワン∈な戟ニ≫∨⊥マモ≠ヘuマ蜈ムンハ縺ナ∃チ⇔モ∃≒∃⊇ツワンモ巣ΝΞ∃メ♭<香閨メÅツ\n\n|しじ逐セ轢ハラワヨd∈みヌ≡\n\n♂d゚≧ムマ刀メぐし♭⊆≫ユレマ♀♂″d<モ=劇メlモミマぁ≪ニ≫∨⊥メルd♀ヨd∈÷轢ハラワマ⇒ツ⇔ぷ¬氏サ⇔⊇≫ツテ√モ÷ム蛟゚dはuママラナ⇔∪≪≠ロまメムΖレ∵ヱ⊃≫∀÷ヨd∵シワマ∃≫ツ∃メ♭ぽま∩≒轢ハラワヨd∈゚⊂ンモも♭べ∨マ<オトヌ∃チ⇔モ∃≒∃⊇ツ\n\n|しじ凍セχメナム∈λえヌ≡\n\n♀ラ゚dヨヒメざ驕モ<ヘリ♂d゚≧ムマnメλΑうテ♭ス⊥≒⇔⊇≫ツぽメ£≠ネラ縺ク謔モナ⇔⊇≫χ∵=ネメd窶ニママぁ盾香ツχ∈ヤニワリ♭繧レナ=逐≠ネラ縲ナムマミランワトヌ∽ツミランワナ∨≒ニ∬マ♂d゚マユ∈エ⇔÷ナム∈ぅうマλえニ≫メÅツ\n\n|しじ楳セ帥鴻マロワ窶∈あいマ\n\n怩捩ミdメンヨフ窶ニdマ帥鴻マロワ窶メモ高驍黷ヘu∵⊆≫ツテ√マ梳怙ヲムマ∈揩メ煤マンハ縺ナ⇔=奄о゚≧ムマメ帥鴻マΖ轢ハ縺クシbヲトヌ≫メÅツテ√♭=劇vヨメ帥鴻マロワ窶∵<⇔あい∀∃≫Å∽⊂ツ\n\n|しじ斧セxフヨメモ℃d゚dマぢ√\n\nxフマトΡト√⇔⊇≫♀ラ゚dヨヒメ∀テ∽ヨ∀ρ≫≦オカメモ℃d゚d∈оナぁニメÅツせ∃リ轣モゎ≒∩マト√⇔⊇∃⊇∵≠怩捩ミdメ♪テ∩♭に⇒∩≫モÅツ\n\nEND\n", + /* 1*/ "レdマ゚d\n", + /* 2*/ "|ワ竄пbhセ\n\n♂d゚≧ムマ凍ヅataDyneпメ♀ラ゚dヨヒ∀シぢ≫∩≒≠艪ヨヒマ縲マぅうマ繞怐諱コ≪÷ヵス♂d゚≧ムマ┨刀ソ≒おぁナ⇔セナ⊇∀メャソ∵⊆エ∨ツくぞぽモ謔モ£≠ネラ縺メマタ└∈チ≠、刀マツテナ∨∧⊂Åツニ≫∀刀モぽ∈トΡナ=テメ£≠ネラ縺ク翌ネτマゐツ√≒√≫≡⊂マ≠ロ∈ムマ♀ルマ縲dナ≡⊂∀ナ⇔⊇≫≒ナ⊇メÅツ\n\n|ヨヒマ縲マセ\n\nテ√モぉメ喝ヤпÅ∵≠艪ュkマ∀エ⇔クケマχャ∃ハロヘマÅ=ヘミマ艢ツ♀ラ゚dヨヒメきマが∩∵づテ≫掾マ≠ェ∀ナ⇔⌒お⊇ぁト∃チ⇔モ∃≒∃⊇ツリ∨=奄о゚≧ムマ刀メ£≠ネラ縺謔モ汲ェ∃メ∩=セト⊃⇔∪チョャ⌒⊆≫ツハロヘマンメτ∃┛Χモ÷クのはメメ┳マご∈煤スミテ∀Åツルd♀ヨdモ辜痺∵Κタ⇔⊇≫メル痺ワ♭⊆≫テ∀∈り√∃⊇≡⊂マツ\n\n|しじ操セ梟朽ユるれはu∈あいマ\n\n′nメ梟朽ユメモ高驍黷ヘu∵′ヒぶメたマuト√⇔⊇≫ツ梳怙ヲムマ∈エ⇔はu∈あいマナ>梟朽ユマが⌒Γ≒∃⊇≡⊂マニ≫メÅツ梳怙ヲムマメワン∈な戟ニ≫∨⊥マモ≠ヘuマ蜈ムンハ縺ナ∃チ⇔モ∃≒∃⊇ツワンモ巣ΝΞ∃メ♭<香閨メÅツ\n\n|しじ逐セ轢ハラワヨd∈みヌ≡\n\n♂d゚≧ムマ刀メぐし♭⊆≫ユレマ♀♂″d<モ=劇メlモミマぁ≪ニ≫∨⊥メルd♀ヨd∈÷轢ハラワマ⇒ツ⇔ぷ¬氏サ⇔⊇≫ツテ√モ÷ム蛟゚dはuママラナ⇔∪≪≠ロまメムΖレ∵ヱ⊃≫∀÷ヨd∵シワマ∃≫ツ∃メ♭ぽま∩≒轢ハラワヨd∈゚⊂ンモも♭べ∨マ<オトヌ∃チ⇔モ∃≒∃⊇ツ\n\n|しじ凍セ帥鴻マロワ窶∈あいマ\n\n怩捩ミdメンヨフ窶ニdマ帥鴻マロワ窶メモ高驍黷ヘu∵⊆≫ツテ√マ梳怙ヲムマ∈揩メ煤マンハ縺ナ⇔=奄о゚≧ムマメ帥鴻マΖ轢ハ縺クシbヲトヌ≫メÅツテ√♭=劇vヨメ帥鴻マロワ窶∵<⇔あい∀∃≫Å∽⊂ツ\n\n|しじ楳セxフヨメモ℃d゚dマぢ√\n\nxフマトΡト√⇔⊇≫♀ラ゚dヨヒメ∀テ∽ヨ∀ρ≫≦オカメモ℃d゚d∈оナぁニメÅツせ∃リ轣モゎ≒∩マト√⇔⊇∃⊇∵≠怩捩ミdメ♪テ∩♭に⇒∩≫モÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\n♂d゚≧ムマ凍ヅataDyneпメ♀ラ゚dヨヒ∀シぢ≫∩≒≠艪ヨヒマ縲マぅうマ繞怐諱コ≪÷ヵス♂d゚≧ムマ┨刀ソ≒おぁナ⇔セナ⊇∀メャソ∵⊆エ∨ツくぞぽモ謔モ£≠ネラ縺メマタ└∈チ≠、刀マツテナ∨∧⊂Åツニ≫∀刀モぽ∈トΡナ=テメ£≠ネラ縺ク翌ネτマゐツ√≒√≫≡⊂マ≠ロ∈ムマ♀ルマ縲dナ≡⊂∀ナ⇔⊇≫≒ナ⊇メÅツ\n\n|ヨヒマ縲マセ\n\nテ√モぉメ喝ヤпÅ∵≠艪ュkマ∀エ⇔クケマχャ∃ハロヘマÅ=ヘミマ艢ツ♀ラ゚dヨヒメきマが∩∵づテ≫掾マ≠ェ∀ナ⇔⌒お⊇ぁト∃チ⇔モ∃≒∃⊇ツリ∨=奄о゚≧ムマ刀メ£≠ネラ縺謔モ汲ェ∃メ∩=セト⊃⇔∪チョャ⌒⊆≫ツハロヘマンメτ∃┛Χモ÷クのはメメ┳マご∈煤スミテ∀Åツチ√∬√⌒ぽ≒マナも∈べエ∨≪ナ∃⊇≡⊂マツ\n\n|しじ操セxフヨメモ℃d゚dマぢ√\n\nxフマトΡト√⇔⊇≫♀ラ゚dヨヒメ∀テ∽ヨ∀ρ≫≦オカメモ℃d゚d∈оナぁニメÅツせ∃リ轣モゎ≒∩マト√⇔⊇∃⊇∵≠怩捩ミdメ♪テ∩♭に⇒∩≫モÅツ\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "♂d゚≧ムマ\n┨唐劫塘キo準ロユ÷÷ョャ", + /* 10*/ "逐逗逐宕操逐操符ク純ヲェン逗逐セ凍申n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "轢ハラワ\n", + /* 14*/ "轢ハラワ\n", + /* 15*/ "ユレマ♀メ轢ハラワ∈みマ√∨\n", + /* 16*/ "梟朽ユるれはu∈あいマ\n", + /* 17*/ "轢ハラワヨd∈みヌ≡\n", + /* 18*/ "χメナム∈λえヌ≡\n", + /* 19*/ "帥鴻マロワ窶∈あいマ\n", + /* 20*/ "xフヨメモ℃d゚dマぢ√\n", + /* 21*/ "⊆∃∨モ梳タ盾モ求テテ♭が∈ナ⇔⊇≫メタ\n", + /* 22*/ "ヨヒdエ潤テメ凍≠焉クぷエ⇔≫∝エ\n", + /* 23*/ "テ∋∃煕刀諤<煤クべ⇔≫∝ツ∵∃⊇∝ツ\n", + /* 24*/ "ヴ∈ck栫∀━エ⇔⊇≫メタ\n", + /* 25*/ "マ=テメ′メiヮ∈艢≫∋オ∃⊇∝≡ツ\n", + /* 26*/ "∪ム∵⊇<ヒツ⇔エエ\n", + /* 27*/ "ヴ∵⊆∃∨メリ∃≒=ニ∬テテ∈≫∝ムエ\n", + /* 28*/ "梳怙ヲムマ∵ナチンハ縺ト√⇔⊇リヌ∋\n", + /* 29*/ "梳怙ヲムマ∵ナチンハ縺ト√∨\n", + /* 30*/ "しじん\n", + /* 31*/ "準準盾オじ準準十n", + /* 32*/ "ュ⇔メしじ∈ニ≫テ∀∵♭タリヌ∋\n", + /* 33*/ "テメナム∈ヱナ≫∀タ∵タ∨∃\n", + /* 34*/ "χ∵ほト√∨\n", + /* 35*/ "か∝√∨ρ≪≠ェ♭⌒ニ≫≡エ\n", + /* 36*/ "νツ⇔チ√>ムÅエ\n", + /* 37*/ "ナオ≪ニ∫Åツ\n", + /* 38*/ "νツ⇔<ヒツ⇔エ\n", + /* 39*/ "か∝√∨ρ≪≠ェ♭⌒ニ≫≡エ\n", + /* 40*/ "トッ÷ムマナ⇔蚕n", + /* 41*/ "ィ、=逗ワd♀∈bナ∨蚕n", + /* 42*/ "ハ°ム=橿ラ゚dヨヒエ\n", + /* 43*/ "テ√∵くΒメ°Å∃>辟磨痺⊥エ\n", + /* 44*/ "ナムヨメミランワΤ┯スλえラリ\n", + /* 45*/ "ナムメλえ\n", + /* 46*/ "ミランワレロ潤逗ワd♀∵ョャ\n", + /* 47*/ "♀ミハラf\n", + /* 48*/ "捩ィ。エ\n", + /* 49*/ "♂d゚マユ∵ョャ♭ニ\n", + /* 50*/ "ろゎィァ\n", + /* 51*/ "ろゎィ麾歃n", + /* 52*/ "♀ラ゚dヨヒメうΑ∈ヱニ≫∋Å蚕n", + /* 53*/ "べ∨∃⊇♭≠ラ∨∃⊇♭エ\n", + /* 54*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 55*/ "メ┳∵ほト√∨\n", + /* 56*/ "しじん\n盾オじ∈♭タリヌ∋\n", + /* 57*/ "しじメぼマあぃモ∃┳Σ∵ほト√∨\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "梳怙ヲムマ\n", + /* 61*/ "梳怙ヲムマ\n", + /* 62*/ "梳怙ヲムマ∈みマ√∨\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "♂d゚マユ\n", + /* 66*/ "♂d゚マユ\n", + /* 67*/ "♂d゚マユ∈みマ√∨\n", + /* 68*/ "⊆ッ=ネ⊂Åツ┳死モテメ\nンムマナ⇔⌒∩リ∝∋ツ\n", + /* 69*/ "⊇∂<煤メヤニワメミβ∩≒\n└メナム∈ヱナ∽⊂ツ\n", + /* 70*/ "ヵニ∬リ⊥≫≡÷ハ♀°ムツ\n", + /* 71*/ "トエト∀て⊇⇔エ\n", + /* 72*/ "⊆∃∨メ$ワd♀∵ョャ∃メツ\nぅbナ⇔チ√≫∝≡ムエ\n", + /* 73*/ "べ∨∃⊇♭≠ラ∨∃⊇♭エ\n", + /* 74*/ "ル轢ラロヘマモdセムだ∵で磨縺リナ∨\n", + /* 75*/ "ル轢ラロヘマモdセくΒリ♭λえ♭タリヌ∋♭ナ∨\n", + /* 76*/ "′nメ梟朽ユ∵cンτマあい∀∃エ∨\n", + /* 77*/ "′vヨメ帥鴻マロワ窶∵あいマ∃エ∨\n", + /* 78*/ "モミヨメモ℃d゚d∈なに\n", + /* 79*/ "d♀マエ純ヒツ⇔チ√エ\n", + /* 80*/ "梟朽ユるれはu∈あいマニ≫マモ\n梳怙ヲムマ∵ョャ\n", + /* 81*/ "帥鴻マロワ窶∈あいマニ≫マモ\n梳怙ヲムマ∵ョャ♭ニ\n", + /* 82*/ "≧dタ\n", + /* 83*/ "ヴマユ∩エ⇔が∀⊇⊂ルΞ∃メエ\n", + /* 84*/ "ヵマΒ普ニ≫≡蚕n", + /* 85*/ "ヴ∵⊆∃∨メリ∃≒=ニ∬テテ∈≫∝ムエ\n", + /* 86*/ "♪⊂∩<ヒツ⇔エ\n", + /* 87*/ "べ∨∃⊇♭エ\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "ユワ$ム\n", + /* 91*/ "ユワ$ム\n", + /* 92*/ "ユワ$ム∈みマ√∨\n", + /* 93*/ "ワヨヒ艪пマ黹⊆≪\n梟朽ユメモ高驍黷ヘuモぞ⊇\n", + /* 94*/ "ユレマ♀メヤニワモテメミdÅツ\n", + /* 95*/ "ンヨフ窶ニdモテメぞチムツ\n", + /* 96*/ "xフヨメモ℃d゚dモテメぞチメモÅ\n", + /* 97*/ "梟朽ユるれはu∵ぴтナ∨\n", + /* 98*/ "ルム痼=エぱナ∂∵エ⇔エ\n", + /* 99*/ "噫捩逐逗逐宕操純ヲェン逐逐操楳=奄о゚≧ムマ┨凍÷レdマ゚d\n", + /*100*/ "♭=⊂ナ⇔テ∋∃マロ∫∃メタ\n", + /*101*/ "ヵス♀ラ゚dヨヒモ\nムマ♀ルマ縲dマ∩ツ≒√⇔ナリ⊂ツ\npレチνツ∃⊇∀=奄о゚≧ムマ刀メ\nを怐クナ≫烙ヒマワ∈ん⊂ツ\n", + /*102*/ "ユd∋ツ♭<sべ¬ほナ⇔⌒⊇⊇メタ\n", + /*103*/ "クのはメ┳∈べエ⇔モ∃≒∃⊇∀⊇⊂\nゆeメd∈り√∨メ∩タ\np氏ワ¬∽∋のはワマみ蜀磨モ⊇≒∋ツ\n", + /*104*/ "゚dハ縺モ♪テマ⊇≫メタ\n", + /*105*/ "リモ′メ曹スリ♭フ≪≫メÅツ\np♀ラ゚dヨヒモ′メxフメ\n=マ⊇≫∀メテ∀Å∩≒ツ\n", + /*106*/ "♪⊂∂エ⇔ぽ∈にツ√†⊇⊇メ∩ナ≒タ\n", + /*107*/ "唐凍ワ縺マモにふ∨≒∃⊇ナ蚕nシ揀汲磨モが⌒∝∩≒∋∵=゚∽ナチサ∠ツ\n", + /*108*/ "ィ、÷モマ゚dナ∨蚕n", + /*109*/ "⊇=サリムマニ≫≡蚕n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ameP.c b/src/files/lang/jap-final/ameP.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/jap-final/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_f.c b/src/files/lang/jap-final/ame_str_f.c new file mode 100644 index 000000000..adefe2c1c --- /dev/null +++ b/src/files/lang/jap-final/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situ sur l'un des toits de l'immeuble, loin des interf駻ences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les cam駻as de surveillance. La mine doit 黎re fix sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-cl de De Vries\n\nCassandra De Vries porte la cl d'acc鑚 aux zones interdites de l'immeuble sur son collier. Il est connect ses pulsations et cessera de fonctionner si elle vient mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Acc馘er aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est l'ordre du jour d'une r騏nion, dans l'un des bureaux. Le dirigeant charg du projet du Dr. Caroll sera pr駸ent. Suivez-le jusqu' son bureau et acc馘ez ses fichiers, puis t駘馗hargez-les gr稍e votre r馗epteur.\n\n|Objectif 4: - Brouiller les communications ext駻ieures\n\nAchevez le brouillage des communications en pla軋nt une autre mine CME sur le mat駻iel de la salle de surveillance la base de l'immeuble. Ils ne pourront ainsi appeler des renforts ext駻ieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, et elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situ sur l'un des toits de l'immeuble, loin des interf駻ences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les cam駻as de surveillance. La mine doit 黎re appliqu馥 sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-cl de De Vries\n\nCassandra De Vries porte sa cl d'acc鑚 aux zones interdites de l'immeuble sur son collier. Il est connect ses pulsations et cessera de fonctionner si elle vient mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications ext駻ieures\n\nAchevez le brouillage des communications en pla軋nt une autre mine CME sur le mat駻iel de la salle de surveillance la base de l'immeuble. Ils ne pourront ainsi appeler des renforts ext駻ieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne:\nQG central Chicago IL USA.", + /* 10*/ "Heure: 02:30 15 AOUT 2023\n", + /* 11*/ "Obtenir collier de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collier\n", + /* 14*/ "Collier de De Vries\n", + /* 15*/ "Collier de De Vries obtenu.\n", + /* 16*/ "Neutraliser relais int駻ieur\n", + /* 17*/ "Obtenir collier-cl饅n", + /* 18*/ "T駘馗harger fichiers\n", + /* 19*/ "Neutraliser relais ext駻ieur\n", + /* 20*/ "Acc馘er au laboratoire\n", + /* 21*/ "Qui 黎es-vous? Que faites-vous l?\n", + /* 22*/ "Attention! Elle est arm馥!\n", + /* 23*/ "Vous n'oserez pas... Jeune sotte!\n", + /* 24*/ "Savez-vous qui je suis?\n", + /* 25*/ "J'appelle la s馗urit.\n", + /* 26*/ "PITIE!!!! Ne me tuez pas!\n", + /* 27*/ "Un conseil: partez, MAINTENANT!\n", + /* 28*/ "Mine CME mal plac馥.\n", + /* 29*/ "Mine CME plac馥 correctement.\n", + /* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n", + /* 31*/ " MISSION ACCOMPLIE \n", + /* 32*/ "Objectifs inatteignables.\n", + /* 33*/ "Il est temps d'effacer les fichiers.\n", + /* 34*/ "Ordinateur dirigeant effac.\n", + /* 35*/ "Je ferai ce que vous voulez!\n", + /* 36*/ "A L'AIDE - Intrus!\n", + /* 37*/ "Vous parlez trop.\n", + /* 38*/ "AU SECOURS! A MOI!\n", + /* 39*/ "Je ferai ce que vous voulez...\n", + /* 40*/ "Je me connecte...\n", + /* 41*/ "OK. Connexion termin馥...\n", + /* 42*/ "Adieu, Dr. Caroll.\n", + /* 43*/ "La fin est proche, sale tratre!\n", + /* 44*/ "T駘馗hargement en cours.\n", + /* 45*/ "T駘馗hargement complet.\n", + /* 46*/ "ACCES REFUSE - mot de passe requis.\n", + /* 47*/ "Porte d騅errouill馥.\n", + /* 48*/ "HEIN?!\n", + /* 49*/ "Erreur t駘馗harg. - R馗epteur absent.\n", + /* 50*/ "LUMIERES ON\n", + /* 51*/ "LUMIERES OFF\n", + /* 52*/ "Effacez la conversation du Dr. Caroll.\n", + /* 53*/ "Ne...ne tirez pas!\n", + /* 54*/ "Objet crucial d騁ruit.\n", + /* 55*/ "Pertes civiles inacceptables.\n", + /* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 57*/ "Personnel crucial tu.\n", + /* 58*/ "Obtenir mines CME.\n", + /* 59*/ "Dr. Caroll: \n", + /* 60*/ "Mine CME\n", + /* 61*/ "Une Mine CME\n", + /* 62*/ "Mine CME obtenue.\n", + /* 63*/ "Obtenir r馗epteur.\n", + /* 64*/ "\n", + /* 65*/ "R馗epteur\n", + /* 66*/ "Un r馗epteur\n", + /* 67*/ "R馗epteur obtenu.\n", + /* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalit.\n", + /* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en m麥e temps.\n", + /* 70*/ "Je m'y mets tout de suite. Au revoir.\n", + /* 71*/ "Au pied!\n", + /* 72*/ "J'ai un probl鑪e de mot de passe, et vous \nallez le r駸oudre.\n", + /* 73*/ "Ne tirez pas! Ne tirez pas!\n", + /* 74*/ "Transfert interrompu - connexion perdue.\n", + /* 75*/ "Erreur transfert - t駘馗hargement incomplet.\n", + /* 76*/ "Syst鑪e de s馗urit temporairement annul.\n", + /* 77*/ "Communications ext駻ieures coup馥s.\n", + /* 78*/ "Ascenseur du laboratoire localis.\n", + /* 79*/ "S馗urit!!! A l'aide!\n", + /* 80*/ "Mine CME requise pour brouiller s馗urit.\n", + /* 81*/ "Mine CME requise pour brouiller coms.\n", + /* 82*/ "Leurre\n", + /* 83*/ "Vous osez me d駻anger?\n", + /* 84*/ "Vous allez le regretter, jeune fille!\n", + /* 85*/ "Un conseil: partez...MAINTENANT!\n", + /* 86*/ "Ne me tuez pas!\n", + /* 87*/ "Piti!\n", + /* 88*/ "Obtenir CamSpy.\n", + /* 89*/ "La CamSpy du\n", + /* 90*/ "Dr. Caroll\n", + /* 91*/ "Une CamSpy\n", + /* 92*/ "CamSpy obtenue.\n", + /* 93*/ "Signal positif - \nle relais de com int駻ieur est proche.\n", + /* 94*/ "Le bureau de Cassandra est \ncet 騁age.\n", + /* 95*/ "L'autre relais doit 黎re dans la \nsalle de surveillance.\n", + /* 96*/ "L'ascenseur souterrain doit 黎re dans \nle coin.\n", + /* 97*/ "Syst鑪e de s馗urit op駻ationnel.\n", + /* 98*/ "Bravo...軋 ne marche plus!\n", + /* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n", + /*100*/ "Pourquoi agir si vite?\n", + /*101*/ "Si le Dr. Caroll n'est pas sauv ce soir, \nses sup駻ieurs conditionneront son \nesprit et nous ne pourrons d馗ouvrir \nles plans de la dataDyne. \n", + /*102*/ "Peut-on les 駘iminer?\n", + /*103*/ "Pas de b黎ises: une cl de s馗urit ne \nfonctionne que si le d騁enteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes arm駸...\n", + /*104*/ "O se trouve la cible?\n", + /*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninf駻ieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n", + /*106*/ "Comment le reconnatre?\n", + /*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n", + /*108*/ "OK. J'y suis...\n", + /*109*/ "Je...Je me connecte.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_g.c b/src/files/lang/jap-final/ame_str_g.c new file mode 100644 index 000000000..239a44f97 --- /dev/null +++ b/src/files/lang/jap-final/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschtzt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu knnen. Sie mssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries tr臠t den Codeschlssel fr Sperrzonen innerhalb des Geb舫des an ihrer Halskette. Der Schlssel steht in Verbindung mit ihrem persnlichen Gesundheitsstatus ワberwachungsger舩. Sobald kein Lebenszeichen mehr bertragen wird, verliert der Schlssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafr, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird ber Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der fr Dr. Carolls Projekt verantwortlich zeichnet anwesend ist, findet in einem der Brotrakte statt. Folgen Sie ihm in sein Bro, greifen Sie auf die Projektdaten zu und bertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Ger舩es.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Geb舫des anbringen. Dadurch werden s舂tliche automatisch generierten SOS-Rufe nach drau゚en blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschtzt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu knnen. Sie mssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries tr臠t den Codeschlssel fr Sperrzonen innerhalb des Geb舫des an ihrer Halskette. Der Schlssel steht in Verbindung mit ihrem persnlichen Gesundheitsstatus ワberwachungsger舩. Sobald kein Lebenszeichen mehr bertragen wird, verliert der Schlssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafr, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Geb舫des anbringen. Dadurch werden s舂tliche automatisch generierten SOS-Rufe nach drau゚en blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.", + /* 10*/ "0230 Uhr 15 AUG 2023\n", + /* 11*/ "Bringen Sie die De Vries' Halskette in Ihren Besitz!\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Halskette\n", + /* 14*/ "De Vries' Halskette\n", + /* 15*/ "De Vries' Halskette aufgenommen\n", + /* 16*/ "Blockieren Sie das Sicherheitssystem!\n", + /* 17*/ "Finden Sie den Schlssel!\n", + /* 18*/ "Kopieren Sie die Projektdaten!\n", + /* 19*/ "Blockieren Sie die externe Sicherheit!\n", + /* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n", + /* 22*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 23*/ "Du wirst nicht auf mich schie゚en, dummes Kind!\n", + /* 24*/ "Du wei゚t wohl nicht, wer ich bin.\n", + /* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n", + /* 26*/ "BITTE!!!! Tun Sie mir nichts!\n", + /* 27*/ "W舐e ich du, wrde ich verschwinden... und zwar JETZT!\n", + /* 28*/ "ECM-Mine wurde nicht korrekt platziert.\n", + /* 29*/ "ECM-Mine wurde korrekt platziert.\n", + /* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollst舅dig.\n", + /* 31*/ " MISSION ERFOLGREICH \n", + /* 32*/ "Erreichung aller Ziele UNMヨGLICH.\n", + /* 33*/ "Es ist an der Zeit, diese Daten zu lschen.\n", + /* 34*/ "Festplatte gelscht\n", + /* 35*/ "Ich tue alles, was Sie verlangen!\n", + /* 36*/ "HILFE - Ein Eindringling!\n", + /* 37*/ "Du sprichst zuviel.\n", + /* 38*/ "HILFE, HILFE!\n", + /* 39*/ "Ich tue alles, was Sie verlangen...\n", + /* 40*/ "Ich logge mich jetzt ein...\n", + /* 41*/ "Okay, ich bin drin...\n", + /* 42*/ "Auf Wiedersehen, Dr. Caroll.\n", + /* 43*/ "Du hast deinen letzten Virus geschrieben, Verr舩er!\n", + /* 44*/ "Kopiervorgang gestartet\n", + /* 45*/ "Kopiervorgang abgeschlossen\n", + /* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich\n", + /* 47*/ "Trverriegelung aufgehoben\n", + /* 48*/ "HトH!\n", + /* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n", + /* 50*/ "BELEUCHTUNG AKTIVIERT\n", + /* 51*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 52*/ "Lschen Sie die Konversation mit Dr. Caroll...\n", + /* 53*/ "Nicht schie゚en, nicht schie゚en!\n", + /* 54*/ "Wichtiges Objekt zerstrt\n", + /* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n", + /* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmglich\n", + /* 57*/ "Wichtige Person neutralisiert\n", + /* 58*/ "Erlangen Sie ECM-Minen.\n", + /* 59*/ "Dr. Carolls\n", + /* 60*/ "ECM-Mine\n", + /* 61*/ "Eine ECM-Mine\n", + /* 62*/ "ECM-Mine aufgenommen\n", + /* 63*/ "Erlangen Sie das Data Uplink-Ger舩.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "Ein Data Uplink\n", + /* 67*/ "Data Uplink aufgenommen\n", + /* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n", + /* 69*/ "Nein, ich kann den Vorgang von meinem Bro\naus initiieren und die entsprechenden Files lschen.\nJa, das erfolgt gleichzeitig.\n", + /* 70*/ "Ich fange sofort an. Wiederhren.\n", + /* 71*/ "Beweg dich!\n", + /* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n", + /* 73*/ "Nicht schie゚en, nicht schie゚en!\n", + /* 74*/ "Datalink defekt - Verbindung terminiert\n", + /* 75*/ "Datalink Error - Kopiervorgang unvollst舅dig\n", + /* 76*/ "Internes Sicherheitssystem tempor舐 au゚er Kraft gesetzt.\n", + /* 77*/ "Externe Kommunikationssysteme au゚er Kraft gesetzt.\n", + /* 78*/ "Aufzug zum Labor geortet.\n", + /* 79*/ "Security... Hilfe!\n", + /* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine bentigt.\n", + /* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine bentigt.\n", + /* 82*/ "Dummy\n", + /* 83*/ "Wie kannst du es wagen, mich zu stren?\n", + /* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n", + /* 85*/ "W舐e ich du, wrde ich verschwinden,... und zwar JETZT!\n", + /* 86*/ "Bitte tun Sie mir nichts!\n", + /* 87*/ "Nicht schie゚en!\n", + /* 88*/ "Erlangen Sie den CamSpy.\n", + /* 89*/ "Dr. Carolls\n", + /* 90*/ "CamSpy\n", + /* 91*/ "Ein CamSpy\n", + /* 92*/ "CamSpy aufgenommen\n", + /* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock fr die internen Sicherheitssysteme muss in der N臧e sein.\n", + /* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Bro.\n", + /* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n", + /* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n", + /* 97*/ "Das Sicherheitssystem ist wieder online.\n", + /* 98*/ "Du Vandale, du hast es zerstrt!\n", + /* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n", + /*100*/ "Warum die Hektik?\n", + /*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So wrden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n", + /*102*/ "Sind dort alle Personen entbehrlich?\n", + /*103*/ "Machen Sie keine Witze! Sie mssen vorsichtig sein, Joanna. \nCodeschlssel ntzen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlssel seinen Wert. Bewaffnete Wachen sind natrlich \nein anderes Thema...\n", + /*104*/ "Wie lautet der Zielbereich?\n", + /*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n", + /*106*/ "Woran erkenne ich ihn?\n", + /*107*/ "Wir verfgen ber kein Bildmaterial, und wir knnen \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glck, Perfect Dark.\n", + /*108*/ "Ich bin jetzt drin...\n", + /*109*/ "Ich...Ich logge mich jetzt ein.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_i.c b/src/files/lang/jap-final/ame_str_i.c new file mode 100644 index 000000000..9d8f54ff5 --- /dev/null +++ b/src/files/lang/jap-final/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perch abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana connessa ad un sensore del suo stato di salute e si disattiver in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo mander in tilt la richiesta automatica d'aiuto esterno, mettendo cos totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perch abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana connessa ad un sensore del suo stato di salute e si disattiver in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo mander in tilt la richiesta automatica d'aiuto esterno, mettendo cos totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.", + /* 10*/ "Ore 0230 15 AGO 2023\n", + /* 11*/ "Prendi collana di De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collana\n", + /* 14*/ "Collana di De Vries\n", + /* 15*/ "Presa collana di De Vries.\n", + /* 16*/ "Disattiva sistema di sicurezza interno\n", + /* 17*/ "Prendi collana-chiave\n", + /* 18*/ "Scarica file del progetto\n", + /* 19*/ "Disattiva sistema di sicurezza esterno\n", + /* 20*/ "Cerca di entrare nel laboratorio\n", + /* 21*/ "Chi sei e che ci fai qui?\n", + /* 22*/ "Attenzione! ネ armata.\n", + /* 23*/ "Non lo farei se fossi in te!\n", + /* 24*/ "Tu non sai chi sono io!\n", + /* 25*/ "Vediamo come fai con la sicurezza.\n", + /* 26*/ "TI PREGO!!! Non sparare!\n", + /* 27*/ "Se fossi in te girerei i tacchi!\n", + /* 28*/ "Mina in posizione errata\n", + /* 29*/ "Mina piazzata correttamente\n", + /* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 31*/ " MISSIONE COMPIUTA \n", + /* 32*/ "IMPOSSIBILE completare obiettivi!\n", + /* 33*/ "ネ ora di cancellare i file.\n", + /* 34*/ "Cancellato PC direttore.\n", + /* 35*/ "Far quel che vuoi!\n", + /* 36*/ "ALLARME - Intrusione!\n", + /* 37*/ "Tu parli troppo!\n", + /* 38*/ "AIUTO! AIUTO!\n", + /* 39*/ "Far quel che vuoi...\n", + /* 40*/ "Connessione in corso...\n", + /* 41*/ "Bene, ci sono...\n", + /* 42*/ "Arrivederci, Dr. Caroll.\n", + /* 43*/ "Comincia a pregare, verme!\n", + /* 44*/ "Scaricamento in corso\n", + /* 45*/ "Scaricamento completato\n", + /* 46*/ "ACCESSO NEGATO: inserire password\n", + /* 47*/ "Aperta la porta!\n", + /* 48*/ "TOH!\n", + /* 49*/ "Impossibile scaricare: serve Connettore Dati\n", + /* 50*/ "LUCI ACCESE\n", + /* 51*/ "LUCI SPENTE\n", + /* 52*/ "Cancellare conversazione con Dr. Caroll\n", + /* 53*/ "Non sparare! Non sparare!\n", + /* 54*/ "Distrutto strumento essenziale alla missione\n", + /* 55*/ "Vittime civili inaccettabili\n", + /* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 57*/ "Ucciso personale essenziale alla missione\n", + /* 58*/ "Procurati mina ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Mina ECM\n", + /* 62*/ "Presa mina ECM\n", + /* 63*/ "Procurati Connettore Dati.\n", + /* 64*/ "\n", + /* 65*/ "C. Dati\n", + /* 66*/ "Un Connettore Dati\n", + /* 67*/ "Preso Connettore Dati.\n", + /* 68*/ "S, s! Sono d'accordo. Possibili vittime\n sono giustificate.\n", + /* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n", + /* 70*/ "Inizier subito. A dopo.\n", + /* 71*/ "Muoviti!\n", + /* 72*/ "Ho problemi con la password, e tu sei \nl'unico che pu aiutarmi.\n", + /* 73*/ "Non sparare! Non sparare!\n", + /* 74*/ "Errore datalink: connessione terminata\n", + /* 75*/ "Errore datalink: scaricamento incompleto\n", + /* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n", + /* 77*/ "Sistema di sicurezza esterno fuori uso.\n", + /* 78*/ "Ascensore laboratorio localizzato.\n", + /* 79*/ "Sicurezza... Aiuto!\n", + /* 80*/ "Serve mina ECM per disattivare sicurezza interno\n", + /* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n", + /* 82*/ "Idiota\n", + /* 83*/ "Come osi disturbarmi!\n", + /* 84*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 85*/ "Se fossi in te starei alla larga!\n", + /* 86*/ "Ti prego, risparmiami!\n", + /* 87*/ "Non sparare!\n", + /* 88*/ "Procurati TeleSpia.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "TeleSpia\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "Presa la TeleSpia.\n", + /* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n", + /* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n", + /* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n", + /* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n", + /* 97*/ "Il sistema di sicurezza funziona ora.\n", + /* 98*/ "L'hai rotto, maledizione!\n", + /* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n", + /*100*/ "Cos' tutta 'sta fretta?\n", + /*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli far il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n", + /*102*/ "Posso fare piazza pulita?\n", + /*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta \nancora vivo; altrimenti si disattiver. \nCerto, con le guardie armate \n tutta un'altra storia! \n", + /*104*/ "Dove si trova l'obiettivo?\n", + /*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n", + /*106*/ "Come faccio a riconoscerlo?\n", + /*107*/ "Non abbiamo n sue foto, n file \nufficiali. Tutto ci che abbiamo il \nsuo nome. Buona fortuna, Perfect Dark.\n", + /*108*/ "Ok, ci sono...\n", + /*109*/ "Sto... sto entrando!\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_s.c b/src/files/lang/jap-final/ame_str_s.c new file mode 100644 index 000000000..ecadad960 --- /dev/null +++ b/src/files/lang/jap-final/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para nosotros. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nノste est localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tr畴ico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las c疥aras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Acta r疳ido ya que la mina durar m疽 o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las 疵eas restringidas del edificio en su collar. Est conectado con su monitor personal de corazn y dejar de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll est siendo decidido en una reunin en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll est all presente. Sguele a su oficina y accede a los ficheros de su proyecto, entonces m疣danoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexin Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagn' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloquear cualquier llamada autom疸ica para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para nosotros. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nノste est localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tr畴ico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las c疥aras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Acta r疳ido ya que la mina durar m疽 o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las 疵eas restringidas del edificio en su collar. Est conectado con su monitor personal de corazn y dejar de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexin Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagn' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloquear cualquier llamada autom疸ica para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para nosotros. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCG Divisin Central Chicago IL EE.UU.", + /* 10*/ "0230 Horas 15 AGO 2023\n", + /* 11*/ "Obt駭 el collar de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collar\n", + /* 14*/ "Collar de De Vries\n", + /* 15*/ "Collar de De Vries obtenido.\n", + /* 16*/ "Desactivar puerto interno de seguridad\n", + /* 17*/ "Obtener el collar-cdigo\n", + /* 18*/ "Descargar los ficheros del proyecto\n", + /* 19*/ "Desactivar puerto de com. externas\n", + /* 20*/ "Entrar en el laboratorio\n", + /* 21*/ "ソQui駭 eres t y qu est疽 haciendo aqu?\n", + /* 22*/ "。Cuidado! Tiene un arma.\n", + /* 23*/ "。No me disparar疽, tonta criatura!\n", + /* 24*/ "ソNo sabes qui駭 soy?\n", + /* 25*/ "Veamos cmo te las apaas con seguridad.\n", + /* 26*/ "。。。。POR FAVOR!!!! 。No me mates!\n", + /* 27*/ "Si fuera t, me marchara... 。AHORA!\n", + /* 28*/ "Mina ECM mal colocada.\n", + /* 29*/ "Mina ECM colocada correctamente.\n", + /* 30*/ "MISIモN FALLADA: objetivos incompletos.\n", + /* 31*/ " MISIモN CONSEGUIDA \n", + /* 32*/ "NO PUEDES completar todos los objetivos.\n", + /* 33*/ "Es hora de borrar esos ficheros.\n", + /* 34*/ "Ordenador del ejecutivo borrado.\n", + /* 35*/ "。Har lo que t quieras!\n", + /* 36*/ "AYUDA. 。Intruso!\n", + /* 37*/ "Hablas demasiado.\n", + /* 38*/ "。AYUDA, AYUDA!\n", + /* 39*/ "。Har lo que t quieras!\n", + /* 40*/ "Conectando ahora...\n", + /* 41*/ "Vale, estoy dentro...\n", + /* 42*/ "Adis, Dr. Caroll.\n", + /* 43*/ "。Has procesado tu ltimo error, traidor!\n", + /* 44*/ "Descarga del fichero iniciada.\n", + /* 45*/ "Descarga del fichero completada.\n", + /* 46*/ "ACCESO DENEGADO. Necesitas la contrasea.\n", + /* 47*/ "Puerta desbloqueada.\n", + /* 48*/ "。OH!\n", + /* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n", + /* 50*/ "LUCES ENCENDIDAS\n", + /* 51*/ "LUCES APAGADAS\n", + /* 52*/ "Borra la conversacin del Dr. Caroll...\n", + /* 53*/ "。No dispares, no dispares!\n", + /* 54*/ "Objeto crtico de la misin destruido.\n", + /* 55*/ "Bajas civiles inaceptables.\n", + /* 56*/ "MISIモN FALLADA:\n los objetivos no pueden ser completados.\n", + /* 57*/ "Ha muerto una persona crtica para la misin.\n", + /* 58*/ "Obt駭 las Minas ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Una Mina ECM\n", + /* 62*/ "Mina ECM obtenida.\n", + /* 63*/ "Obt駭 el Conector de Datos.\n", + /* 64*/ "\n", + /* 65*/ "C. Datos\n", + /* 66*/ "Un Conector de Datos\n", + /* 67*/ "Conector de Datos obtenido.\n", + /* 68*/ "S, s, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n", + /* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n", + /* 70*/ "Empezar enseguida. Adis.\n", + /* 71*/ "。En marcha!\n", + /* 72*/ "Tengo un problema de contraseas, y t \neres el hombre que puede ayudarme con ello.\n", + /* 73*/ "。No dispares, no dispares!\n", + /* 74*/ "Enlace de Datos perdido - conexin terminada.\n", + /* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n", + /* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n", + /* 77*/ "Puerto de comunicaciones externas desactivado.\n", + /* 78*/ "Ascensor del laboratorio localizado.\n", + /* 79*/ "Seguridad... 。Aydenme!\n", + /* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n", + /* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n", + /* 82*/ "Tonto\n", + /* 83*/ "。Cmo te atreves a molestarme!\n", + /* 84*/ "。Te vas a arrepentir de esta intrusin, chica!\n", + /* 85*/ "Si yo fuera t, me ira... 。YA!\n", + /* 86*/ "。Por favor, no me mates!\n", + /* 87*/ "。No dispares!\n", + /* 88*/ "Obt駭 la C疥ara Espa.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "C疥ara Espa\n", + /* 91*/ "Una C疥ara Espa\n", + /* 92*/ "C疥ara Espa obtenida.\n", + /* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno est cerca.\n", + /* 94*/ "Est疽 en la misma planta que \nla oficina de Cassandra.\n", + /* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n", + /* 96*/ "El ascensor del stano debe de estar por \naqu en algn lugar.\n", + /* 97*/ "El sistema de seguridad est activo de nuevo.\n", + /* 98*/ "。V疣dalo! 。Lo has roto!\n", + /* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n", + /*100*/ "ソPor qu tanta prisa?\n", + /*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavar el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n", + /*102*/ "ソSon todos prescindibles?\n", + /*103*/ "。No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves cdigo slo funcionan cuando el \npropietario est vivo... Si les matas, la llave \nes intil. Los guardas armados son otra cosa, \npor supuesto.\n", + /*104*/ "ソDnde se encuentra el objetivo?\n", + /*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estar en el laboratorio de \ninvestigacin en algn lugar del subsuelo.\n", + /*106*/ "ソCmo le reconocer?\n", + /*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n", + /*108*/ "Bien, estoy dentro...\n", + /*109*/ "Estoy... estoy entrando ahora.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/archE.c b/src/files/lang/jap-final/archE.c similarity index 100% rename from src/files/lang/archE.c rename to src/files/lang/jap-final/archE.c diff --git a/src/files/lang/archJ.c b/src/files/lang/jap-final/archJ.c similarity index 100% rename from src/files/lang/archJ.c rename to src/files/lang/jap-final/archJ.c diff --git a/src/files/lang/archP.c b/src/files/lang/jap-final/archP.c similarity index 100% rename from src/files/lang/archP.c rename to src/files/lang/jap-final/archP.c diff --git a/src/files/lang/arch_str_f.c b/src/files/lang/jap-final/arch_str_f.c similarity index 100% rename from src/files/lang/arch_str_f.c rename to src/files/lang/jap-final/arch_str_f.c diff --git a/src/files/lang/arch_str_g.c b/src/files/lang/jap-final/arch_str_g.c similarity index 100% rename from src/files/lang/arch_str_g.c rename to src/files/lang/jap-final/arch_str_g.c diff --git a/src/files/lang/arch_str_i.c b/src/files/lang/jap-final/arch_str_i.c similarity index 100% rename from src/files/lang/arch_str_i.c rename to src/files/lang/jap-final/arch_str_i.c diff --git a/src/files/lang/arch_str_s.c b/src/files/lang/jap-final/arch_str_s.c similarity index 100% rename from src/files/lang/arch_str_s.c rename to src/files/lang/jap-final/arch_str_s.c diff --git a/src/files/lang/arecE.c b/src/files/lang/jap-final/arecE.c similarity index 100% rename from src/files/lang/arecE.c rename to src/files/lang/jap-final/arecE.c diff --git a/src/files/lang/arecJ.c b/src/files/lang/jap-final/arecJ.c similarity index 100% rename from src/files/lang/arecJ.c rename to src/files/lang/jap-final/arecJ.c diff --git a/src/files/lang/arecP.c b/src/files/lang/jap-final/arecP.c similarity index 100% rename from src/files/lang/arecP.c rename to src/files/lang/jap-final/arecP.c diff --git a/src/files/lang/arec_str_f.c b/src/files/lang/jap-final/arec_str_f.c similarity index 100% rename from src/files/lang/arec_str_f.c rename to src/files/lang/jap-final/arec_str_f.c diff --git a/src/files/lang/arec_str_g.c b/src/files/lang/jap-final/arec_str_g.c similarity index 100% rename from src/files/lang/arec_str_g.c rename to src/files/lang/jap-final/arec_str_g.c diff --git a/src/files/lang/arec_str_i.c b/src/files/lang/jap-final/arec_str_i.c similarity index 100% rename from src/files/lang/arec_str_i.c rename to src/files/lang/jap-final/arec_str_i.c diff --git a/src/files/lang/arec_str_s.c b/src/files/lang/jap-final/arec_str_s.c similarity index 100% rename from src/files/lang/arec_str_s.c rename to src/files/lang/jap-final/arec_str_s.c diff --git a/src/files/lang/arkE.c b/src/files/lang/jap-final/arkE.c similarity index 100% rename from src/files/lang/arkE.c rename to src/files/lang/jap-final/arkE.c diff --git a/src/files/lang/jap-final/arkJ.c b/src/files/lang/jap-final/arkJ.c new file mode 100644 index 000000000..22f282cf5 --- /dev/null +++ b/src/files/lang/jap-final/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nミd∵∃≪≠奄鰍汲撃香メ♂d゚≧ムマ′noマモヒpqrs∵tuト√⇔⊇≫ツ′メv⌒wメxヒoyマz宦ト√⇔⊇≫メ♭≠怩掾ソ≒メ桙氈モあぃい♭⊆≫ツぅうメぇえoyモ≠ァ∀♀ラ゚dヨヒ∈#d縺おぁニ≫テ∀マ∃エ⇔⊇≫ツ\n\n|ヨヒマ縲マセ\n\n≠ヘミマ艢≠ゥ⊂リ♭⌒∃⊇∵≠ェ≡≪⌒リ=橿ラ゚dヨヒメき∈ぎ≫テ∀∵くぐけÅツユレマ♀∀♂d゚≧ムマモげb∈⇒チナ⇔ぉ∨¬メ桙氈クこごニ≫Å∽⊂ツさざ∈⊇メ≫ツ\n\n|しじ操セ艢操モ℃d゚dマぢ≪っ⊥\n\n怩揩サぞメすず∈せぜナ⇔∞ヒメたヨ∀だチ艢操モ℃d゚dマ=橿ラ゚dヨヒ∀ちマぢ≪っ⊥ツ\n\n|しじ逐セ艢逐モ℃d゚d∈つづて\n\n′メ艢逐モ℃d゚∈て∩∃チトヌ≫ルマ♀∵÷ヤニワミdメ曹ニフメたマ⊆≫ゥ怐ソ≒ぁト√⇔⊇≫メ∈せどナ∨ツ艢逐モ℃d゚d∈つづてトヌ≫∨⊥=ネメゥ怐クなにナ⇔÷ルマ♀∈ぬねヌ≡ツ\n\n|しじ凍セ°dル£゚d∈べ¬ぺ∀ヌ\n\n′メひ≪∈♂d゚≧ムマメ°dル£゚d∵びぴナぉ∨¬∈へエ⇔⊇≫ツテ√∈べ¬ぺ∀ニメÅツ∂≒∃ツ√†=ン≒√≫ÅツÅツ\n\n|しじ楳セ¥♂ニd♀∈ュ⇔ほヌ\n\nぉ∨¬∵#d縺ヨぼチでm÷ユレマ♀∵ぽまメ¥♂ニd♀∈みtナ∨モÅツぉ∨¬∵ぽま≒∈むツ≫メモラ∀∋♪あぃい∃メ♭≠゚ナ⊇もべqメゃや∈ナ⇔チ√ツ\n\n|しじ斧セ桙氈メ∨⊥#d縺マゅ√\n\n#d縺マぼツ†≠艪メぇえoy∵よマらエ⇔⊇≫モÅツ♀ラ゚dヨヒ∈り√≫∃≡ツ\n\nEND\n", + /* 1*/ "レdマ゚d\n", + /* 2*/ "|ワ竄пbhセ\n\nミd∵∃≪≠奄鰍汲撃香メ♂d゚≧ムマ′noマモヒpqrs∵tuト√⇔⊇≫ツ′メv⌒wメxヒoyマz宦ト√⇔⊇≫メ♭≠怩掾ソ≒メ桙氈モあぃい♭⊆≫ツぅうメぇえoyモ≠ァ∀♀ラ゚dヨヒ∈#d縺おぁニ≫テ∀マ∃エ⇔⊇≫ツ\n\n|ヨヒマ縲マセ\n\n≠ヘミマ艢≠ゥ⊂リ♭⌒∃⊇∵≠ェ≡≪⌒リ=橿ラ゚dヨヒメき∈ぎ≫テ∀∵くぐけÅツユレマ♀∀♂d゚≧ムマモげb∈⇒チナ⇔ぉ∨¬メ桙氈クこごニ≫Å∽⊂ツさざ∈⊇メ≫ツ\n\n|しじ操セ艢操モ℃d゚dマぢ≪っ⊥\n\n怩揩サぞメすず∈せぜナ⇔∞ヒメたヨ∀だチ艢操モ℃d゚dマ=橿ラ゚dヨヒ∀ちマぢ≪っ⊥ツ\n\n|しじ逐セ°dル£゚d∈べ¬ぺ∀ヌ\n\n′メひ≪∈♂d゚≧ムマメ°dル£゚d∵びぴナぉ∨¬∈へエ⇔⊇≫ツテ√∈べ¬ぺ∀ニメÅツ∂≒∃ツ√†=ン≒√≫ÅツÅツ\n\n|しじ凍セ¥♂ニd♀∈ュ⇔ほヌ\n\nぉ∨¬∵#d縺ヨぼチでm÷ユレマ♀∵ぽまメ¥♂ニd♀∈みtナ∨モÅツぉ∨¬∵ぽま≒∈むツ≫メモラ∀∋♪あぃい∃メ♭≠゚ナ⊇もべqメゃや∈ナ⇔チ√ツ\n\n|しじ楳セ桙氈メ∨⊥#d縺マゅ√\n\n#d縺マぼツ†≠艪メぇえoy∵よマらエ⇔⊇≫モÅツ♀ラ゚dヨヒ∈り√≫∃≡ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nミd∵∃≪≠奄鰍汲撃香メ♂d゚≧ムマ′noマモヒpqrs∵tuト√⇔⊇≫ツ′メv⌒wメxヒoyマz宦ト√⇔⊇≫メ♭≠怩掾ソ≒メ桙氈モあぃい♭⊆≫ツぅうメぇえoyモ≠ァ∀♀ラ゚dヨヒ∈#d縺おぁニ≫テ∀マ∃エ⇔⊇≫ツ\n\n|ヨヒマ縲マセ\n\n≠ヘミマ艢≠ゥ⊂リ♭⌒∃⊇∵≠ェ≡≪⌒リ=橿ラ゚dヨヒメき∈ぎ≫テ∀∵くぐけÅツユレマ♀∀♂d゚≧ムマモげb∈⇒チナ⇔ぉ∨¬メ桙氈クこごニ≫Å∽⊂ツさざ∈⊇メ≫ツ\n\n|しじ操セ艢操モ℃d゚dマぢ≪っ⊥\n\n怩揩サぞメすず∈せぜナ⇔∞ヒメたヨ∀だチ艢操モ℃d゚dマ=橿ラ゚dヨヒ∀ちマぢ≪っ⊥ツ\n\n|しじ逐セ¥♂ニd♀∈ュ⇔ほヌ\n\nぉ∨¬∵#d縺ヨぼチでm÷ユレマ♀∵ぽまメ¥♂ニd♀∈みtナ∨モÅツぉ∨¬∵ぽま≒∈むツ≫メモラ∀∋♪あぃい∃メ♭≠゚ナ⊇もべqメゃや∈ナ⇔チ√ツ\n\n|しじ凍セ桙氈メ∨⊥#d縺マゅ√\n\n#d縺マぼツ†≠艪メぇえoy∵よマらエ⇔⊇≫モÅツ♀ラ゚dヨヒ∈り√≫∃≡ツ\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "艢操モ℃d゚dマぢ≪っ⊥\n", + /* 10*/ "艢逐モ℃d゚d∈つづて\n", + /* 11*/ "°dル£゚d∈べ¬ぺ∀ヌ\n", + /* 12*/ "¥♂ニd♀∈ュ⇔ほヌ\n", + /* 13*/ "桙氈メ∨⊥#d縺マゅ√\n", + /* 14*/ "モ℃d゚dるれロワ窶マミランワm蚕n", + /* 15*/ "ろゎィァ\n", + /* 16*/ "♀ラ゚dヨヒ∵ほト√∨エ\n", + /* 17*/ "♀ラ゚dヨヒ∵わべト√⇔⊇≫エ\n", + /* 18*/ "♀ラ゚dヨヒ∵≧d≠∈ゐツ∨エ\n", + /* 19*/ "⊆ッ≧Å死潤コメま=ワ⊂∧テマ⊇≫エ\n", + /* 20*/ "⊇¶∋ゑを∃テ∀†∩≪ナ⇔チ√≫オ∃⊇メ蚕n", + /* 21*/ "∪∂ニル∃ト⊇=dラ¬オ∋ツ\n", + /* 22*/ "ろゎィァ\n", + /* 23*/ "ろゎィ麾歃n", + /* 24*/ "しじん\n", + /* 25*/ "しじ\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "艢ム縲ミム\n", + /* 30*/ "艢ム縲ミム\n", + /* 31*/ "艢ム縲ミム∈みマ√∨\n", + /* 32*/ "リ∨うエ∨∝ム=セ烙ヒマエ\n", + /* 33*/ "艢操モ℃d゚dヨメミランワ\n", + /* 34*/ "艢逐モ℃d゚dメハラ∵fト√∨\n", + /* 35*/ "°dル£゚dメばぱ\n", + /* 36*/ "ユレマ♀メ¥♂ニdd♀∈ュ⇔ほナ∨\n", + /* 37*/ "∧⊂∂エ⇔⊂∋オ∃⊇Å∽タ\n", + /* 38*/ "⊇∂=テ√♭⊇⊇∋Åツ\n", + /* 39*/ "ヌ≡≠エ⇔≫≡ツ\n", + /* 40*/ "≠ヒニ≫∃エ⇔エ\n", + /* 41*/ "が♭⌒⊇⊇∩≒レチナ∽エ\n", + /* 42*/ "ミ=ワ⊂みム√Å蚕n", + /* 43*/ "⊆メま=ネテマ⊇≫エ\n", + /* 44*/ "⇒∩リ⊃∽エ\n", + /* 45*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "ユワ$ム\n", + /* 49*/ "ユワ$ム\n", + /* 50*/ "ユワ$ム∈みマ√∨\n", + /* 51*/ "怩掾モュマハラト√⇔⊇≫ツ\n艢操モ℃d゚dヨ∀ユ∩⊂メÅエ\n", + /* 52*/ "∧メモばぱニ≫メÅツ\nぇえoy∵∂≒√⇔ナリ⊂エ\n", + /* 53*/ "ュチラ驛梶諱ホ⊇≡⊂ム蚕n", + /* 54*/ "テ√ルヒぇえoy∈ら∨ヌ≫∃ツ\nレチ#d縺ヨロ∬メÅエ\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "ユd♀ヨd\n", + /* 58*/ "ユd♀ヨd\n", + /* 59*/ "ユレマ♀メヤニワメ\nユd♀ヨd∈みマ√∨\n", + /* 60*/ "ミd∈エ準瘁諠吹ノエ\n", + /* 61*/ "ヱヲメン≡エ\n", + /* 62*/ "テ√モ≠モ朽蚕n", + /* 63*/ "♪テマ∪ぁ∩ツ∩ナ≒タ\n", + /* 64*/ "ヴマが∩ヨ÷ヤ°レタ\n", + /* 65*/ "∧メ噫「∈ヵニ∬ヶナ∃エ\nが∈ナ⇔⊇≫∩=蛛ソエ⇔≫メ∩⊇エ\n", + /* 66*/ "が∈エ⇔タ\n桙氈ニ≫Åツ≡ツ\n", + /* 67*/ "⌒⊂曹メか⊂∝<磨ナ∃ト⊇エ\n∧ナ⇔<煤メフ♭凵チ∀⊇⊇∝蚕n", + /* 68*/ "噤サ∝ム<香サ♭≫メツ\n", + /* 69*/ "⊆メ噫「∈ョ宦痺磨ニメÅツ\n⊆√∵∃チ⇔モを怐謔キリ∃⊇エ\n", + /* 70*/ "∝∩エ⇔≫∝エ\n", + /* 71*/ "栫マΑ∈ニ√†⊇⊇∩=蛛ソエ⇔≫∝ツ\n死ワ゚dヨヒマ縲マ≡ツ\n", + /* 72*/ "テメミdメモ℃d゚dメ♀ミモハラト√⇔⊇リニツ\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/arkP.c b/src/files/lang/jap-final/arkP.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/jap-final/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_f.c b/src/files/lang/jap-final/ark_str_f.c new file mode 100644 index 000000000..6451563d5 --- /dev/null +++ b/src/files/lang/jap-final/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - R饌ctiver l'ascenseur\n\nNous avons d騁ect la commande d'arr黎 de fonctionnement de l'ascenseur donn馥 par un PC des bureaux inf駻ieurs. Trouvez ce terminal et modifiez la commande pour r饌ctiver l'ascenseur.\n\n|Objectif 3: - D騁ruire l'h駘ico de combat dataDyne\n\nUn h駘ico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous interdire l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 5: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - D騁ruire l'h駘ico de combat dataDyne\n\nUn h駘ico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous barrer l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 4: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous barrer l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 3: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acc馘er l'ascenseur du hall\n", + /* 10*/ "R饌ctiver l'ascenseur du bureau\n", + /* 11*/ "D騁ruire l'hovercopter dataDyne\n", + /* 12*/ "Battre les gardes de Cassandra\n", + /* 13*/ "Retour l'h駘iport avec Dr. Caroll\n", + /* 14*/ "Acc鑚 param鑼res ascenseur...\n", + /* 15*/ "LUMIERES ON\n", + /* 16*/ "Dr. Caroll abattu!\n", + /* 17*/ "Dr. Caroll sous feu ennemi!\n", + /* 18*/ "Dr. Caroll endommag!\n", + /* 19*/ "Trop tard! La voici...\n", + /* 20*/ "Vous 黎es une sacr馥 peste, vous...\n", + /* 21*/ "Bonne nuit, Miss Dark.\n", + /* 22*/ "LUMIERES ON\n", + /* 23*/ "LUMIERES OFF\n", + /* 24*/ "MISSION ECHOUEE\n", + /* 25*/ "MISSION ACCOMPLIE\n", + /* 26*/ "Emplacement pour warning h駘ico.\n", + /* 27*/ "Obtenir Vue nocturne.\n", + /* 28*/ "Cassandra De Vries: \n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne\n", + /* 31*/ "Vue nocturne obtenue.\n", + /* 32*/ "Re-bonjour, jeune fille!\n", + /* 33*/ "Ascenseur hall atteint.\n", + /* 34*/ "Porte ascenseur bureau ouverte.\n", + /* 35*/ "Hovercopter dataDyne 駘imin.\n", + /* 36*/ "Gardes de Cassandra vaincus.\n", + /* 37*/ "Mais...pas comme 軋!\n", + /* 38*/ "Mais si.\n", + /* 39*/ "Vous faites n'importe quoi!\n", + /* 40*/ "Silence.\n", + /* 41*/ "Mais d駱鹹hez-vous!\n", + /* 42*/ "Oh, non...trop tard.\n", + /* 43*/ "La voil...\n", + /* 44*/ "Attrapez-la!\n", + /* 45*/ "Objet crucial d騁ruit. \n", + /* 46*/ "Obtenir CamSpy.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "CamSpy\n", + /* 49*/ "Une CamSpy\n", + /* 50*/ "CamSpy obtenue.\n", + /* 51*/ "Ils ont verrouill le rez-de-chauss馥 - \nallez l'ascenseur!\n", + /* 52*/ "Il faut d騁ruire cet h駘ico ou le \ntransport sera descendu!\n", + /* 53*/ "Je ne peux laisser un garde du corps vivant.\n", + /* 54*/ "Ne faites attendre le transport - \nretournez l'h駘iport.\n", + /* 55*/ "Obtenir la carte alpha.\n", + /* 56*/ "Garde: \n", + /* 57*/ "Carte de bureau\n", + /* 58*/ "Carte du bureau\n", + /* 59*/ "Carte de bureau de Cassandra obtenue.\n", + /* 60*/ "Alerte! Elle est ici!\n", + /* 61*/ "Bonne nuit!\n", + /* 62*/ "Qu'est-ce qu...?\n", + /* 63*/ "On se balade?\n", + /* 64*/ "Qu'est-ce qu'elle veut m鑽e-grand?\n", + /* 65*/ "Remettez-moi le sapiens imm馘iatement! Vous ne \nsavez pas ce que vous faites...\n", + /* 66*/ "Oh que si. Je rentre chez moi.\n", + /* 67*/ "Pour la derni鑽e fois: rendez ce qui \nm'appartient et je vous offre un poste.\n", + /* 68*/ "D駸ol馥! Je me tire.\n", + /* 69*/ "Il nous faut le sapiens. Le reste de \nl'op駻ation en d駱end.\n", + /* 70*/ "J'en suis consciente!\n", + /* 71*/ "Je sais aussi qui m'adresser...\nMr. Carrington.\n", + /* 72*/ "Porte d'ascenseur inutilisable cet 騁age.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_g.c b/src/files/lang/jap-final/ark_str_g.c new file mode 100644 index 000000000..33daba87e --- /dev/null +++ b/src/files/lang/jap-final/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Brotrakt. Sie mssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Geb舫de. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit mssen Sie mit 舫゚erster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Geb舫de. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit mssen Sie mit 舫゚erster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n", + /* 10*/ "Reaktivieren Sie den Bro-Aufzug!\n", + /* 11*/ "Zerstren Sie das dataDyne-Gunship!\n", + /* 12*/ "Neutralisieren Sie De Vries' Bodyguards!\n", + /* 13*/ "Erreichen Sie das Helipad!\n", + /* 14*/ "Zugriff auf die Aufzge erfolgt...\n", + /* 15*/ "BELEUCHTUNG AKTIVIERT!\n", + /* 16*/ "Dr. Caroll wurde zerstrt!\n", + /* 17*/ "Dr. Caroll wird angegriffen!\n", + /* 18*/ "Dr. Caroll wurde besch臈igt!\n", + /* 19*/ "Zu sp舩! Sie ist hier...\n", + /* 20*/ "Du wirst langsam richtig l舖tig...\n", + /* 21*/ "Gute Nacht, Ms. Dark.\n", + /* 22*/ "BELEUCHTUNG AKTIVIERT\n", + /* 23*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 24*/ "MISSION FEHLGESCHLAGEN\n", + /* 25*/ "MISSION ERFOLGREICH\n", + /* 26*/ "Gunship-Warnung!!!\n", + /* 27*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 28*/ "Cassandra De Vries\n", + /* 29*/ "Nachtsichtger舩\n", + /* 30*/ "Nachtsichtger舩\n", + /* 31*/ "Nachtsichtger舩 aufgenommen\n", + /* 32*/ "So trifft man sich wieder, Kleine!\n", + /* 33*/ "Foyer-Aufzug betreten\n", + /* 34*/ "Tr zum Bro-Aufzug entriegelt\n", + /* 35*/ "dataDyne-Gunship eliminiert\n", + /* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n", + /* 37*/ "So funktioniert das nicht.\n", + /* 38*/ "Doch, tut es.\n", + /* 39*/ "Gib das her - du machst das falsch!\n", + /* 40*/ "Hr auf mich zu nerven.\n", + /* 41*/ "Wrdest du dich bitte beeilen?\n", + /* 42*/ "Oh nein, ...zu sp舩!\n", + /* 43*/ "Sie ist hier...\n", + /* 44*/ "Schnappt sie!\n", + /* 45*/ "Wichtiges Objekt zerstrt\n", + /* 46*/ "Erlangen Sie den CamSpy.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "CamSpy\n", + /* 49*/ "Ein CamSpy\n", + /* 50*/ "CamSpy aufgenommen\n", + /* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n", + /* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n", + /* 53*/ "Ich muss mich noch um die Bodyguards kmmern.\n", + /* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurck zum Helipad!\n", + /* 55*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 56*/ "Wachen\n", + /* 57*/ "Bro-Schlsselkarte\n", + /* 58*/ "Bro-Schlsselkarte\n", + /* 59*/ "Cassandras Bro-Schlsselkarte aufgenommen\n", + /* 60*/ "Gebt Alarm - sie ist hier!\n", + /* 61*/ "Licht AUS!\n", + /* 62*/ "Was zum...?\n", + /* 63*/ "Na, wohin willst du denn?\n", + /* 64*/ "Kann ich etwas fr dich tun, alte Frau?\n", + /* 65*/ "Geben Sie uns den Sapienten sofort zurck! Sie wissen \nnicht, was Sie da tun!\n", + /* 66*/ "Doch, das tue ich. Ich verschwinde.\n", + /* 67*/ "Letzte Chance: Geben Sie ihn zurck, und Sie\nknnten vielleicht in Zukunft fr mich arbeiten.\n", + /* 68*/ "Tut mir leid, ich bin in Eile.\n", + /* 69*/ "Sie mssen uns das Ding zurckbringen. Wir knnen \nsonst nicht fortfahren.\n", + /* 70*/ "Das wei゚ ich!\n", + /* 71*/ "Ich wei゚ auch, mit wem ich sprechen muss... \nMr. Carrington.\n", + /* 72*/ "Die Aufzugstren sind auf diesem Stockwerk inaktiv.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_i.c b/src/files/lang/jap-final/ark_str_i.c new file mode 100644 index 000000000..d725498c6 --- /dev/null +++ b/src/files/lang/jap-final/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatter la navetta e annienter anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatter la navetta e annienter anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Usa l'ascensore dell'atrio\n", + /* 10*/ "Riattiva l'ascensore degli uffici\n", + /* 11*/ "Distruggi la cannoniera dataDyne\n", + /* 12*/ "Elimina guardie del corpo di Cassandra\n", + /* 13*/ "Appuntamento all'eliporto\n", + /* 14*/ "I comandi dell'ascensore...\n", + /* 15*/ "LE LUCI SONO ACCESE!\n", + /* 16*/ "Il Dr. Caroll stato ucciso!\n", + /* 17*/ "Attaccano il Dr. Caroll!\n", + /* 18*/ "Il Dr. Caroll ferito!\n", + /* 19*/ "Troppo tardi! ネ gi qui!\n", + /* 20*/ "Sei una vera scocciatura!\n", + /* 21*/ "Buona notte, Perfect Dark!\n", + /* 22*/ "LUCI ACCESE ORA\n", + /* 23*/ "LUCI SPENTE ORA\n", + /* 24*/ "MISSIONE FALLITA\n", + /* 25*/ "MISSIONE COMPIUTA\n", + /* 26*/ "Allarme cannoniera!\n", + /* 27*/ "Procurati Vista Notturna\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Vista Notturna\n", + /* 31*/ "Presa Vista Notturna\n", + /* 32*/ "Chi non muore si rivede!\n", + /* 33*/ "Raggiunto l'ascensore nell'atrio.\n", + /* 34*/ "Aperta la porta ascensore uffici.\n", + /* 35*/ "Eliminata la cannoniera dataDyne.\n", + /* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n", + /* 37*/ "Non si fa cos, idiota!\n", + /* 38*/ "S, invece!\n", + /* 39*/ "Dammi qua! Faccio io!\n", + /* 40*/ "Non scocciarmi!\n", + /* 41*/ "Ti vuoi dare una mossa?!\n", + /* 42*/ "Oh, no! Troppo tardi.\n", + /* 43*/ "Ci ha raggiunti...\n", + /* 44*/ "Prendila!\n", + /* 45*/ "Distrutto strumento essenziale alla missione\n", + /* 46*/ "Procurati TeleSpia.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "TeleSpia\n", + /* 49*/ "TeleSpia\n", + /* 50*/ "Presa la TeleSpia.\n", + /* 51*/ "Hanno chiuso il pianterreno! \nVa all'ascensore!\n", + /* 52*/ "Bisogna tirar gi quella cannoniera \no abbatter la navetta!\n", + /* 53*/ "Non posso lasciar vive le guardie!\n", + /* 54*/ "Fai presto: vai alla navetta! \nTorna all'eliporto!\n", + /* 55*/ "Procurati la chiave alfa\n", + /* 56*/ "Guardia:\n", + /* 57*/ "Chiave dell'ufficio\n", + /* 58*/ "Chiave dell'ufficio\n", + /* 59*/ "Presa chiave ufficio di Cassandra\n", + /* 60*/ "Date l'allarme: qui!\n", + /* 61*/ "Ma chiudi il becco!\n", + /* 62*/ "Ma cosa...?\n", + /* 63*/ "Dove credi di andare?\n", + /* 64*/ "Posso aiutarla, madama?\n", + /* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n", + /* 66*/ "Certo che lo so: me ne vado!\n", + /* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n", + /* 68*/ "Spiacente! Ho da fare!\n", + /* 69*/ "Devi recuperare il Sapiente: senza \nnon possibile andare avanti.\n", + /* 70*/ "Lo so benissimo!\n", + /* 71*/ "So anche con chi parlare... \ncon Carrington!\n", + /* 72*/ "La porta dell'ascensore fuori servizio.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_s.c b/src/files/lang/jap-final/ark_str_s.c new file mode 100644 index 000000000..2c90413ec --- /dev/null +++ b/src/files/lang/jap-final/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el nico ascensor accesible enviada a un PC situado en el piso de oficinas m疽 bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicptero Gunship de dataDyne\n\nHay un helicptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudar en derribaros. Acaba con el helicptero sin prejuicios, ya que 駘 intentar hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicptero Gunship de dataDyne\n\nHay un helicptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudar en derribaros. Acaba con el helicptero sin prejuicios, ya que 駘 intentar hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acceder al ascensor del vestbulo\n", + /* 10*/ "Reactivar ascensor de las oficinas\n", + /* 11*/ "Destruir helicptero de dataDyne\n", + /* 12*/ "Derrotar a las guard. de Cassandra\n", + /* 13*/ "Encuentro en el helipuerto\n", + /* 14*/ "Accediendo a los controles del ascensor...\n", + /* 15*/ "。LUCES ENCENDIDAS!\n", + /* 16*/ "。El Dr. Caroll ha muerto!\n", + /* 17*/ "。Est疣 atacando al Dr. Caroll!\n", + /* 18*/ "。El Dr. Caroll ha sido daado!\n", + /* 19*/ "。Demasiado tarde! Ella est aqu...\n", + /* 20*/ "Est疽 empezando a ser un fastidio...\n", + /* 21*/ "Buenas noches, Srta. Dark.\n", + /* 22*/ "LUCES ENCENDIDAS\n", + /* 23*/ "LUCES APAGADAS\n", + /* 24*/ "MISIモN FALLADA\n", + /* 25*/ "MISIモN CUMPLIDA\n", + /* 26*/ "Aviso del Helicptero va aqu.\n", + /* 27*/ "Obt駭 Visin Nocturna.\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "V. Nocturna\n", + /* 30*/ "Visin Nocturna\n", + /* 31*/ "Visin Nocturna obtenida.\n", + /* 32*/ "。Nos vemos de nuevo, chica!\n", + /* 33*/ "Accediste al ascensor del vestbulo.\n", + /* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n", + /* 35*/ "Helicptero de dataDyne eliminado.\n", + /* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n", + /* 37*/ "As no es como va.\n", + /* 38*/ "S, as es.\n", + /* 39*/ "D疥elo. Lo est疽 haciendo mal.\n", + /* 40*/ "Deja de molestarme.\n", + /* 41*/ "。Debemos darnos prisa!\n", + /* 42*/ "Oh, no... demasiado tarde.\n", + /* 43*/ "Ella est aqu...\n", + /* 44*/ "。Cogedla!\n", + /* 45*/ "Objeto crtico de la misin destruido. \n", + /* 46*/ "Obt駭 la C疥ara Espa.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "C疥ara Espa\n", + /* 49*/ "Una C疥ara Espa\n", + /* 50*/ "C疥ara Espa obtenida.\n", + /* 51*/ "Han cerrado la planta baja. \n。Ve al ascensor!\n", + /* 52*/ "。Necesitamos acabar con ese helicptero, \no derribar la nave de escape!\n", + /* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n", + /* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n", + /* 55*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 56*/ "Guarda:\n", + /* 57*/ "Llave de la oficina\n", + /* 58*/ "Llave magn騁ica de la oficina\n", + /* 59*/ "Llave magn騁ica de la oficina de Cassandra obtenida.\n", + /* 60*/ "Activa la alarma: 。ella est aqu!\n", + /* 61*/ "。Luces fuera!\n", + /* 62*/ "ソQu dem...?\n", + /* 63*/ "ソVas a alguna parte?\n", + /* 64*/ "ソPuedo hacer algo por ti, anciana?\n", + /* 65*/ "。Devuelve nuestra IA inmediatamente! No sabes \nlo que est疽 haciendo.\n", + /* 66*/ "S lo s. Me largo.\n", + /* 67*/ "。Otra oportunidad! Devu駘velo, y podr疽 \ntrabajar para m.\n", + /* 68*/ "。Lo siento! ソLo pillas?\n", + /* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n", + /* 70*/ "。Ya lo s!\n", + /* 71*/ "Tambi駭 s con qui駭 hablar... \ncon el Sr. Carrington.\n", + /* 72*/ "La puerta del ascensor no funciona en este piso.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ashE.c b/src/files/lang/jap-final/ashE.c similarity index 100% rename from src/files/lang/ashE.c rename to src/files/lang/jap-final/ashE.c diff --git a/src/files/lang/ashJ.c b/src/files/lang/jap-final/ashJ.c similarity index 100% rename from src/files/lang/ashJ.c rename to src/files/lang/jap-final/ashJ.c diff --git a/src/files/lang/ashP.c b/src/files/lang/jap-final/ashP.c similarity index 100% rename from src/files/lang/ashP.c rename to src/files/lang/jap-final/ashP.c diff --git a/src/files/lang/ash_str_f.c b/src/files/lang/jap-final/ash_str_f.c similarity index 100% rename from src/files/lang/ash_str_f.c rename to src/files/lang/jap-final/ash_str_f.c diff --git a/src/files/lang/ash_str_g.c b/src/files/lang/jap-final/ash_str_g.c similarity index 100% rename from src/files/lang/ash_str_g.c rename to src/files/lang/jap-final/ash_str_g.c diff --git a/src/files/lang/ash_str_i.c b/src/files/lang/jap-final/ash_str_i.c similarity index 100% rename from src/files/lang/ash_str_i.c rename to src/files/lang/jap-final/ash_str_i.c diff --git a/src/files/lang/ash_str_s.c b/src/files/lang/jap-final/ash_str_s.c similarity index 100% rename from src/files/lang/ash_str_s.c rename to src/files/lang/jap-final/ash_str_s.c diff --git a/src/files/lang/ateE.c b/src/files/lang/jap-final/ateE.c similarity index 100% rename from src/files/lang/ateE.c rename to src/files/lang/jap-final/ateE.c diff --git a/src/files/lang/jap-final/ateJ.c b/src/files/lang/jap-final/ateJ.c new file mode 100644 index 000000000..848667c89 --- /dev/null +++ b/src/files/lang/jap-final/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nテ√∵くΒメ窶ワ縺ヘ∃≫ツΓΔメロフマ縺クほヌツ\n\n|ヨヒマ縲マセ\n\nぉメΕい∈Ζ⇔⊇≫=ヘミマ艢ツ縲d蛟マ♭Η∨ュ⇔メΘΙ∈Κ∩ナ⇔÷窶ワ縺マ宦痺ゥ∋♭チ√ツさざ∈⊇メ≫ツ\n\n|しじ操セ♂d゚≧ムマメiヮワ∈ほヌ\n\n♂d゚≧ムマメiヮワメロフマ縺クほニメÅツロフマ縺メ℃モΜΝΞÅ∵<ュΠモΡΣÅツ\n\n|しじ逐セ≠ヘ艢レマ∈ほヌ\n\nヵΞモ≠」う♭縲ハ£メΤΥメ≠ヘ艢レマメロフマ縺諠ウみÅツルム瘁モぐ√∨ルマ°ハ繧「b∈ぷ¬<ュΠナ⇔⊇≫wメあΧ∈⇒チメ∵ΗΧÅツΨ∈⇒ツ∽ツ\n\n|しじ凍セ縲マ縲ムdワ縲マ∈ほヌ\n\nΩキメモd縺クほニメÅツテメロフマ縺モ<クケマみコ⊇ΦみÅツテテ∈ラミ♭タ√†=ワ⊂が⌒サ√≫⌒メモシ⊇Å∽⊂ツ\n\nEND\n", + /* 1*/ "レdマ゚d\n", + /* 2*/ "|ワ竄пbhセ\n\nテ√∵くΒメ窶ワ縺ヘ∃≫ツΓΔメロフマ縺クほヌツ\n\n|ヨヒマ縲マセ\n\nぉメΕい∈Ζ⇔⊇≫=ヘミマ艢ツ縲d蛟マ♭Η∨ュ⇔メΘΙ∈Κ∩ナ⇔÷窶ワ縺マ宦痺ゥ∋♭チ√ツさざ∈⊇メ≫ツ\n\n|しじ操セ♂d゚≧ムマメiヮワ∈ほヌ\n\n♂d゚≧ムマメiヮワメロフマ縺クほニメÅツロフマ縺メ℃モΜΝΞÅ∵<ュΠモΡΣÅツ\n\n|しじ逐セ≠ヘ艢レマ∈ほヌ\n\nヵΞモ≠」う♭縲ハ£メΤΥメ≠ヘ艢レマメロフマ縺諠ウみÅツルム瘁モぐ√∨ルマ°ハ繧「b∈ぷ¬<ュΠナ⇔⊇≫wメあΧ∈⇒チメ∵ΗΧÅツΨ∈⇒ツ∽ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nテ√∵くΒメ窶ワ縺ヘ∃≫ツΓΔメロフマ縺クほヌツ\n\n|ヨヒマ縲マセ\n\nぉメΕい∈Ζ⇔⊇≫=ヘミマ艢ツ縲d蛟マ♭Η∨ュ⇔メΘΙ∈Κ∩ナ⇔÷窶ワ縺マ宦痺ゥ∋♭チ√ツさざ∈⊇メ≫ツ\n\n|しじ操セ♂d゚≧ムマメiヮワ∈ほヌ\n\n♂d゚≧ムマメiヮワメロフマ縺クほニメÅツロフマ縺メ℃モΜΝΞÅ∵<ュΠモΡΣÅツ\n\nEND\n", + /* 4*/ "♂d゚≧ムマメiヮワ∈ほヌ\n", + /* 5*/ "≠ヘ艢レマ∈ほヌ\n", + /* 6*/ "縲マ縲ムdワ縲マ∈ほヌ\n", + /* 7*/ "スr\n", + /* 8*/ "w∈ほヌ\n", + /* 9*/ "ィ、エ盾ァメセ¬Åエ\n", + /* 10*/ "ィ、エ盾ァメセ¬Åエ\n", + /* 11*/ "ィ、エ盾ァメセ¬Åエ\n", + /* 12*/ "wメ℃セモd≠ネマ縲ムムd≠dЫn", + /* 13*/ "wメ℃セミ♀°マワ縲ム閧оЫn", + /* 14*/ "wメ℃セ$dネラ縲ム驍п橿Ыn", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ateP.c b/src/files/lang/jap-final/ateP.c similarity index 100% rename from src/files/lang/ateP.c rename to src/files/lang/jap-final/ateP.c diff --git a/src/files/lang/jap-final/ate_str_f.c b/src/files/lang/jap-final/ate_str_f.c new file mode 100644 index 000000000..532da82cf --- /dev/null +++ b/src/files/lang/jap-final/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez bout de la r駱lique de Jonathan Dark, le meilleur 駘駑ent de l'Institut en mati鑽e de test holographique. Il poss鐡e de grandes et surprenantes capacit駸 au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent exp駻iment du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez 黎re fi鑽e de vos prouesses.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez bout de la r駱lique de Jonathan Dark, le meilleur 駘駑ent de l'Institut en mati鑽e de test holographique. Il poss鐡e de grandes et surprenantes capacit駸 au combat.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\nFIN\n", + /* 4*/ "Vaincre le garde dataDyne\n", + /* 5*/ "Vaincre Jonathan Dark\n", + /* 6*/ "Vaincre Trent Easton\n", + /* 7*/ "LE DUEL\n", + /* 8*/ "Vaincre votre adversaire.\n", + /* 9*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 10*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 11*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 12*/ "Niveau adverse: AGENT\n", + /* 13*/ "Niveau adverse: AGENT SPECIAL\n", + /* 14*/ "Niveau adverse: AGENT PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/ate_str_g.c b/src/files/lang/jap-final/ate_str_g.c new file mode 100644 index 000000000..7eafe8c92 --- /dev/null +++ b/src/files/lang/jap-final/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfgt ber gute Kampff臧igkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu berraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines 舫゚erst gef臧rlichen Regierungsagenten. Der Simulant ist ein berdurchschnittlich erfahrener K舂pfer. Wenn Sie diesen Test bestehen, drfen Sie zu Recht stolz auf sich sein.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfgt ber gute Kampff臧igkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu berraschen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\nENDE\n", + /* 4*/ "Besiegen Sie die dataDyne-Wache!\n", + /* 5*/ "Besiegen Sie Jonathan Dark!\n", + /* 6*/ "Besiegen Sie Trent Easton!\n", + /* 7*/ "DAS DUELL\n", + /* 8*/ "Besiegen Sie Ihren Gegner!\n", + /* 9*/ "Sie waren zu schnell fr ihn!\n", + /* 10*/ "Sie waren zu schnell fr ihn!\n", + /* 11*/ "Sie waren zu schnell fr ihn!\n", + /* 12*/ "Schwierigkeitsgrad: AGENT\n", + /* 13*/ "Schwierigkeitsgrad: SPEZIALAGENT\n", + /* 14*/ "Schwierigkeitsgrad: PERFEKTER AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/ate_str_i.c b/src/files/lang/jap-final/ate_str_i.c new file mode 100644 index 000000000..a8db21ab9 --- /dev/null +++ b/src/files/lang/jap-final/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacit di combattimento ed in grado di mettere in difficolt anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacit di combattimento ed in grado di mettere in difficolt anche combattenti affermati.\n\nFINE\n ", + /* 3*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ", + /* 4*/ "Sconfiggi la guardia dataDyne \n", + /* 5*/ "Sconfiggi Jonathan Dark \n", + /* 6*/ "Sconfiggi Trent Easton \n", + /* 7*/ "IL DUELLO\n", + /* 8*/ "Sconfiggi l'avversario.\n", + /* 9*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 10*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 11*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 12*/ "Livello abilit avversario: AGENTE\n", + /* 13*/ "Livello abilit avversario: AGENTE SPECIALE\n", + /* 14*/ "Livello abilit avversario: AGENTE PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/ate_str_s.c b/src/files/lang/jap-final/ate_str_s.c new file mode 100644 index 000000000..77a8a0666 --- /dev/null +++ b/src/files/lang/jap-final/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulacin de Jonathan Dark, actual poseedor del r馗ord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulacin de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podr疽 estar orgullosa de tu logro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulacin de Jonathan Dark, actual poseedor del r馗ord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n", + /* 4*/ "Derrotar al guardi疣 de dataDyne\n", + /* 5*/ "Derrotar a Jonathan Dark\n", + /* 6*/ "Derrotar a Trent Easton\n", + /* 7*/ "EL DUELO\n", + /* 8*/ "Derrota a tu oponente.\n", + /* 9*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 10*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 11*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 12*/ "Nivel del oponente: AGENTE\n", + /* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n", + /* 14*/ "Nivel del oponente: AGENTE PERFECTO\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/aztE.c b/src/files/lang/jap-final/aztE.c similarity index 100% rename from src/files/lang/aztE.c rename to src/files/lang/jap-final/aztE.c diff --git a/src/files/lang/jap-final/aztJ.c b/src/files/lang/jap-final/aztJ.c new file mode 100644 index 000000000..a58cb47d8 --- /dev/null +++ b/src/files/lang/jap-final/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nモ′ワメスげメαbメβ÷刀ヒメγぼδ∵ミワユヒε♭ζηナ∨ツθικメぼぶモ∝∩エ⇔⊇∃⊇ツリ∨≠アごλμ∵コチなヌ≒√⇔⊇≫∨⊥≠艪メおνy∵ξぺοリ∈なに♭タ∃⊇♭⊇≫メÅツ\n\n|ヨヒマ縲マセ\n\n≠ヘミマ艢<ヘンπ♭ゆeメρΖみσモ=テメcぶτ∃窶ヨワ縲ハンd≠ロワ窶ÅツÅツぉ∵こごλμメなΖυ∈宦痰チテ∀∵♭タ√†≠艪モοリ∈せどナ<ヒツ∈え≫テ∀∵♭タ≫ツナ∩ナ<ニικ∈なにナ=ネメφュ∈せぜニ≫テ∀∵<浮メく⌒χャ∃しじÅツ\n\n|しじ操セθικ蛟゚d∈ぴψヌ≡\n\nテメはuモ⊃θικメωラリル∀マラナ⇔∪≪=テ√♭ぽメωラリル∈烙ネハラニ≫テ∀∵♭タ≫ツθικメφュ∈せどニ≫∨⊥マョャÅツ\n\n|しじ逐セャィャΖレ∈なΖヌ≡\n\nゆeメおνy∵ぼてナ∂ニ⊇≡⊂マ≠桙氈楳ハ♀∈宴ロナ⇔ャィャΖレ∈なΖトヌ⇔∪チメÅツこごλμ∈ュマ宦痰チリ♭モ⊆リ≪ワン∵∃⊇∩⌒ナ√∃⊇∵ツ\n\n|しじ凍セこごλμメなΖυ∈ばぱヌ≡\n\n゙゚い∃なΖはu∩≒=テメモミckマを≪ナ√∃⊇ラ♪メこごλμ∵焉繧氈フ⊇≫ツヒεマ⊇≫ゆeメγぼoy≡≪⌒≠ヒマ⊇≫ぉメぶ∵痺竅マなΖυ∈⇒タ∀⊥≫テ∀∵♭タ≫♭⊆∽⊂ツなに繝艢<蛛ハマ∧メなΖυ∈ばぱニ≫メÅツテ√♭ゆeメおνy∵ぉ∨¬メ諠潟轣ク⇒タ∀⊥<ヒツマユ∩⊃≫モÅツ\n\n|しじ楳セθικメラdマ∈ほヌ\n\nθικ蛟゚dマモ秩ヒメΚ驛黹∵せど♭タ≫ツ⇒リ≪<ニικメラdマ∵∧メ≪マ⊇≫∀⊇⊂テ∀マ∃≫ツ蛟ン閨クにばエ⇔ほニメÅツ\n\n|しじ斧セθικ∈なにナおνヌ≡\n\nテ√モく⌒゙⊇£ムヤ窶ニメしじÅツθικメφュモ≠ェ≡≪⌒ぐけト√≫ツぉモおy∵ニ≫∩<∵ュマ≫リ♭θικ∈d♀ナ∃チ⇔モ∃≒∃⊇ツ\n\nEND\n", + /* 1*/ "ξぺοリ\n", + /* 2*/ "|ワ竄пbhセ\n\nモ′ワメスげメαbメβ÷刀ヒメγぼδ∵ミワユヒε♭ζηナ∨ツθικメぼぶモ∝∩エ⇔⊇∃⊇ツリ∨≠アごλμ∵コチなヌ≒√⇔⊇≫∨⊥≠艪メおνy∵ξぺοリ∈なに♭タ∃⊇♭⊇≫メÅツ\n\n|ヨヒマ縲マセ\n\n≠ヘミマ艢<ヘンπ♭ゆeメρΖみσモ=テメcぶτ∃窶ヨワ縲ハンd≠ロワ窶ÅツÅツぉ∵こごλμメなΖυ∈宦痰チテ∀∵♭タ√†≠艪モοリ∈せどナ<ヒツ∈え≫テ∀∵♭タ≫ツナ∩ナ<ニικ∈なにナ=ネメφュ∈せぜニ≫テ∀∵<浮メく⌒χャ∃しじÅツ\n\n|しじ操セθικ蛟゚d∈ぴψヌ≡\n\nテメはuモ⊃θικメωラリル∀マラナ⇔∪≪=テ√♭ぽメωラリル∈烙ネハラニ≫テ∀∵♭タ≫ツθικメφュ∈せどニ≫∨⊥マョャÅツ\n\n|しじ逐セャィャΖレ∈なΖヌ≡\n\nゆeメおνy∵ぼてナ∂ニ⊇≡⊂マ≠桙氈楳ハ♀∈宴ロナ⇔ャィャΖレ∈なΖトヌ⇔∪チメÅツこごλμ∈ュマ宦痰チリ♭モ⊆リ≪ワン∵∃⊇∩⌒ナ√∃⊇∵ツ\n\n|しじ凍セθικメラdマ∈ほヌ\n\nθικ蛟゚dマモ秩ヒメΚ驛黹∵せど♭タ≫ツ⇒リ≪<ニικメラdマ∵∧メ≪マ⊇≫∀⊇⊂テ∀マ∃≫ツ蛟ン閨クにばエ⇔ほニメÅツ\n\n|しじ楳セθικ∈なにナおνヌ≡\n\nテ√モく⌒゙⊇£ムヤ窶ニメしじÅツθικメφュモ≠ェ≡≪⌒ぐけト√≫ツぉモおy∵ニ≫∩<∵ュマ≫リ♭θικ∈d♀ナ∃チ⇔モ∃≒∃⊇ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nモ′ワメスげメαbメβ÷刀ヒメγぼδ∵ミワユヒε♭ζηナ∨ツθικメぼぶモ∝∩エ⇔⊇∃⊇ツリ∨≠アごλμ∵コチなヌ≒√⇔⊇≫∨⊥≠艪メおνy∵ξぺοリ∈なに♭タ∃⊇♭⊇≫メÅツ\n\n|ヨヒマ縲マセ\n\n≠ヘミマ艢<ヘンπ♭ゆeメρΖみσモ=テメcぶτ∃窶ヨワ縲ハンd≠ロワ窶ÅツÅツぉ∵こごλμメなΖυ∈宦痰チテ∀∵♭タ√†≠艪モοリ∈せどナ<ヒツ∈え≫テ∀∵♭タ≫ツナ∩ナ<ニικ∈なにナ=ネメφュ∈せぜニ≫テ∀∵<浮メく⌒χャ∃しじÅツ\n\n|しじ操セャィャΖレ∈なΖヌ≡\n\nゆeメおνy∵ぼてナ∂ニ⊇≡⊂マ≠桙氈楳ハ♀∈宴ロナ⇔ャィャΖレ∈なΖトヌ⇔∪チメÅツこごλμ∈ュマ宦痰チリ♭モ⊆リ≪ワン∵∃⊇∩⌒ナ√∃⊇∵ツ\n\n|しじ逐セθικメラdマ∈ほヌ\n\nθικ蛟゚dマモ秩ヒメΚ驛黹∵せど♭タ≫ツ⇒リ≪<ニικメラdマ∵∧メ≪マ⊇≫∀⊇⊂テ∀マ∃≫ツ蛟ン閨クにばエ⇔ほニメÅツ\n\n|しじ凍セθικ∈なにナおνヌ≡\n\nテ√モく⌒゙⊇£ムヤ窶ニメしじÅツθικメφュモ≠ェ≡≪⌒ぐけト√≫ツぉモおy∵ニ≫∩<∵ュマ≫リ♭θικ∈d♀ナ∃チ⇔モ∃≒∃⊇ツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "θικ蛟゚d∈ぴψヌ≡\n", + /* 6*/ "ャィャΖレ∈なΖヌ≡\n", + /* 7*/ "こごλμメなΖυ∈ばぱヌ≡\n", + /* 8*/ "θικメラdマ∈ほヌ\n", + /* 9*/ "θικ∈なにナおνヌ≡\n", + /* 10*/ "⊆√モ桙氈楳ハ♀Å∝エ\n", + /* 11*/ "ャィャΖレメなΖはu∵mマ⊆≫モÅ∝ツ\n", + /* 12*/ "こごλμモ死潤コメ∩≒ぁ⇔⊇≫メムツ\n", + /* 13*/ "モ′ワ死盾ロ∵θικメほ∈に⇔チ√≫∝ムツ\n", + /* 14*/ "ャィャΖレメなΖ\n", + /* 15*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "θικ蛟゚d\n", + /* 20*/ "θικ蛟゚d∈みマ√∨\n", + /* 21*/ "こごλμメなΖυ∵ばぱト√∨\n", + /* 22*/ "θικ∵ほト√∨\n", + /* 23*/ "θικメラdマ∵ほ√∨\n", + /* 24*/ "ミ°<ニικエ\n", + /* 25*/ "θικ∵おぁト√∨\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "艢ム縲ミム\n", + /* 29*/ "艢ム縲ミム\n", + /* 30*/ "艢ム縲ミム∈みマ√∨\n", + /* 31*/ "テ√∈ぷエ⇔⊇チ∀⊇⊇=タエ∀マ⇒≡エ\n", + /* 32*/ "メヌヌ蚕n", + /* 33*/ "ミナナ÷メヌヌ蚕n", + /* 34*/ "モd≠ネマ縲≧dラ<ヌ≡エ\n", + /* 35*/ "テ⊃≫∩÷モd≠ネマ縲≧dラエ\n", + /* 36*/ "テ¬≒モd≠ネマ縲≧dラ蚕n", + /* 37*/ "モd≠ネマ縲≧dラ<ヌ≡エ\n", + /* 38*/ "ρΖ∵こごト√⇔⊇≫ル∨⊇蚕nぞチマが∩⊆≫メ∩ナ≒ツ\n", + /* 39*/ "モ′ワモシп∩ナ≒蚕n∧⊂∧⊂<ニικ∈оト∃タオツ\n", + /* 40*/ "рсモ♪⊂タ純ニικツ\n", + /* 41*/ "∩∃≪ロマ∃エ∨≡ツ\nナ∩ナ縲マ縺ロ蚕np瘁諢фх♭⊆≫テ∀モ\n掾ソ≒Ψ♯⊇⇔⊇∨∵=テテリ♭∀モ蚕n", + /* 42*/ "縲マ縺ノ¬∵ョげマ∃エ⇔⊇≫\n%≠ハラ逐∀モが∃メタ\n", + /* 43*/ "ΩキメчшощъÅツ\npくчш♭ыьロэ∵ぼ⊃≫\nюя窒メメÅツ\np⊇エ∨⊇瘁焉モが∵翼ム∃∋Åタ\n", + /* 44*/ "縲マ縺ク>、⊇⇒⊥∃タオツ\n♭⌒=テマ⊇≫メ∩ナ≒蚕n", + /* 45*/ "縲マ縲=リ∨ナチエ∨∃エ\n∪掾メ≡⊂∃瘁マ=ワモ∂ヨモシ⊇ツ\n", + /* 46*/ "∂エ⇔ル∂∵√=テメ刋噫dエ\n", + /* 47*/ "ァィエエエエ\n", +}; diff --git a/src/files/lang/jap-final/aztP.c b/src/files/lang/jap-final/aztP.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/jap-final/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_f.c b/src/files/lang/jap-final/azt_str_f.c new file mode 100644 index 000000000..cd43a5d4f --- /dev/null +++ b/src/files/lang/jap-final/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - R馗up駻er scanner m馘ical pr駸identiel\n\nCet appareil actualise en permanence le journal m馘ical du Pr駸ident et lui assure un 騁at de sant stable. Trouvez-le pour garder le Pr駸ident en bonne sant.\n\n|Objectif 2: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin mais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - D駸activer appareil brouillage\n\nUn syst鑪e ennemi sophistiqu inonde le secteur d'un brouillage CME imp駭騁rable. Vous pourrez d騁erminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouv, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 5: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 1*/ "SITE du CRASH\n", + /* 2*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - R馗up駻er scanner m馘ical pr駸identiel\n\nCet appareil actualise en permanence le journal m馘ical du Pr駸ident et lui assure un 騁at de sant stable. Trouvez-le pour garder le Pr駸ident en bonne sant.\n\n|Objectif 2: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin mais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 4: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin mais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 3: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R馗up駻er scanner m馘ical pr駸identiel\n", + /* 6*/ "Activer le signal de d騁resse\n", + /* 7*/ "D駸activer appareil brouillage\n", + /* 8*/ "Eliminer le clone du Pr駸ident\n", + /* 9*/ "Trouver et sauver le Pr駸ident\n", + /* 10*/ "Voil le point d'騅acuation. \n", + /* 11*/ "Le signal peut venir de l. \n", + /* 12*/ "Le brouillage... Il vient de ce vaisseau. \n", + /* 13*/ "Elvis... Il pourra prot馮er le Pr駸ident.\n", + /* 14*/ "Signal de d騁resse activ.\n", + /* 15*/ "Objet crucial d騁ruit.\n", + /* 16*/ "Obtenir le scanner pr駸identiel.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Scanner pr駸identiel\n", + /* 20*/ "Scanner pr駸identiel obtenu.\n", + /* 21*/ "Appareil de brouillage d駸activ.\n", + /* 22*/ "Le Pr駸ident a 騁 abattu.\n", + /* 23*/ "Clone pr駸identiel 駘imin.\n", + /* 24*/ "Vous ne pourrez pas le sauver!\n", + /* 25*/ "Pr駸ident sauv.\n", + /* 26*/ "Obtenir Vue nocturne.\n", + /* 27*/ "Cassandra De Vries: \n", + /* 28*/ "Vue nocturne\n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne obtenue.\n", + /* 31*/ "Prends ceci. Cela te sera utile!\n", + /* 32*/ "Ahhh... oohhhh...\n", + /* 33*/ "Ahhh... ohh... ouuuuhhh...\n", + /* 34*/ "Agent Dark! Quel est votre statut?\n", + /* 35*/ "Perfect Dark, r駱ondez!\n", + /* 36*/ "A-agent Dark au rapport...\n", + /* 37*/ "Agent Dark! Parlez bon sang!\n", + /* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-黎re de l'autre appareil.\n", + /* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne sant. Sans oublier le Pr駸ident...\n", + /* 40*/ "Comment vous sentez-vous, M. le Pr駸ident?\n", + /* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journ馥. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n", + /* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n", + /* 43*/ "Un vaisseau de recherche sous-marin du gouvernement am駻icain. Un mod鑞e unique pouvant mener des exp駻iences de grandes profondeurs. Trent a formul une demande de pr黎 au nom de la dataDyne Corporation. J'ai refus.\n", + /* 44*/ "Trent devra r駱ondre de ses actes. Encore faut-il le trouver.\n", + /* 45*/ "Vous avez 馗hou, Easton. Vous 黎es un 駘駑ent corrompu. Nous nous passerons de vous.\n", + /* 46*/ "C'est 軋 oui. P騁asse su馘oise, va!\n", + /* 47*/ "Noooooooon!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_g.c b/src/files/lang/jap-final/azt_str_g.c new file mode 100644 index 000000000..948911bfc --- /dev/null +++ b/src/files/lang/jap-final/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Pr舖identen!\n\nDieses Ger舩 zeichnet st舅dig die medizinischen Daten des Pr舖identen auf. Mit seiner Hilfe knnen Sie Daten ber den Gesundheitszustand des Pr舖identen abrufen. Um sicherzustellen, dass er unversehrt bleibt, bentigen Sie dieses Ger舩 auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Deaktivieren Sie den ECM-Generator!\n\nEin High-Tech ECM-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des D舂pfungs-Signals ausfindig zu machen, als unsere Luft-Aufkl舐er. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann knnen wir Sie orten und Ihnen zu Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 1*/ "ABSTURZSTELLE\n", + /* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Pr舖identen!\n\nDieses Ger舩 zeichnet st舅dig die medizinischen Daten des Pr舖identen auf. Mit seiner Hilfe knnen Sie Daten ber den Gesundheitszustand des Pr舖identen abrufen. Um sicherzustellen, dass er unversehrt bleibt, bentigen Sie dieses Ger舩 auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|2. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden Sie den medizinischen Scanner!\n", + /* 6*/ "Aktivieren Sie das Notsignal!\n", + /* 7*/ "Deaktivieren Sie den Generator!\n", + /* 8*/ "Eliminieren Sie den Pr舖identen-Klon!\n", + /* 9*/ "Orten und retten Sie den Pr舖identen!\n", + /* 10*/ "Ich habe die Rettungskapsel gefunden.\n", + /* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n", + /* 12*/ "Das D舂pfungsfeld... Es wird von diesem Schiff aus generiert.\n", + /* 13*/ "Elvis... Er ist sicher in der Lage, den Pr舖identen zu beschtzen.\n", + /* 14*/ "Notsignal wurde aktiviert.\n", + /* 15*/ "Wichtiges Objekt zerstrt\n", + /* 16*/ "Finden Sie den medizinischen Scanner!\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Ein medizinischer Scanner\n", + /* 20*/ "Medizinischer Scanner aufgenommen\n", + /* 21*/ "ECM-Generator deaktiviert\n", + /* 22*/ ".\n", + /* 23*/ "Pr舖identen-Klon wurde eliminiert.\n", + /* 24*/ "Du kannst ihn nicht retten!\n", + /* 25*/ "Der Pr舖ident wurde gerettet.\n", + /* 26*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 27*/ "Cassandra De Vries\n", + /* 28*/ "Nachtsichtger舩\n", + /* 29*/ "Nachtsichtger舩\n", + /* 30*/ "Nachtsichtger舩 aufgenommen\n", + /* 31*/ "Nimm das; es wird sich als ntzlich erweisen!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... ouuu...\n", + /* 34*/ "Agent Dark! Bitte melden Sie sich!\n", + /* 35*/ "Perfect Dark, kommen!\n", + /* 36*/ "A-Agent Dark hier...\n", + /* 37*/ "Agent Dark! Bitte antworten Sie!\n", + /* 38*/ "Diese Frequenz wird gestrt... Das Signal kommt von dort drben.\n", + /* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Pr舖identen retten.\n", + /* 40*/ "Wie fhlen Sie sich, Mr. President?\n", + /* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n", + /* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n", + /* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n", + /* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n", + /* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht l舅ger von Nutzen.\n", + /* 46*/ "Versuch's nur, du skandinavischer Freak!\n", + /* 47*/ "Neiiiiiiiin!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_i.c b/src/files/lang/jap-final/azt_str_i.c new file mode 100644 index 000000000..d09b617ee --- /dev/null +++ b/src/files/lang/jap-final/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere pi facile localizzarla e disattivarla. Fatto ci potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 1*/ "LUOGO DEL DISASTRO\n", + /* 2*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Recupera scanner medico del Presidente\n", + /* 6*/ "Attiva il segnale di pericolo\n", + /* 7*/ "Disattiva il dispositivo di disturbo\n", + /* 8*/ "Trova ed elimina il clone del Presidente\n", + /* 9*/ "Trova e salva il Presidente\n", + /* 10*/ "Ecco la capsula di salvataggio!\n", + /* 11*/ "Forse si pu mandare un segnale da l!\n", + /* 12*/ "Queste onde... Vengono da quella navicella!\n", + /* 13*/ "Elvis... Pu proteggere lui il Presidente.\n", + /* 14*/ "Inviato segnale di pericolo.\n", + /* 15*/ "Distrutto strumento essenziale alla missione.\n", + /* 16*/ "Procurati scanner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Scanner del Presidente!\n", + /* 20*/ "Preso scanner del Presidente.\n", + /* 21*/ "Disattivato dispositivo per onde di disturbo.\n", + /* 22*/ "Il Presidente stato ucciso.\n", + /* 23*/ "Il clone del Presidente stato eliminato.\n", + /* 24*/ "Non riuscirai mai a salvarlo!\n", + /* 25*/ "Il Presidente stato salvato.\n", + /* 26*/ "Procurati Vista Notturna!\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Vista Notturna\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Presa Vista Notturna.\n", + /* 31*/ "Ecco, tieni: ti sar utile!\n", + /* 32*/ "Aaah... uuuh...\n", + /* 33*/ "Aaah... uuuh... oooh...\n", + /* 34*/ "Agente Dark! A rapporto!\n", + /* 35*/ "Perfect Dark, rispondi!\n", + /* 36*/ "Agente Dark a rapporto, signore!\n", + /* 37*/ "Agente Dark! Rispondi!\n", + /* 38*/ "C' qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n", + /* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n", + /* 40*/ "Come sta, Sig. Presidente?\n", + /* 41*/ "Molto meglio, grazie. Penso che mi ci vorr un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo s che era ambizioso, ma fino a questo punto...\n", + /* 42*/ "Solo una cosa, signore? Cos' il Pelagic II che Trent voleva ad ogni costo?\n", + /* 43*/ "ネ un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondit oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n", + /* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n", + /* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi pi!\n", + /* 46*/ "Provaci, pazzo scandinavo!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_s.c b/src/files/lang/jap-final/azt_str_s.c new file mode 100644 index 000000000..4ae153923 --- /dev/null +++ b/src/files/lang/jap-final/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Recuperar Esc疣er M馘ico del Presidente\n\nEste dispositivo est actualizando constantemente el historial m馘ico del Presidente y es capaz de chequear su estado de salud. Lo necesitar疽 para asegurarte de que est en buenas condiciones.\n\n|Objetivo Dos: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo est inundando el 疵ea con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra m疽 efectivamente de lo que nuestros aviones espa est疣 haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posicin y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 1*/ "LUGAR DEL IMPACTO\n", + /* 2*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Recuperar Esc疣er M馘ico del Presidente\n\nEste dispositivo est actualizando constantemente el historial m馘ico del Presidente y es capaz de chequear su estado de salud. Lo necesitar疽 para asegurarte de que est en buenas condiciones.\n\n|Objetivo Dos: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Recuperar esc疣er m馘ico del Presidente\n", + /* 6*/ "Activar la seal de socorro\n", + /* 7*/ "Apagar la seal de bloqueo enemiga\n", + /* 8*/ "Eliminar al clon del Presidente\n", + /* 9*/ "Localizar y rescatar al Presidente\n", + /* 10*/ "Ah est la c疳sula de escape.\n", + /* 11*/ "Quiz haya un emisor dentro.\n", + /* 12*/ "El bloqueo... Proviene de esa nave.\n", + /* 13*/ "Elvis... ノl ser capaz de proteger al Presidente.\n", + /* 14*/ "Seal de socorro activada.\n", + /* 15*/ "Objeto crtico de la misin destruido.\n", + /* 16*/ "Obt駭 el Esc疣er del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Esc疣er Presidencial\n", + /* 20*/ "Esc疣er Presidencial obtenido.\n", + /* 21*/ "Dispositivo de bloqueo apagado.\n", + /* 22*/ "El Presidente ha muerto.\n", + /* 23*/ "El clon del Presidente ha sido eliminado.\n", + /* 24*/ "。Ahora ya no podr疽 salvarle!\n", + /* 25*/ "El Presidente ha sido rescatado.\n", + /* 26*/ "Obt駭 Visin Nocturna.\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "V. Nocturna\n", + /* 29*/ "Visin Nocturna\n", + /* 30*/ "Visn Nocturna obtenida.\n", + /* 31*/ "Toma esto, 。lo encontrar疽 muy til!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "。Agente Dark! 。Informe, por favor!\n", + /* 35*/ "。Perfect Dark, responda!\n", + /* 36*/ "A-agente Dark informando...\n", + /* 37*/ "。Agente Dark! 。Por favor, responda!\n", + /* 38*/ "Algo est bloqueando mis transmisiones... Proviene de esa otra nave.\n", + /* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis est bien. No olvidando al Presidente, por supuesto.\n", + /* 40*/ "ソCmo se siente, Sr. Presidente?\n", + /* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo as. Saba que era ambicioso, s, pero esto...\n", + /* 42*/ "Slo una cosa, seor. ソQu es el Pelagic II que tanto ansiaba Trent?\n", + /* 43*/ "Es un navo de investigacin de profundidad del gobierno norteamericano, nico en su clase... El nico barco capaz de dirigir una operacin a gran escala a profundidad extrema. Trent quera que se lo prestara a la Corporacin dataDyne, pero rehus.\n", + /* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n", + /* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n", + /* 46*/ "。Int駭talo, mamarracho escandinavo!\n", + /* 47*/ "。。。Noooooooo!!!\n", +}; diff --git a/src/files/lang/catE.c b/src/files/lang/jap-final/catE.c similarity index 100% rename from src/files/lang/catE.c rename to src/files/lang/jap-final/catE.c diff --git a/src/files/lang/catJ.c b/src/files/lang/jap-final/catJ.c similarity index 100% rename from src/files/lang/catJ.c rename to src/files/lang/jap-final/catJ.c diff --git a/src/files/lang/catP.c b/src/files/lang/jap-final/catP.c similarity index 100% rename from src/files/lang/catP.c rename to src/files/lang/jap-final/catP.c diff --git a/src/files/lang/cat_str_f.c b/src/files/lang/jap-final/cat_str_f.c similarity index 100% rename from src/files/lang/cat_str_f.c rename to src/files/lang/jap-final/cat_str_f.c diff --git a/src/files/lang/cat_str_g.c b/src/files/lang/jap-final/cat_str_g.c similarity index 100% rename from src/files/lang/cat_str_g.c rename to src/files/lang/jap-final/cat_str_g.c diff --git a/src/files/lang/cat_str_i.c b/src/files/lang/jap-final/cat_str_i.c similarity index 100% rename from src/files/lang/cat_str_i.c rename to src/files/lang/jap-final/cat_str_i.c diff --git a/src/files/lang/cat_str_s.c b/src/files/lang/jap-final/cat_str_s.c similarity index 100% rename from src/files/lang/cat_str_s.c rename to src/files/lang/jap-final/cat_str_s.c diff --git a/src/files/lang/caveE.c b/src/files/lang/jap-final/caveE.c similarity index 100% rename from src/files/lang/caveE.c rename to src/files/lang/jap-final/caveE.c diff --git a/src/files/lang/jap-final/caveJ.c b/src/files/lang/jap-final/caveJ.c new file mode 100644 index 000000000..e1dafa37b --- /dev/null +++ b/src/files/lang/jap-final/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nロユ÷メd窶ニママ⊇∨ノ⊇宦メ怐モ>揆桷氛┌┐メ縲マ縲ムdワ縲マÅツ瘁モθικメшv┘└メ├ヮメ∨⊥マミワユメε┬┤xヨ∀┴てナ⇔⊇≫ツ⊆メンメd窶ニママ≡√†÷瘁焉モテテ∩≒θικヨメあ┼∃てタ∈ワ゚d縺トヌ≫⌒メ∀━∝√≫ツ∧√∈┃┏ヌム†∃≒∃⊇ツ\n\n|ヨヒマ縲マセ\n\nヵぴモ┓マ┛Χ∵ョャÅ=ヘミマ艢ツε┬┤xマモ÷縲マ縺ノ¬メу┗マモがメ揆ー⌒∃⊇┳⌒∨チト∋凵サ⇔⊇≫ツ⊆チリ♭⌒縲マ縺メ┫ぞ∀÷d窶ニママ⊇∨あΨ┻∃刋噪怐ツ∵<浮メメ╋τÅツ♭タ≫Åツ┠チぬはナ⇔⊇∨ぶ∵<ア┯メぃい゚モ゙チ∃≫Å∽⊂ツ\n\n|しじ操セワ烙フd♂ワマぬはヌ≡\n\n┨┷ぁなニ≫θικ┿ヨδメワ烙フd♂ワ∵=リ⌒∃チリd″ユd♭∧¬≒マニ≫ツぽまメ°ハメmマモ蛟ノd∵⊆≫モÅツぽま∀∧メd♀ママモ┝エ⇔⌒≒⊇÷蛟ノd∈みナ=ネ√♭ぬはナ⇔┤xヨ≫メÅツぽま∨¬モ縲マ縺メу┗∀モがメ揆ー⌒∃⊇┳∨¬∃メ♭=チ√∬√⌒も♭べエ∨≪ナ∃⊇≡⊂マツ\n\n|しじ逐セはヮ┰∈┥ルっ⊥\n\nの┸∃♪メ╂ナ⊇ぷ¬Σ♭ぉメぬは∵にば≒√∃⊇≡⊂マ≠ヘヮ┰∈∃≫チレチき∩≒vナ⇔≠ンソΣ┥ルっルヨメルマ℃ミマメヌ≫メÅツ∀≪⊆⊃≠ヘヮ┰∈ψチ♭タ≫リdワ∈ト∵ニョャ∵⊆≫∃ツ\n\n|しじ凍セみソΣツщロワ窶∈磨綵n\nぬはマ≡≪┳モÅリニテ∀∵♭タ≫Å∽⊂∵ソΣマモメテ∵ョャ∀∃≫ツぉメトツ∨はヮ┰∩≒の┸∃♪∵оナト√√†=ニ∬マミd∵∃≪>ァxモハラト√⇔ナリ⊂♭⊆∽⊂ツみソΣツщロワ窶メワムハ焉クなにナ=テ√∈ィ麾氈マヌ≡ツ\n\n|しじ楳セム縲£マ∈みヌ≡\n\nθικ┿ヨδメニヌネずノ∵┤xメ刋ハマぜるト√⇔⊇≫ツぉ∵テ√∈みニ√†÷ム=∀⊇⊂∀タマ=ネメ♂d゚∈⌒∀マモ′ワ∈∧¬≒マユ∩∝ヌ≫テ∀∵♭タ≫ツ\n\n|しじ斧セθικ┿ヨδマヒぢヌ≡\n\nθικ┿ヨδメフヘマ≠タ≪ム√∃⊇≡⊂マニ≫メÅツぬはメワン∵リÅ痺ワ♭⊆√†÷ロヒ縲∈エ⇔ヒぢ♭タ≫モÅツ∧√∵≧∃リホモ≠ェ∩メぶマ∈ミ⊃≫ョャ∵⊆≫Å∽⊂ツ\n\nEND\n", + /* 1*/ "θικ┿ヨδ゚d艢準ミワユε┬┤x十n", + /* 2*/ "|ワ竄пbhセ\n\nロユ÷メd窶ニママ⊇∨ノ⊇宦メ怐モ>揆桷氛┌┐メ縲マ縲ムdワ縲マÅツ瘁モθικメшv┘└メ├ヮメ∨⊥マミワユメε┬┤xヨ∀┴てナ⇔⊇≫ツ⊆メンメd窶ニママ≡√†÷瘁焉モテテ∩≒θικヨメあ┼∃てタ∈ワ゚d縺トヌ≫⌒メ∀━∝√≫ツ∧√∈┃┏ヌム†∃≒∃⊇ツ\n\n|ヨヒマ縲マセ\n\nヵぴモ┓マ┛Χ∵ョャÅ=ヘミマ艢ツε┬┤xマモ÷縲マ縺ノ¬メу┗マモがメ揆ー⌒∃⊇┳⌒∨チト∋凵サ⇔⊇≫ツ⊆チリ♭⌒縲マ縺メ┫ぞ∀÷d窶ニママ⊇∨あΨ┻∃刋噪怐ツ∵<浮メメ╋τÅツ♭タ≫Åツ┠チぬはナ⇔⊇∨ぶ∵<ア┯メぃい゚モ゙チ∃≫Å∽⊂ツ\n\n|しじ操セワ烙フd♂ワマぬはヌ≡\n\n┨┷ぁなニ≫θικ┿ヨδメワ烙フd♂ワ∵=リ⌒∃チリd″ユd♭∧¬≒マニ≫ツぽまメ°ハメmマモ蛟ノd∵⊆≫モÅツぽま∀∧メd♀ママモ┝エ⇔⌒≒⊇÷蛟ノd∈みナ=ネ√♭ぬはナ⇔┤xヨ≫メÅツぽま∨¬モ縲マ縺メу┗∀モがメ揆ー⌒∃⊇┳∨¬∃メ♭=チ√∬√⌒も♭べエ∨≪ナ∃⊇≡⊂マツ\n\n|しじ逐セはヮ┰∈┥ルっ⊥\n\nの┸∃♪メ╂ナ⊇ぷ¬Σ♭ぉメぬは∵にば≒√∃⊇≡⊂マ≠ヘヮ┰∈∃≫チレチき∩≒vナ⇔≠ンソΣ┥ルっルヨメルマ℃ミマメヌ≫メÅツ∀≪⊆⊃≠ヘヮ┰∈ψチ♭タ≫リdワ∈ト∵ニョャ∵⊆≫∃ツ\n\n|しじ凍セみソΣツщロワ窶∈磨綵n\nぬはマ≡≪┳モÅリニテ∀∵♭タ≫Å∽⊂∵ソΣマモメテ∵ョャ∀∃≫ツぉメトツ∨はヮ┰∩≒の┸∃♪∵оナト√√†=ニ∬マミd∵∃≪>ァxモハラト√⇔ナリ⊂♭⊆∽⊂ツみソΣツщロワ窶メワムハ焉クなにナ=テ√∈ィ麾氈マヌ≡ツ\n\n|しじ楳セθικ┿ヨδマヒぢヌ≡\n\nθικ┿ヨδメフヘマ≠タ≪ム√∃⊇≡⊂マニ≫メÅツぬはメワン∵リÅ痺ワ♭⊆√†÷ロヒ縲∈エ⇔ヒぢ♭タ≫モÅツ∧√∵≧∃リホモ≠ェ∩メぶマ∈ミ⊃≫ョャ∵⊆≫Å∽⊂ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nロユ÷メd窶ニママ⊇∨ノ⊇宦メ怐モ>揆桷氛┌┐メ縲マ縲ムdワ縲マÅツ瘁モθικメшv┘└メ├ヮメ∨⊥マミワユメε┬┤xヨ∀┴てナ⇔⊇≫ツ⊆メンメd窶ニママ≡√†÷瘁焉モテテ∩≒θικヨメあ┼∃てタ∈ワ゚d縺トヌ≫⌒メ∀━∝√≫ツ∧√∈┃┏ヌム†∃≒∃⊇ツ\n\n|ヨヒマ縲マセ\n\nヵぴモ┓マ┛Χ∵ョャÅ=ヘミマ艢ツε┬┤xマモ÷縲マ縺ノ¬メу┗マモがメ揆ー⌒∃⊇┳⌒∨チト∋凵サ⇔⊇≫ツ⊆チリ♭⌒縲マ縺メ┫ぞ∀÷d窶ニママ⊇∨あΨ┻∃刋噪怐ツ∵<浮メメ╋τÅツ♭タ≫Åツ┠チぬはナ⇔⊇∨ぶ∵<ア┯メぃい゚モ゙チ∃≫Å∽⊂ツ\n\n|しじ操セワ烙フd♂ワマぬはヌ≡\n\n┨┷ぁなニ≫θικ┿ヨδメワ烙フd♂ワ∵=リ⌒∃チリd″ユd♭∧¬≒マニ≫ツぽまメ°ハメmマモ蛟ノd∵⊆≫モÅツぽま∀∧メd♀ママモ┝エ⇔⌒≒⊇÷蛟ノd∈みナ=ネ√♭ぬはナ⇔┤xヨ≫メÅツぽま∨¬モ縲マ縺メу┗∀モがメ揆ー⌒∃⊇┳∨¬∃メ♭=チ√∬√⌒も♭べエ∨≪ナ∃⊇≡⊂マツ\n\n|しじ逐セみソΣツщロワ窶∈磨綵n\nぬはマ≡≪┳モÅリニテ∀∵♭タ≫Å∽⊂∵みソΣマモメテ∵ョャ∀∃≫ツぉメぷ⇒はヮ┰∩≒の┸∃♪∵оナト√√†=ニ∬マミd∵∃≪>ァxモハラト√⇔ナリ⊂♭⊆∽⊂ツみソΣツщロワ窶メワムハ焉クなにナ=テ√∈ィ麾氈マヌ≡ツ\n\n|しじ凍セθικ┿ヨδマヒぢヌ≡\n\nθικ┿ヨδメフヘマ≠タ≪ム√∃⊇≡⊂マニ≫メÅツぬはメワン∵リÅ痺ワ♭⊆√†÷ロヒ縲∈エ⇔ヒぢ♭タ≫モÅツ∧√∵≧∃リホモ≠ェ∩メぶマ∈ミ⊃≫ョャ∵⊆≫Å∽⊂ツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ワ烙フd♂ワマぬはヌ≡\n", + /* 6*/ "はヮ┰∈┥ルっ⊥\n", + /* 7*/ "みソΣツщロワ窶∈磨綵n", + /* 8*/ "ム縲£マ∈みヌ≡\n", + /* 9*/ "θικ┿ヨδマヒぢヌ≡\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "ミ゚ハロフリdワ\n", + /* 13*/ "ミ゚ハロフリdワ\n", + /* 14*/ "ミ゚ハロフリdワ∈みマ√∨\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "蛟ノd\n", + /* 18*/ "蛟ノd\n", + /* 19*/ "ワ烙フd♂ワメ蛟ノd∈みマ√∨\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "ム縺逐マ\n", + /* 23*/ "ム縺逐マ\n", + /* 24*/ "ム縺逐マ∈みマ√∨\n", + /* 25*/ "ヨヒdエ巡ム≡エ\n", + /* 26*/ "メ┳∵ほト√∨\n", + /* 27*/ "ぽモθモヤタ\n", + /* 28*/ "νツ∈ユ∋♭チ≫\n", + /* 29*/ "テ∋マ¬モツ\n", + /* 30*/ "γぼδヨメぼタぶモ黻ヨナムツ\n", + /* 31*/ "∧メの┸モテテ♭vナ⇔フト⊇ツ\n", + /* 32*/ "が⇔テ∀エエエ\n", + /* 33*/ "の┸∃♪メぷ¬テルモΡ┏ト√⇔⊇リニエ\n", + /* 34*/ "ィ、≠宴祉潤クユ¶∝\n", + /* 35*/ "ロワ窶メロヒハ縺メマラリ\n", + /* 36*/ "みソΣツщロワ窶∵ロヒハ縺メマト√∨\n", + /* 37*/ "の┸∵оナト√∨\n", + /* 38*/ "ミ゚ハロフリdワ∈トツ∨\n", + /* 39*/ "ミ゚ハロフリdワメはヮ┰∵оナト√∨\n", + /* 40*/ "∪⊇=テ≒ツテテモ揆ールv¬≪Ρ┏Åエ\n", + /* 41*/ "∃∋Åタ準ヤモル┳∩タ\n", + /* 42*/ "∪⊇=ネ√モヤメミ゚ハロフリdワÅツ\n", + /* 43*/ "∪掾モiヮワ∈ユ∋♭チ√÷ヤ∵テ⊇⇒メΦみ∈ニ≫蚕n", + /* 44*/ "テ¬≒窒スÅツム∈なにナ∨蚕n", + /* 45*/ "d=dハ♀ロワ窶ヨメミランワ∵レロト√∨\n", + /* 46*/ "d=dハ♀ロワ窶∵ヤd°dd♀ナ∨\n", + /* 47*/ "mメ┳∨¬∵ワチンムマ∃エ∨\n", + /* 48*/ "⊆⊇⇒≒∩≒刋ハ∈ぎエ⇔チ√蚕n", + /* 49*/ "蛟ノd♭ぬはナ∨\n", + /* 50*/ "烙ヒマワÅエ準ワ烙フd♂ワメ°ハ∈\n゚エ⇔÷蛟ノd∈みニ≫メÅツ\n", + /* 51*/ "∧メリdワ∈エ⇔ぉメはヮ┰∈┥ルっ∠メÅ\n", + /* 52*/ "テメミ゚ハロフリdワモ=テメリリ♭モ┏⊥≒√⇔ナリ⊂\n", + /* 53*/ "⊆√∵θικ┿ヨメモミノdワマタ\n━エ∨≡≪焉ト⊇メムツ\n", + /* 54*/ "ミム瘁焉ク┏⊥⇔チ√エ潤タエ∀刋ハ∈へエ⇔≫∋Å蚕n", + /* 55*/ "モd≠ネマ縲≧dラ÷ワ゚マ°ムィ、ツ\n┤xメ÷リd″ユdxπ∈せどツ\n", + /* 56*/ "⊇⊇=ヘミマ艢ツリd″ユdモ\nヵ∧エ¬マユ∩エ⇔⊇≫ツ\npワ烙フd♂ワ∵ぢエ∨メ∈\nゆeメワ$ム∵せどナ∨ツ\npε┬┤xメ繧香ワcÅツ\nチ♪⊇≡⊂Å∵蚕n", + /* 57*/ "┤xメ┳モ<シ揆ー∃メ♭\nべエ¬オ≧∃∋♭ナキツ\np∀テ∽♭>揆桷氈メ瘁焉モ♪⊂∃メタ\n", + /* 58*/ "縲マ縺諱メΝΞメ┳マリ♭\nを怐ク艨ス⇔⊇≫メ∩モあゎÅツ\npÅ∵÷縲マ縺メぞチマ⊇≫繧香モ\nぽメを怐マ蛛蛛エ⇔⊇≫モÅツ\np┿ヨδマぢ≪∞氏メ閼驕戟園ヤ∈\nθικマにヌ≫メÅツ\n", + /* 59*/ "∧ナ⇔<ニικ∈ぎ√エ⇔テ∀ムツ\n縲マ縺メを怐モが∩=蛛ソエ∨タ\np⊆∀=コメd窶ニママ諱ノ\n″マ♀ミdメ怐モがタ\n", + /* 60*/ "リÅメσた∃メ♭≠ゥ⊂メモ\n∂⊥⇔∪テ⊂ツハ♀ハラツ\n", + /* 61*/ "モ℃d゚d┏盾宴死ロワ窶ロてm\n", + /* 62*/ "しじメぼマあぃモ∃┳Σ∵ほト√∨\n", + /* 63*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 64*/ "┤xヨメす\n", + /* 65*/ "騾ム≠ヒハラ∵⊇≫エ\n", + /* 66*/ "みソΣ┥ルっルヨメルマ℃ミ∵┏ナ∨\n", + /* 67*/ "はヮ┰メ┥ルっル∵♭タリヌ∋\n", +}; diff --git a/src/files/lang/jap-final/caveP.c b/src/files/lang/jap-final/caveP.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/jap-final/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_f.c b/src/files/lang/jap-final/cave_str_f.c new file mode 100644 index 000000000..f1707e59d --- /dev/null +++ b/src/files/lang/jap-final/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Ranger l'駲uipement\n\nD饕arrassez-vous de votre 駲uipement le plus tt possible et 騅itez de transporter des objets compromettants. Vous pourrez r馗up駻er votre paquetage une fois bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme se d馗lenchera et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol\n\nLe plan de vol de l'Air Force One est gard dans un coffre de la base. D駻obez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n", + /* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Ranger l'駲uipement\n\nD饕arrassez-vous de votre 駲uipement le plus tt possible et 騅itez de transporter des objets compromettants. Vous pourrez r馗up駻er votre paquetage une fois bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme se d馗lenchera et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme sera donn馥 et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Voler uniforme et entrer dans la base\n", + /* 6*/ "Ranger l'駲uipement\n", + /* 7*/ "Leurrer le syst鑪e de d騁ection\n", + /* 8*/ "Obtenir le plan de vol\n", + /* 9*/ "Monter bord de l'Air Force One\n", + /* 10*/ "Obtenir valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir uniforme d'htesse.\n", + /* 16*/ "\n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme\n", + /* 19*/ "Uniforme d'htesse obtenu.\n", + /* 20*/ "Obtenir plans de vol.\n", + /* 21*/ "\n", + /* 22*/ "Plans de vol\n", + /* 23*/ "Plans de vol\n", + /* 24*/ "Plans de vol obtenus.\n", + /* 25*/ "Attention - un intrus...\n", + /* 26*/ "Civils innocents abattus.\n", + /* 27*/ "Va-t-il bien?\n", + /* 28*/ "Je vais chercher de l'aide.\n", + /* 29*/ "Bonjour. \n", + /* 30*/ "Vous connaissez le chemin.\n", + /* 31*/ "Rangez votre arme, je vous prie. \n", + /* 32*/ "...??? Oh, mon Dieu! \n", + /* 33*/ "Les armes sont interdites dans la base. \n", + /* 34*/ "J'appelle la s馗urit.\n", + /* 35*/ "Coupure syst鑪e initialis馥... \n", + /* 36*/ "Syst鑪es s馗urit coup駸. \n", + /* 37*/ "Armement d騁ect.\n", + /* 38*/ "Valise d駱os馥.\n", + /* 39*/ "Valise scann馥.\n", + /* 40*/ "Vous, l! Cette zone est interdite. \n", + /* 41*/ "Vous 黎es nouvelle ou quoi?\n", + /* 42*/ "H! Ma valise! \n", + /* 43*/ "Appelle la s馗urit... Je m'occupe d'elle.\n", + /* 44*/ "En haut...il y a un intrus.\n", + /* 45*/ "Acc鑚 grilles laser refus.\n", + /* 46*/ "Syst鑪e grilles laser: surcharge.\n", + /* 47*/ "Trop de cibles neutres abattues.\n", + /* 48*/ "Emp鹹hez-les d'avoir le coffre...\n", + /* 49*/ "Costume rev黎u.\n", + /* 50*/ "Vite! Attrapez le sac de l'htesse \net prenez son uniforme.\n", + /* 51*/ "Utilisez cette caisse pour cacher votre 駲uipement. \n", + /* 52*/ "Cette caisse se fera arr黎er si vous n'intervenez pas. \n", + /* 53*/ "C'est 軋 Air Force One, hein? ... C'est assez \npetit en fait.\n", + /* 54*/ "Arr黎ez-les - ils ouvrent le coffre...\n", + /* 55*/ "Agent Dark en position. Je vois l'entr馥 principale de la base. J'aper輟is aussi le point d'arriv馥 du t駘駱h駻ique.\n", + /* 56*/ "Excellent, Joanna. Ce t駘駱h駻ique est votre billet d'entr馥. Notre contact a rep駻 une htesse montant bord il y a une minute. Elle est escort馥 par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n", + /* 57*/ "...qu'ils ne font pas partie de l'op駻ation de Trent et que je ne dois pas les abattre m麥e sous leur feu. Et les agents de la NSA?\n", + /* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis n饌nmoins persuad que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois bord et pr駸entez-les au Pr駸ident.\n", + /* 59*/ "Et le prot馮er de ses ravisseurs. Avez-vous une th駮rie sur les plans de Trent et sur ce type blond?\n", + /* 60*/ "Que de vagues soup輟ns. Concentrez-vous plutt sur la mission. Bonne chance. Carrington, termin.\n", + /* 61*/ "Ascenseur inactif - syst鑪e s馗urit actif.\n", + /* 62*/ "Personnel crucial inutilisable.\n", + /* 63*/ "Objet crucial d騁ruit.\n", + /* 64*/ "Entr馥 de la base s馗uris馥.\n", + /* 65*/ "On s'en charge!!\n", + /* 66*/ "Chariot coup.\n", + /* 67*/ "Equipement ne peut 黎re enregistr.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_g.c b/src/files/lang/jap-final/cave_str_g.c new file mode 100644 index 000000000..e141b3fcf --- /dev/null +++ b/src/files/lang/jap-final/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrstung ein!\n\nSie mssen Ihre Ausrstung so schnell wie mglich loswerden. Vermeiden Sie es, verd臘htig wirkende Gegenst舅de mit sich herumzutragen. Sie knnen wieder auf Ihre Ausrstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst mssen Sie natrlich einen Koffer finden, um die Ausrstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpl舅e aus dem Safe!\n\nDie Route, welche fr die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pl舅e in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamit舩 dient er als Ihre Verst舐kung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 1*/ "PRトSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n", + /* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in Ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrstung ein!\n\nSie mssen Ihre Ausrstung so schnell wie mglich loswerden. Vermeiden Sie es, verd臘htig wirkende Gegenst舅de mit sich herumzutragen. Sie knnen wieder auf Ihre Ausrstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst mssen Sie natrlich einen Koffer finden, um die Ausrstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in Ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Erlangen Sie die Tarnung!\n", + /* 6*/ "Checken Sie Ihre Ausrstung ein!\n", + /* 7*/ "Unterminieren Sie die ワberwachung!\n", + /* 8*/ "Entwenden Sie die Flugpl舅e!\n", + /* 9*/ "Gehen Sie an Bord der Air Force One!\n", + /* 10*/ "Erlangen Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer aufgenommen\n", + /* 15*/ "Erlangen Sie die Uniform!\n", + /* 16*/ "\n", + /* 17*/ "Verkleidung\n", + /* 18*/ "Verkleidung\n", + /* 19*/ "Uniform aufgenommen\n", + /* 20*/ "Entwenden Sie die Flugpl舅e aus dem Safe!\n", + /* 21*/ "\n", + /* 22*/ "Flugpl舅e\n", + /* 23*/ "Flugpl舅e\n", + /* 24*/ "Flugpl舅e aufgenommen\n", + /* 25*/ "Vorsicht - Ein Eindringling...\n", + /* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n", + /* 27*/ "Ist er OK?\n", + /* 28*/ "Ich gehe und hole Hilfe.\n", + /* 29*/ "Schnen guten Tag.\n", + /* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n", + /* 31*/ "Sie mssen Ihre Waffe hier einchecken, Miss.\n", + /* 32*/ "Oh nein!\n", + /* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n", + /* 34*/ "Ich alarmiere die Security.\n", + /* 35*/ "System wird heruntergefahren...\n", + /* 36*/ "ワberwachungssystem wurde deaktiviert.\n", + /* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n", + /* 38*/ "Der Koffer wurde deponiert.\n", + /* 39*/ "Der Koffer wurde gescannt.\n", + /* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n", + /* 41*/ "Sind Sie neu hier?\n", + /* 42*/ "Hey - geben Sie mir meinen Koffer zurck!\n", + /* 43*/ "Du holst die Security - Ich kmmere mich um sie...\n", + /* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n", + /* 45*/ "Zugriff auf die Lasermatrix verweigert\n", + /* 46*/ "Lasermatrix-System wurde berladen!!!\n", + /* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n", + /* 48*/ "Haltet sie vom Safe fern...\n", + /* 49*/ "Verkleidung wurde angelegt.\n", + /* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess! \n", + /* 51*/ "Verbergen Sie Ihre Ausrstung in der Tasche. \n", + /* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n", + /* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n", + /* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n", + /* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n", + /* 56*/ "Ausgezeichnet, Joanna. In der Bahn befindet sich etwas, dass Sie brauchen. Unser Beobachter hat uns mitgeteilt, dass ein Crew-Mitglied vor einer Minute die Bahn betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n", + /* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA-Agenten?\n", + /* 58*/ "Ich wei゚ nicht, wie weit diese Verschwrung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenber absolut loyal sind. Sie mssen einen Beweis gegen Trent erbringen und diesen dem Pr舖identen vorlegen.\n", + /* 59*/ "Und ich soll ihn auch noch beschtzen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten knnte? Und was hat es mit diesen blonden Kerlen auf sich?\n", + /* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glck! Over und out.\n", + /* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n", + /* 62*/ "Wichtige Person eliminiert\n", + /* 63*/ "Wichtiges Objekt zerstrt\n", + /* 64*/ "Eingang wurde gesichert.\n", + /* 65*/ "Wir bernehmen jetzt!!\n", + /* 66*/ "Hover-Trolley wurde abgeschaltet.\n", + /* 67*/ "Ausrstung kann nicht berprft werden.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_i.c b/src/files/lang/jap-final/cave_str_i.c new file mode 100644 index 000000000..fe24377c7 --- /dev/null +++ b/src/files/lang/jap-final/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al pi presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli pi tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n", + /* 2*/ "|Situazione:\n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al pi presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli pi tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Travestiti ed entra nella base\n", + /* 6*/ "Deposita i tuoi strumenti\n", + /* 7*/ "Neutralizza il sistema di sicurezza\n", + /* 8*/ "Prendi i piani di volo dalla cassaforte\n", + /* 9*/ "Sali a bordo dell'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati la divisa dell'hostess.\n", + /* 16*/ "\n", + /* 17*/ "Travestimento\n", + /* 18*/ "Travestimento\n", + /* 19*/ "Presa divisa dell'hostess.\n", + /* 20*/ "Procurati piani di volo.\n", + /* 21*/ "\n", + /* 22*/ "Piani di volo\n", + /* 23*/ "Piani di volo\n", + /* 24*/ "Presi piani di volo.\n", + /* 25*/ "Attenzione! C' un intruso!\n", + /* 26*/ "Sono stati uccisi troppi civili.\n", + /* 27*/ "Sta bene?\n", + /* 28*/ "Vado a cercare aiuto!\n", + /* 29*/ "Buonasera.\n", + /* 30*/ "Bene, la strada la conosce.\n", + /* 31*/ "Si tolga il cinturone, per favore!\n", + /* 32*/ "Oh, per la miseria!\n", + /* 33*/ "Non sono ammesse armi alla base!\n", + /* 34*/ "Bene, chiamer la sicurezza!\n", + /* 35*/ "Chiusura del sistema in corso...\n", + /* 36*/ "Il sistema di sicurezza stato disattivato.\n", + /* 37*/ "Sono state rilevate delle armi.\n", + /* 38*/ "La valigia stata depositata.\n", + /* 39*/ "La valigia stata esaminata.\n", + /* 40*/ "Ehi! L'accesso a quest'area vietato.\n", + /* 41*/ "ネ la prima volta che viene qui?\n", + /* 42*/ "Ehi! Mi restituisca la valigia.\n", + /* 43*/ "Chiami pure la sicurezza: me la vedr io con loro!\n", + /* 44*/ "Di sopra... c' un intruso.\n", + /* 45*/ "Negato l'accesso alla griglia laser.\n", + /* 46*/ "Sistema a griglie laser in sovraccarico.\n", + /* 47*/ "Vittime ingiustificate.\n", + /* 48*/ "Non devono prendere la cassaforte!\n", + /* 49*/ "Indossato travestimento.\n", + /* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n", + /* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n", + /* 52*/ "Se non fai qualcosa la valigia verr fermata.\n", + /* 53*/ "Cos quello l'Air Force One? Mhm... \n pi piccolo di quanto pensassi.\n", + /* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n", + /* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n", + /* 56*/ "Eccellente, Joanna. Quella navetta il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. ネ scortata da una squadra della base aerea. ネ superfluo ricordarti che...\n", + /* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n", + /* 58*/ "Non sono a conoscenza della misura in cui si sia diffusa la cospirazione all'interno dell'NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n", + /* 59*/ "S e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n", + /* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n", + /* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n", + /* 62*/ "Ucciso personale essenziale alla missione.\n", + /* 63*/ "Distrutto strumento essenziale alla missione.\n", + /* 64*/ "L'entrata alla base stata chiusa.\n", + /* 65*/ "Stiamo decollando!!!\n", + /* 66*/ "Chiuso carrello del velivolo.\n", + /* 67*/ "L'attrezzatura non pu essere depositata.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_s.c b/src/files/lang/jap-final/cave_str_s.c new file mode 100644 index 000000000..918ac4808 --- /dev/null +++ b/src/files/lang/jap-final/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos m疽 tarde tras cargarlos a bordo del Air Force One usando un carrito a駻eo. Primero, creo, necesitar疽 encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One est guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENCIAL \nBASE AノREA EE.UU., ALASKA\n", + /* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos m疽 tarde tras cargarlos a bordo del Air Force One usando un carrito a駻eo. Primero, creo, necesitar疽 encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Obtener el disfraz y entrar a la base\n", + /* 6*/ "Facturar el equipo\n", + /* 7*/ "Burlar al sistema monitor de seguridad\n", + /* 8*/ "Obtener planes v. de la caja fuerte\n", + /* 9*/ "Abordar el Air Force One\n", + /* 10*/ "Obt駭 la maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obt駭 el uniforme de azafata de vuelo.\n", + /* 16*/ "\n", + /* 17*/ "Disfraz\n", + /* 18*/ "Disfraz\n", + /* 19*/ "Uniforme de azafata obtenido.\n", + /* 20*/ "Obt駭 los planes de vuelo de la caja fuerte.\n", + /* 21*/ "\n", + /* 22*/ "Planes de Vuelo\n", + /* 23*/ "Planes de Vuelo\n", + /* 24*/ "Planes de vuelo obtenidos.\n", + /* 25*/ "Cuidado. Es un intruso...\n", + /* 26*/ "Han muerto civiles inocentes.\n", + /* 27*/ "ソEst bien?\n", + /* 28*/ "Ir para obtener alguna ayuda.\n", + /* 29*/ "Buenas tardes.\n", + /* 30*/ "Muy bien, ya conoce el camino desde aqu.\n", + /* 31*/ "Deber疽 dejar ese arma aqu.\n", + /* 32*/ "。Oh, Dios mo!\n", + /* 33*/ "No se permiten armas en la base.\n", + /* 34*/ "De acuerdo, avisar a seguridad.\n", + /* 35*/ "Cierre del sistema iniciado...\n", + /* 36*/ "Los sistemas de seguridad han sido apagados.\n", + /* 37*/ "Se han detectado armas.\n", + /* 38*/ "La maleta ha sido facturada.\n", + /* 39*/ "La maleta ha sido escaneada.\n", + /* 40*/ "Hey, t: 駸ta es un 疵ea restringida.\n", + /* 41*/ "ソEres nueva por aqu?\n", + /* 42*/ "Hey. Devu駘veme mi maleta.\n", + /* 43*/ "Trae a seguridad, yo me encargo de ella...\n", + /* 44*/ "Arriba... hay un intruso.\n", + /* 45*/ "Acceso a la rejilla de l疽er denegado.\n", + /* 46*/ "Sistema de rejilla de l疽er sobrecargado.\n", + /* 47*/ "Demasiados civiles heridos.\n", + /* 48*/ "Detenles antes de que abran la caja fuerte...\n", + /* 49*/ "Disfraz puesto.\n", + /* 50*/ "。ノsta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n", + /* 51*/ "Usa la maleta para ocultar tu equipo.\n", + /* 52*/ "La maleta ser detenida a menos que hagas algo.\n", + /* 53*/ "ソAs que ese es el Air Force One? ... Huh, es m疽 \npequeo de lo que pensaba.\n", + /* 54*/ "Detenlos: est疣 accediendo a la caja fuerte...\n", + /* 55*/ "Agente Dark en posicin. Puedo ver la entrada principal de la base, y distingo el punto de llegada del telef駻ico.\n", + /* 56*/ "Excelente, Joanna. Ese telef駻ico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulacin entrar hace un minuto. Est siendo escoltada por tropas de la base a駻ea. No debo recordarte que probablemente...\n", + /* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequea trama de Trent. Y que no puedo dispararles aunque ellos me disparen a m. ソQu pasa con los agentes de la ANS?\n", + /* 58*/ "No s cu疣 lejos ha llegado la conspiracin a trav駸 de la ANS, pero podra apostar a que los hombres que Trent ha situado por aqu son leales a su plan y a 駘 mismo. Debes encontrar evidencias de la traicin de Trent en el Air Force One y ense疵selas al Presidente.\n", + /* 59*/ "S, y protegerle de sus secuestradores. ソTienes alguna idea sobre de qu puede tratar el plan de Trent, y qu pasa con esos chicos rubios?\n", + /* 60*/ "Slo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n", + /* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n", + /* 62*/ "Personal crtico de la misin eliminado.\n", + /* 63*/ "Objeto crtico de la misin destruido.\n", + /* 64*/ "Entrada a la base asegurada.\n", + /* 65*/ "。。Nos ocupamos nosotros!!\n", + /* 66*/ "El telef駻ico ha sido derribado.\n", + /* 67*/ "El equipo no puede ser registrado.\n", +}; diff --git a/src/files/lang/cradE.c b/src/files/lang/jap-final/cradE.c similarity index 100% rename from src/files/lang/cradE.c rename to src/files/lang/jap-final/cradE.c diff --git a/src/files/lang/cradJ.c b/src/files/lang/jap-final/cradJ.c similarity index 100% rename from src/files/lang/cradJ.c rename to src/files/lang/jap-final/cradJ.c diff --git a/src/files/lang/cradP.c b/src/files/lang/jap-final/cradP.c similarity index 100% rename from src/files/lang/cradP.c rename to src/files/lang/jap-final/cradP.c diff --git a/src/files/lang/crad_str_f.c b/src/files/lang/jap-final/crad_str_f.c similarity index 100% rename from src/files/lang/crad_str_f.c rename to src/files/lang/jap-final/crad_str_f.c diff --git a/src/files/lang/crad_str_g.c b/src/files/lang/jap-final/crad_str_g.c similarity index 100% rename from src/files/lang/crad_str_g.c rename to src/files/lang/jap-final/crad_str_g.c diff --git a/src/files/lang/crad_str_i.c b/src/files/lang/jap-final/crad_str_i.c similarity index 100% rename from src/files/lang/crad_str_i.c rename to src/files/lang/jap-final/crad_str_i.c diff --git a/src/files/lang/crad_str_s.c b/src/files/lang/jap-final/crad_str_s.c similarity index 100% rename from src/files/lang/crad_str_s.c rename to src/files/lang/jap-final/crad_str_s.c diff --git a/src/files/lang/crypE.c b/src/files/lang/jap-final/crypE.c similarity index 100% rename from src/files/lang/crypE.c rename to src/files/lang/jap-final/crypE.c diff --git a/src/files/lang/crypJ.c b/src/files/lang/jap-final/crypJ.c similarity index 100% rename from src/files/lang/crypJ.c rename to src/files/lang/jap-final/crypJ.c diff --git a/src/files/lang/crypP.c b/src/files/lang/jap-final/crypP.c similarity index 100% rename from src/files/lang/crypP.c rename to src/files/lang/jap-final/crypP.c diff --git a/src/files/lang/cryp_str_f.c b/src/files/lang/jap-final/cryp_str_f.c similarity index 100% rename from src/files/lang/cryp_str_f.c rename to src/files/lang/jap-final/cryp_str_f.c diff --git a/src/files/lang/cryp_str_g.c b/src/files/lang/jap-final/cryp_str_g.c similarity index 100% rename from src/files/lang/cryp_str_g.c rename to src/files/lang/jap-final/cryp_str_g.c diff --git a/src/files/lang/cryp_str_i.c b/src/files/lang/jap-final/cryp_str_i.c similarity index 100% rename from src/files/lang/cryp_str_i.c rename to src/files/lang/jap-final/cryp_str_i.c diff --git a/src/files/lang/cryp_str_s.c b/src/files/lang/jap-final/cryp_str_s.c similarity index 100% rename from src/files/lang/cryp_str_s.c rename to src/files/lang/jap-final/cryp_str_s.c diff --git a/src/files/lang/damE.c b/src/files/lang/jap-final/damE.c similarity index 100% rename from src/files/lang/damE.c rename to src/files/lang/jap-final/damE.c diff --git a/src/files/lang/jap-final/damJ.c b/src/files/lang/jap-final/damJ.c new file mode 100644 index 000000000..7fd367192 --- /dev/null +++ b/src/files/lang/jap-final/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nw⌒∩∃≪⊆ヌエ⇔⊇≫≡⊂♭=ヒ⊇マロd≠ヒハラ∀⊇⊂マ♭∨ツ%≠ハラ秩ヘ∧メ∈ぢエ宦痼>♭ナタ≪マыьロэ∈ぼエ⇔⊇≫ツ♂d゚≧ムマ∀∧メc┻♪⌒モ>延梶が∩χャ∃ち£≠ネラ縺クぼエ⇔⊇≫≡⊂Åツ\n\n|ヨヒマ縲マセ\n\nテメコぼ∃てタ∩≒÷瘁焉マ∀エ⇔шロэ∵∀⇔⌒χャ♭⊆≫∀⊇⊃≫Å∽⊂ツ瘁焉メロэ∈♭タ≫≪こごヌ≡ツ∨Åナ<クqrsメご∈く焙マ∀⊇⊂≠」うメメd∈り√∃⊇≡⊂マツ\n\n|しじ操セメムマλυ∈磨綵n\nムマλυ∈磨縺>∵οぼメ#≠ロヘマ∩≒焉ト√≫Å∽⊂ツ∧√マ≡≪メろゎ⌒coヱ⊃⇔ナリ⊂メÅ∵死ツアワヨヒマ∈エ⇔<ノυメワムハ焉クоニメÅツロてナ⇔⊇≫ワムハ焉クュ⇔磨縺ぞチマ⊆≫ムマワムハ焉メ騾ハ焉諢ラチモÅツ\n\n|しじ逐セ♂d゚∈せぜヌ≡\n\n♂d゚≧ムマ∵テメ£≠ネラ縺マ∪⊇⇔メロ∨モ<⇔みニ≫ョャ∵⊆≫ツ=クоナ⇔=ネテマ⊇≫ワ゚ハ∨¬∈Ψトヌ≠ロ≒メ♂d゚∈せぜニ≫メÅツゆeモΒラ♪ぽ≒∈宦痲a≫ニヌÅツ\n\n|しじ凍セゥャ∀翌トざぼはu∈磨綵n\nゥャ艨劇ロワ窶∀メ翌トざぼはu∈磨縺>モd縺ソ≒v√⇔=コ⇔⌒∃チてタぁニÅ∽⊂ツ汲ヤÅツ∈磨エ⇔⌒wメыьロэ∈こごニ≫テ∀モ♭タ∃⊇ツメ┳∈に∩ツ∨リホ=チ√∬√⌒ご∈煤ス∃⊇≡⊂マニ≫メÅツ\n\n|しじ楳セdマ£d縺クづて\n\nテ√♭>延割щъ%≠ハラ逐メ翌ト桁劫宴ロ∵ぃいマ∃≫ツぉ∨¬メぼてメ∨⊥マ=テ√∈づてナ⇔∪チメÅツテ√メルマ縲d$轢モ艢着私チハマ⊆≫ツ\n\n|しじ斧セモ′ワ∀ちマыьヌ≡\n\nモ′ワ∈なにナ≠ソマdマ£dマゅエ⇔%≠ハラ秩メыь∈リ⊥⇔チ√ツ\n\nEND\n", + /* 1*/ "ン゚マロハ£\n", + /* 2*/ "|ワ竄пbhセ\n\nw⌒∩∃≪⊆ヌエ⇔⊇≫≡⊂♭=ヒ⊇マロd≠ヒハラ∀⊇⊂マ♭∨ツ%≠ハラ秩ヘ∧メ∈ぢエ宦痼>♭ナタ≪マыьロэ∈ぼエ⇔⊇≫ツ♂d゚≧ムマ∀∧メc┻♪⌒モ>延梶が∩χャ∃ち£≠ネラ縺クぼエ⇔⊇≫≡⊂Åツ\n\n|ヨヒマ縲マセ\n\nテメコぼ∃てタ∩≒÷瘁焉マ∀エ⇔шロэ∵∀⇔⌒χャ♭⊆≫∀⊇⊃≫Å∽⊂ツ瘁焉メロэ∈♭タ≫≪こごヌ≡ツ∨Åナ<クqrsメご∈く焙マ∀⊇⊂≠」うメメd∈り√∃⊇≡⊂マツ\n\n|しじ操セメムマλυ∈磨綵n\nムマλυ∈磨縺>∵οぼメ#≠ロヘマ∩≒焉ト√≫Å∽⊂ツ∧√マ≡≪メろゎ⌒coヱ⊃⇔ナリ⊂メÅ∵死ツアワヨヒマ∈エ⇔<ノυメワムハ焉クоニメÅツロてナ⇔⊇≫ワムハ焉クュ⇔磨縺ぞチマ⊆≫ムマワムハ焉メ騾ハ焉諢ラチモÅツ\n\n|しじ逐セゥャ∀翌トざぼはu∈磨綵n\nゥャ艨劇ロワ窶∀メ翌トざぼはu∈磨縺>モd縺ソ≒v√⇔=コ⇔⌒∃チてタぁニÅ∽⊂ツ汲ヤÅツ∈磨エ⇔⌒wメыьロэ∈こごニ≫テ∀モ♭タ∃⊇ツメ┳∈に∩ツ∨リホ=チ√∬√⌒ご∈煤ス∃⊇≡⊂マニ≫メÅツ\n\n|しじ凍セdマ£d縺クづて\n\nテ√♭>延割щъ%≠ハラ逐メ翌ト桁劫宴ロ∵ぃいマ∃≫ツぉ∨¬メぼてメ∨⊥マ=テ√∈づてナ⇔∪チメÅツテ√メルマ縲d$轢モ艢着私チハマ⊆≫ツ\n\n|しじ楳セモ′ワ∀ちマыьヌ≡\n\nモ′ワ∈なにナ≠ソマdマ£dマゅエ⇔%≠ハラ秩メыь∈リ⊥⇔チ√ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nw⌒∩∃≪⊆ヌエ⇔⊇≫≡⊂♭=ヒ⊇マロd≠ヒハラ∀⊇⊂マ♭∨ツ%≠ハラ秩ヘ∧メ∈ぢエ宦痼>♭ナタ≪マыьロэ∈ぼエ⇔⊇≫ツ♂d゚≧ムマ∀∧メc┻♪⌒モ>延梶が∩χャ∃ち£≠ネラ縺クぼエ⇔⊇≫≡⊂Åツ\n\n|ヨヒマ縲マセ\n\nテメコぼ∃てタ∩≒÷瘁焉マ∀エ⇔шロэ∵∀⇔⌒χャ♭⊆≫∀⊇⊃≫Å∽⊂ツ瘁焉メロэ∈♭タ≫≪こごヌ≡ツ∨Åナ<クqrsメご∈く焙マ∀⊇⊂≠」うメメd∈り√∃⊇≡⊂マツ\n\n|しじ操セメムマλυ∈磨綵n\nムマλυ∈磨縺>∵οぼメ#≠ロヘマ∩≒焉ト√≫Å∽⊂ツ∧√マ≡≪メろゎ⌒coヱ⊃⇔ナリ⊂メÅ∵死ツアワヨヒマ∈エ⇔<ノυメワムハ焉クоニメÅツロてナ⇔⊇≫ワムハ焉クュ⇔磨縺ぞチマ⊆≫ムマワムハ焉メ騾ハ焉諢ラチモÅツ\n\n|しじ逐セゥャ∀翌トざぼはu∈磨綵n\nゥャ艨劇ロワ窶∀メ翌トざぼはu∈磨縺>モd縺ソ≒v√⇔=コ⇔⌒∃チてタぁニÅ∽⊂ツ汲ヤÅツ∈磨エ⇔⌒wメыьロэ∈こごニ≫テ∀モ♭タ∃⊇ツメ┳∈に∩ツ∨リホ=チ√∬√⌒ご∈煤ス∃⊇≡⊂マニ≫メÅツ\n\n|しじ凍セモ′ワ∀ちマыьヌ≡\n\nモ′ワ∈なにナ≠ソマdマ£dマゅエ⇔%≠ハラ秩メыь∈リ⊥⇔チ√ツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ゥャ∀翌トざぼはu∈磨綵n", + /* 6*/ "メムマλυ∈磨綵n", + /* 7*/ "♂d゚∈せぜヌ≡\n", + /* 8*/ "dマ£d縺クづて\n", + /* 9*/ "モ′ワ∀ちマыьヌ≡\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "テテ∵タエ∀翌ト桁劫宴ロ∈ぼ⊂リ轣ムツ\n", + /* 12*/ "翌トざぼ∀ゥャ∵∃ツ≪オ\nテメ⌒∨Å≡⊂Åツム÷騾ハ騾エ\n", + /* 13*/ "ムマλυ∈磨縺⊇⊇メム蚕n", + /* 14*/ "翌トざぼはu∵ィ麾氈ト√∨\n", + /* 15*/ "ゥャロワ窶∵ィ麾氈ト√∨\n", + /* 16*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 17*/ "λυメムマワムハ焉メ騾ハ焉諢ラ⊇∨\n", + /* 18*/ "ムマワムハ焉諤ィ麾氈ト√∨\n", + /* 19*/ "ыьロэルマ縲dンマ゚d∈なにナ∨\n", + /* 20*/ "しじメぼマあぃモ∃┳Σ∵ほト√∨\n", + /* 21*/ "ュ⇔メ♂d゚∈せぜナ∨\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "♂d゚\n", + /* 25*/ "♂d゚\n", + /* 26*/ "♂d゚∈みマ√∨\n", + /* 27*/ "しじメぼマあぃモ∃┳Σ∵ほト√∨\n", + /* 28*/ "縺メ♀ミハラ∵ラ∩√∨\n", + /* 29*/ "縺謔テてト√∨\n", + /* 30*/ "ヤ%dロヘマレロ遵私チハメ♀ミ∵吹リエ∨リリ♭ニ\n", + /* 31*/ "ムマワムハ焉メハラf∵ンハ縺ト√∨\n", + /* 32*/ "≠ヘミマ艢≠ッマぼエ⇔チ√ツdモ\nшずノ∈оナ⇔チ≫ツΒ♭ホ焉ナ≡⊂エ\n", + /* 33*/ "モ′ワ∵ほト√∨\n", + /* 34*/ "≠ヘミマ艢<⊇≡ツ準ユ項マエ\nレチテ∋∃¥∩≒桙氈ナ≡⊂ツ\n", + /* 35*/ "メ┳∵ほト√∨\n", + /* 36*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 37*/ "ミd∵づてト√∨\n", + /* 38*/ "ミd∵┏ナ∨\n", + /* 39*/ "≡dナ>♭メ瘁焉メロэ∈\n≠ヒ♭タ∨∃ツヵΞモшmÅムツ\n", + /* 40*/ "Ωキ∵ふ=テメ∈\n∝∃⊇テ∀∈⊇メ≫∝ツ\n", + /* 41*/ "d∨¬エ⇔コ秩ホメ∩∃タ\n", + /* 42*/ "ァィ蚕n", + /* 43*/ "トエト∀∧メワムハ焉ク磨エ⇔エ\n", + /* 44*/ "テエ¬メワムハ焉ワ磨竅メ≡エ\n", + /* 45*/ "∝∩エ∨≡=ン≫≡蚕n", + /* 46*/ "べ∨∃⊇♭チ√蚕n", + /* 47*/ "テメ辟磨痺エ\n", +}; diff --git a/src/files/lang/jap-final/damP.c b/src/files/lang/jap-final/damP.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/jap-final/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/jap-final/dam_str_f.c b/src/files/lang/jap-final/dam_str_f.c new file mode 100644 index 000000000..60a0d73cf --- /dev/null +++ b/src/files/lang/jap-final/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - S馗uriser labos et donn馥s de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. S馗urisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 1*/ "Vaisseau Cetan\n", + /* 2*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "D駸activer GPS et Auto-pilote\n", + /* 6*/ "D駸activer source d'駭ergie principale\n", + /* 7*/ "S馗uriser labos et donn馥s de recherche\n", + /* 8*/ "Activer l'ascenseur du sas\n", + /* 9*/ "Retrouver Elvis et s'enfuir avec lui\n", + /* 10*/ "On sabote les moteurs et le vaisseau \nd駻ivera... Parfait!\n", + /* 11*/ "Le sous-marin doit 黎re contrl d'ici. \n", + /* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'駘oignera de la station. \n", + /* 13*/ "Ils ne pourront plus continuer l'op駻ation \nsans 駭ergie.\n", + /* 14*/ "Syst鑪e auto-pilote d駸activ.\n", + /* 15*/ "Syst鑪e GPS d駸activ.\n", + /* 16*/ "Objet crucial d騁ruit.\n", + /* 17*/ "Porte de commande d'arr黎 du r饌cteur ouverte.\n", + /* 18*/ "R饌cteur d駸activ.\n", + /* 19*/ "Centre de contrle de plong馥 localis.\n", + /* 20*/ "Personnel crucial abattu.\n", + /* 21*/ "Donn馥s de recherche s馗uris馥s.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disque de recherche\n", + /* 25*/ "Un disque de recherche\n", + /* 26*/ "Disque de recherche obtenu.\n", + /* 27*/ "Personnel crucial abattu.\n", + /* 28*/ "Porte ascenseur d騅errouill馥.\n", + /* 29*/ "Ascenseur activ.\n", + /* 30*/ "Op駻ation refus馥 - portes du hangar ferm馥s.\n", + /* 31*/ "S駲uence de d騅errouillage r駟nitialis馥.\n", + /* 32*/ "Vas-y. Je s馗urise le p駻im鑼re. \nOn se retrouve plus tard.\n", + /* 33*/ "Elvis a 騁 abattu.\n", + /* 34*/ "Qu'est-ce que tu faisais? Suis-moi... \nOn d馗ampe.\n", + /* 35*/ "Des civils ont 騁 abattus.\n", + /* 36*/ "Objet crucial d騁ruit.\n", + /* 37*/ "Alarme activ馥.\n", + /* 38*/ "Alarme d駸activ馥.\n", + /* 39*/ "Bien. L'op駻ation de plong馥 a 騁 annul馥 la surface. \nIl est temps de piquer une t黎e.\n", + /* 40*/ "J'esp鑽e que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n", + /* 41*/ "On y est all un peu fort, non?\n", + /* 42*/ "Mais non.\n", + /* 43*/ "D饕ranche ce truc.\n", + /* 44*/ "Eteins-moi 軋.\n", + /* 45*/ "Je vais l'騁eindre.\n", + /* 46*/ "Ne me faites pas de mal!\n", + /* 47*/ "Crevez, charognes!\n", +}; diff --git a/src/files/lang/jap-final/dam_str_g.c b/src/files/lang/jap-final/dam_str_g.c new file mode 100644 index 000000000..e7a389244 --- /dev/null +++ b/src/files/lang/jap-final/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungen!\n\nWir wollen s舂tliche Informationen, die dataDyne bis dato ber dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker au゚er Gefecht. Vergessen Sie nicht, dass wir sie sp舩er noch verhren wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente fr das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es fr Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 1*/ "Cetanisches Schiff\n", + /* 2*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente fr das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es fr Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Deaktivieren Sie den Autopiloten!\n", + /* 6*/ "Setzen Sie den Generator au゚er Kraft!\n", + /* 7*/ "Sichern Sie die Daten!\n", + /* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n", + /* 9*/ "Flchten Sie gemeinsam mit Elvis!\n", + /* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n", + /* 11*/ "Von hier aus wird das Schiff gesteuert.\n", + /* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n", + /* 13*/ "Das Schiff wird ohne Stromzufuhr vllig \nnavigationsunf臧ig sein.\n", + /* 14*/ "Autopilot wurde deaktiviert\n", + /* 15*/ "GPS-System wurde deaktiviert\n", + /* 16*/ "Wichtiges Objekt wurde zerstrt\n", + /* 17*/ "Reaktor-Kontrollkonsole geffnet\n", + /* 18*/ "Reaktor wurde abgeschaltet.\n", + /* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n", + /* 20*/ "Wichtige Person neutralisiert\n", + /* 21*/ "Forschungsdaten wurden gesichert.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Sicherungsdiskette\n", + /* 25*/ "Eine Sicherungsdiskette\n", + /* 26*/ "Sicherungsdiskette aufgenommen\n", + /* 27*/ "Wichtige Personen wurden neutralisiert.\n", + /* 28*/ "Aufzugstr wurde entriegelt.\n", + /* 29*/ "Aufzug wurde aktiviert.\n", + /* 30*/ "Unzul舖sige Operation - Die Hangartren sind noch geschlossen.\n", + /* 31*/ "Entriegelungssequenz wurde abgebrochen.\n", + /* 32*/ "Du gehst voraus, Jo. Ich sichere das Gel舅de. \nWir treffen uns sp舩er.\n", + /* 33*/ "Elvis wurde neutralisiert.\n", + /* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschssel verschwinden.\n", + /* 35*/ "Zivile Verluste!!!\n", + /* 36*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 37*/ "Alarm wurde aktiviert.\n", + /* 38*/ "Alarm wurde deaktiviert.\n", + /* 39*/ "Korrekt. Die Operation wurde an der Oberfl臘he unterbrochen.\nZeit fr ein wenig Badevergngen.\n", + /* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n", + /* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n", + /* 42*/ "Ach, stell Dich nicht so m臈chenhaft an!\n", + /* 43*/ "Zieh den Stecker raus!\n", + /* 44*/ "Schalte das Ding ab!\n", + /* 45*/ "Ich schalte es ab.\n", + /* 46*/ "Bitte tu mir nichts.\n", + /* 47*/ "Jetzt seid ihr dran, Verr舩er.\n", +}; diff --git a/src/files/lang/jap-final/dam_str_i.c b/src/files/lang/jap-final/dam_str_i.c new file mode 100644 index 000000000..e137b03de --- /dev/null +++ b/src/files/lang/jap-final/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano l: li interrogheremo pi tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiver il pilota automatico dell'unit sommergibile minore, richiamandola affinch tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 1*/ "Astronave Cetan\n", + /* 2*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiver il pilota automatico dell'unit sommergibile minore, richiamandola affinch tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il GPS e il pilota automatico\n", + /* 6*/ "Disattiva la fonte d'energia primaria\n", + /* 7*/ "Chiudi a chiave i laboratori\n", + /* 8*/ "Attiva il sollevatore del Moon Pool\n", + /* 9*/ "Incontro e fuga con Elvis\n", + /* 10*/ "Disattivando il motore il sottomarino\n andr alla deriva... Perfetto!\n", + /* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n", + /* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontaner dalla sua posizione.\n", + /* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n", + /* 14*/ "Disattivato pilota automatico.\n", + /* 15*/ "Disattivato sistema GPS.\n", + /* 16*/ "Distrutto strumento essenziale alla missione.\n", + /* 17*/ "Aperto sportello comandi del reattore.\n", + /* 18*/ "Disattivato il reattore.\n", + /* 19*/ "Localizzato centro di comando immersione.\n", + /* 20*/ "Ucciso personale essenziale alla missione.\n", + /* 21*/ "I dati di ricerca sono al sicuro.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco dati di ricerca\n", + /* 25*/ "Disco dati di ricerca\n", + /* 26*/ "Preso disco dati di ricerca.\n", + /* 27*/ "Ucciso personale essenziale alla missione.\n", + /* 28*/ "Aperta porta sollevatore.\n", + /* 29*/ "Attivato sollevatore.\n", + /* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n", + /* 31*/ "La sequenza di sblocco stata resettata.\n", + /* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 33*/ "Elvis stato ucciso.\n", + /* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n", + /* 35*/ "Uccisi dei civili.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Attivato allarme.\n", + /* 38*/ "Disattivato allarme.\n", + /* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n", + /* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n", + /* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n", + /* 42*/ "Ma va l!!!\n", + /* 43*/ "E ora stacca la spina!\n", + /* 44*/ "Spegni 'sto coso!\n", + /* 45*/ "Ora lo chiudo!\n", + /* 46*/ "Non farmi del male!\n", + /* 47*/ "Crepa, traditore!\n", +}; diff --git a/src/files/lang/jap-final/dam_str_s.c b/src/files/lang/jap-final/dam_str_s.c new file mode 100644 index 000000000..0bc7da93e --- /dev/null +++ b/src/files/lang/jap-final/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigacin\n\nQueremos cualquier informacin que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los cientficos y t馗nicos que all trabajan; queremos interrogarles m疽 tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activar el piloto autom疸ico del sumergible de profundidad, tray駭dolo de vuelta para que lo us駟s Elvis y t. Los controles est疣 en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 1*/ "Nave Cetan\n", + /* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activar el piloto autom疸ico del sumergible de profundidad, tray駭dolo de vuelta para que lo us駟s Elvis y t. Los controles est疣 en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar GPS y piloto autom疸ico\n", + /* 6*/ "Desactivar fuente primaria de energa\n", + /* 7*/ "Asegurar laboratorios y datos\n", + /* 8*/ "Activar el ascensor de la piscina\n", + /* 9*/ "Encontrar y escapar con Elvis\n", + /* 10*/ "Estropea los motores y la nave ir \na la deriva... 。Perfecto!\n", + /* 11*/ "Desde aqu se debe controlar el submarino.\n", + /* 12*/ "Sin el piloto autom疸ico y el GPS, la nave \ndeambular fuera de la estacin.\n", + /* 13*/ "No podr疣 realizar ninguna operacin \nsin energa.\n", + /* 14*/ "El sistema de piloto autom疸ico ha sido desactivado.\n", + /* 15*/ "El sistema GPS ha sido desactivado.\n", + /* 16*/ "Objeto crtico de la misin destruido.\n", + /* 17*/ "Escotilla del control de apagado del reactor abierta.\n", + /* 18*/ "El reactor ha sido apagado.\n", + /* 19*/ "El centro de control de buceo ha sido localizado.\n", + /* 20*/ "Ha muerto personal crtico de la misin.\n", + /* 21*/ "Datos de investigacin asegurados.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco de datos\n", + /* 25*/ "Un disco de datos de investigacin\n", + /* 26*/ "Disco de datos de investigacin obtenido.\n", + /* 27*/ "Ha muerto personal crtico de la misin.\n", + /* 28*/ "La puerta del ascensor ha sido abierta.\n", + /* 29*/ "El ascensor ha sido activado.\n", + /* 30*/ "Operacin denegada: puertas del hangar todava cerradas.\n", + /* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n", + /* 32*/ "Ve delante, Joanna. Asegurar el permetro. \nNos vemos m疽 tarde.\n", + /* 33*/ "Elvis ha muerto.\n", + /* 34*/ "Joanna... ソPor qu has tardado tanto? Sgueme. \nSalgamos de esta vieja baera.\n", + /* 35*/ "Han muerto civiles.\n", + /* 36*/ "Objeto crtico de la misin destruido.\n", + /* 37*/ "La alarma ha sido activada.\n", + /* 38*/ "La alarma ha sido desactivada.\n", + /* 39*/ "Correcto. La operacin de buceo ha sido desbaratada en la superficie. \nEs la hora del bao.\n", + /* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n", + /* 41*/ "ソPiensas que fuimos un poquito torpes?\n", + /* 42*/ "Nooohhhh.\n", + /* 43*/ "Tira del enchufe ahora.\n", + /* 44*/ "Apaga esa cosa.\n", + /* 45*/ "Lo apagar.\n", + /* 46*/ "Por favor, no me hagas dao.\n", + /* 47*/ "Morid, traidores...\n", +}; diff --git a/src/files/lang/depoE.c b/src/files/lang/jap-final/depoE.c similarity index 100% rename from src/files/lang/depoE.c rename to src/files/lang/jap-final/depoE.c diff --git a/src/files/lang/jap-final/depoJ.c b/src/files/lang/jap-final/depoJ.c new file mode 100644 index 000000000..d01278d32 --- /dev/null +++ b/src/files/lang/jap-final/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\n符キ刀劇マムナ∨≒=劇メm刀ヨ∀ユ∩⊃ツ♪テ∩♭d窶ニマ∵ぼ∝√⇔⊇≫モÅツd窶ニマメ売メクΓΔ∀ナ⇔腐磨ナ=タ≫Åツレチ′∩≒桙氈ヌ≡ツ\n\n|ヨヒマ縲マセ\n\n普劇モ′ュk∈ユ°dニ≫ミdロワ窶∈はヮナ⇔⊇≫ツぉ∈なにナ∨iヮワモ÷ミd∈ロてナ≡⊂∀ニ≫メ♭┛Χニ≫メÅツミd∵∃√†÷d窶ニマモョm┏マ∃≫Å∽⊂ツ∧エ∀=ネエ∀す∠メÅ=ヘミマ艢ツ\n\n|しじ操セρΖこごロワ窶∈ィ麾氈マ\n\n浴メd≠メモミマ⊆≫はu∵÷ユワ$ム∵腐磨ナ∨メλえ∈こ驕フ⊇≫ツ∧√∈ィ麾氈マニ√†÷ユワ$ムメΓΔ∈ヨヒマ縲マぅうヨえ≫テ∀∵ぃい∀∃≫メÅツ\n\n|しじ逐セd=dハ♀∈ィ麾氈マ\n\n普劇メλυハ♀∈рщナ∨∀テ∽÷d=dハ♀メ轢ハ縲dラ∵≪⊥∬≒ト√⇔⊇≫テ∀∵なゃナ∨ツd=dモ÷d窶ニマdヨメム∈栫閨゚⊂マtuト√⇔⊇≫∵<⇔メワムハ焉クィ麾氈マナ⇔ナリ⊃†≦凵モラツ≫ツ\n\n|しじ凍セd窶ニマ∈腐磨ヌ≡\n\nユワ$ム∈⊃†÷ユレマ♀∨¬マΨ♯∩√∃⊇≡⊂マ÷d窶ニマ∈腐磨タ≫モÅツ\n\n|しじ楳セ┳氏メ°ハラミハ£∈み\n\n♀ラ゚dヨヒ∩≒メп掾メ繞怐マ≡≫∀÷普劇メ刋ハメmマ=朽ハラミハ£ト√∨≠ロメ┳死∵ぜるト√⇔⊇≫∀メテ∀Åツゆe∵テ√∈ぴψ♭タ√†<普モん∝√∨∀━∝√≫=ソ⇒⇔メ♀ラ゚dヨヒメ┳氏クぴтニ≫テ∀∵♭タ≫メÅツ\n\n|しじ斧セ′∩≒桙氈ヌ≡\n\nンハ縺ナ⇔∪⊇∨d繞」、∈づ」ナクケ∈ばぱニ≫メÅツ♪メたメクケマンハ縺ナ∨∩≡チ━⊇ぁニメÅツ\n\nEND\n", + /* 1*/ "普劇\n", + /* 2*/ "|ワ竄пbhセ\n\n符キ刀劇マムナ∨≒=劇メm刀ヨ∀ユ∩⊃ツ♪テ∩♭d窶ニマ∵ぼ∝√⇔⊇≫モÅツd窶ニマメ売メクΓΔ∀ナ⇔腐磨ナ=タ≫Åツレチ′∩≒桙氈ヌ≡ツ\n\n|ヨヒマ縲マセ\n\n普劇モ′ュk∈ユ°dニ≫ミdロワ窶∈はヮナ⇔⊇≫ツぉ∈なにナ∨iヮワモ÷ミd∈ロてナ≡⊂∀ニ≫メ♭┛Χニ≫メÅツミd∵∃√†÷d窶ニマモョm┏マ∃≫Å∽⊂ツ∧エ∀=ネエ∀す∠メÅ=ヘミマ艢ツ\n\n|しじ操セd=dハ♀∈ィ麾氈マ\n\n普劇メλυハ♀∈рщナ∨∀テ∽÷d=dハ♀メ轢ハ縲dラ∵≪⊥∬≒ト√⇔⊇≫テ∀∵なゃナ∨ツd=dモ÷d窶ニマdヨメム∈栫閨゚⊂マtuト√⇔⊇≫∵<⇔メワムハ焉クィ麾氈マナ⇔ナリ⊃†≦凵モラツ≫ツ\n\n|しじ逐セd窶ニマ∈腐磨ヌ≡\n\nユワ$ム∈⊃†÷ユレマ♀∨¬マΨ♯∩√∃⊇≡⊂マ÷d窶ニマ∈腐磨タ≫モÅツ\n\n|しじ凍セ┳氏メ°ハラミハ£∈み\n\n♀ラ゚dヨヒ∩≒メп掾メ繞怐マ≡≫∀÷普劇メ刋ハメmマ=朽ハラミハ£ト√∨≠ロメ┳死∵ぜるト√⇔⊇≫∀メテ∀Åツゆe∵テ√∈ぴψ♭タ√†<普モん∝√∨∀━∝√≫=ソ⇒⇔メ♀ラ゚dヨヒメ┳氏クぴтニ≫テ∀∵♭タ≫メÅツ\n\n|しじ楳セ′∩≒桙氈ヌ≡\n\nンハ縺ナ⇔∪⊇∨d繞」、∈づ」ナクケ∈ばぱニ≫メÅツ♪メたメクケマンハ縺ナ∨∩≡チ━⊇ぁニメÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\n符キ刀劇マムナ∨≒=劇メm刀ヨ∀ユ∩⊃ツ♪テ∩♭d窶ニマ∵ぼ∝√⇔⊇≫モÅツd窶ニマメ売メクΓΔ∀ナ⇔腐磨ナ=タ≫Åツレチ′∩≒桙氈ヌ≡ツ\n\n|ヨヒマ縲マセ\n\n普劇モ′ュk∈ユ°dニ≫ミdロワ窶∈はヮナ⇔⊇≫ツぉ∈なにナ∨iヮワモ÷ミd∈ロてナ≡⊂∀ニ≫メ♭┛Χニ≫メÅツミd∵∃√†÷d窶ニマモョm┏マ∃≫Å∽⊂ツ∧エ∀=ネエ∀す∠メÅ=ヘミマ艢ツ\n\n|しじ操セd窶ニマ∈腐磨ヌ≡\n\nユワ$ム∈⊃†÷ユレマ♀∨¬マΨ♯∩√∃⊇≡⊂マ÷d窶ニマ∈腐磨タ≫モÅツ\n\n|しじ逐セ┳氏メ°ハラミハ£∈み\n\n♀ラ゚dヨヒ∩≒メп掾メ繞怐マ≡≫∀÷普劇メ刋ハメmマ=朽ハラミハ£ト√∨≠ロメ┳死∵ぜるト√⇔⊇≫∀メテ∀Åツゆe∵テ√∈ぴψ♭タ√†<普モん∝√∨∀━∝√≫=ソ⇒⇔メ♀ラ゚dヨヒメ┳氏クぴтニ≫テ∀∵♭タ≫メÅツ\n\n|しじ凍セ′∩≒桙氈ヌ≡\n\n」ばト√∨クケ∈に⇒ツ=ネテ∩≒桙氈ニ≫メÅツ\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "ρΖこごロワ窶∈ィ麾氈マ\n", + /* 10*/ "d=dハ♀∈ィ麾氈マ\n", + /* 11*/ "d窶ニマ∈腐磨ヌ≡\n", + /* 12*/ "┳氏メ°ハラミハ£∈み\n", + /* 13*/ "′∩≒桙氈ヌ≡\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "・↑操ユd♀ヨd\n", + /* 17*/ "・↑操ユd♀ヨd\n", + /* 18*/ "℃操ユd♀ヨd∈みマ√∨\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "・↑逐ユd♀ヨd\n", + /* 22*/ "・↑逐ユd♀ヨd\n", + /* 23*/ "℃逐ユd♀ヨd∈みマ√∨\n", + /* 24*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 25*/ "ρΖこごロワ窶∵ィ麾氈ト√∨\n", + /* 26*/ "ρΖこごロワ窶モつづて♭タリヌ∋\n", + /* 27*/ "d=dハ♀∵ィ麾氈ト√∨\n\n", + /* 28*/ "d=dハ♀∵ィァト√∨\n\n", + /* 29*/ "ュ⇔メd=dハ♀∵ィ麾氈マト√∨\n\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "°ハラミハ£♂d゚\n", + /* 33*/ "°ハラミハ£♂d゚\n", + /* 34*/ "°ハラミハ£♂d゚∈みマ√∨\n", + /* 35*/ "♀ミルd≧∵ンハ縺ト√∨\n", + /* 36*/ "刋ハメ揀レ∈f桷ラリ蚕n", + /* 37*/ "揀レf桙巡刋ハメハラ∵ラ⊇∨\n", + /* 38*/ "ムなに巡刋ハ=ヨロ騾エ\n", + /* 39*/ "♀ミルd≧∵ナチンハ縺ト√∨\n", + /* 40*/ "♀ミルd≧∵ナチンハ縺ト√⇔⊇リヌ∋\n", + /* 41*/ "d窶ニマ∵m┏ト√∨\n", + /* 42*/ "ミdィァ\n", + /* 43*/ "ミdィ麾歃n", + /* 44*/ "刋ハメ♀ミモハラト√⇔⊇リニ\n", + /* 45*/ "♀ミルd≧∵ンハ縺ト√∨\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "ハロヘマん盾オじん\n", + /* 52*/ "ハロヘマΤ┯\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "ユワ$ム\n", + /* 58*/ "ユワ$ム\n", + /* 59*/ "ユワ$ム∈ぴψナ∨\n", + /* 60*/ "テ∋∃d=d∵⊆≫モ≠ッマす⊥∃⊇∝ツ\n", + /* 61*/ "テメけモd窶ニマdÅ∝ツ\nユワ$ムメぁとムツ\n", + /* 62*/ "テメ刋ハメ揀レモ∩∃≪。「Åツ\n♀ミルd≧♭⌒∩∃≪ン∵∩∩≫ツ\n", + /* 63*/ "Βモラ驕竅ツムエ\n掾マ」、∈ナ∩ツ∨クケマロ∵∃タオツ\n", + /* 64*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 65*/ "桙氈ナ∽=ヘミマ艢エ\nクケ∈」ばニ≫エ\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "づ」はu\n", + /* 69*/ "づ」はu\n", + /* 70*/ "づ」はu∈みマ√∨\n", + /* 71*/ "ユワ$ム∵ばぱト√∨盾オじん\n", + /* 72*/ "ヴ∨¬モ噫「∈゚⊇ヶナ\n£∈ぬねナ∨∝ツ\np噫「マモ⌒⊂┳死∵∃⊇メ♭\n⊆∋∃テ∀モづテ≒∃⊇モ≡ツ\n", + /* 73*/ "ナ∩ナテ√♭ワ・∵ぺ¬∨∃ツ\n噫「∈氏メリ轣リ♭ざ†ム†∃≒∃⊇ツ\np噫「∵∈ぷ⇒テ∀∈\nニァ♭タ∃∩エ∨メ∩エ\n", + /* 74*/ "∧∋∃テ∀栫ワニァ♭タ∃⊇∝≡エ\n∀テ∽♭≠ロメぶモ♪⊂∃メ≡エ\n", + /* 75*/ "%≠ハラ秩メヨゥぃモ\nθικ∩≒∪≪∨メ∩タ\n", + /* 76*/ "∪掾モ<ニικ∈艢⇔⊇∨メ♭モ∃⊇∩タ\n", + /* 77*/ "⊇∂エ潤ナ∩ナ⊆∋∃ママル∀モ死ツ\nθモヤト≦ョメみ∵ミ⊃⇔⊆≫ツ\npθικ∵┤xマ繝臀nロq∈ラリ♭タ≫モÅツ\npΒモθικメッート⊃\n⊂リチみマ√†蚕n", + /* 78*/ "マ≠アご∵シツ√†メΑÅムツ\n⊆メヨヒマ縲マ∵テ√∈⊇∨≒\npエ∨⊇┬∈ユ∋♭チ≫≡ツ\n", + /* 79*/ "ヨヒマ縲マメ轣マ\n┬モナ∃⊇≡ツ\npテメ≧マ艨メルワ┸∵轣求♭らδmÅツ\nが∵γ∋♭ヰ⇔⌒θモヤトツ\n", + /* 80*/ "≡dナ=コ√モヒみチて⊇⇔⊇≫∋Å∃ツ\npゆeモ∞ヒみチ⊇∩∃⊇⌒メモヱニエ\np∪掾諤ョメみ∈рレニ≫ンモ\nテメテ∀∈≡チゃ⊃⇔∪チ∋Å∃ツ\n", + /* 81*/ "テ¬≒モd≠ネマ縲≧dラツ\nΓΔ∈え≪リニツ├ヮ∈ナ⇔フト⊇ツ\npθικ∈d♀ニ≫ョャ∵⊆≪リニツ\nロ⊇♭烽о∈みtナ⇔フト⊇ツ\n", + /* 82*/ "モd≠ネマ縲≧dラ≡=ネメンモ∃⊇ツ\nシイ∵で⊃⇔⊇≫マ>>∵ぬ∝エ∨ツ\npヴ∵ユ∋Åマ♀∨¬∵\n轣求ヒε♭べ¬ぺ∀ト√∨ツ\npモミ斧操∩≒なキト√∨\nレムメ≡⊂Åツぽ≒∵фtÅツ\npゅ≪繝艢<ヘxマユ∩エ⇔チ√ツ\nルヒÅ=゚∽ナチサ∠ツ\n", + /* 83*/ "モミ斧操タ純ニικモ♪⊂∃≫メタ\n", +}; diff --git a/src/files/lang/jap-final/depoP.c b/src/files/lang/jap-final/depoP.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/jap-final/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_f.c b/src/files/lang/jap-final/depo_str_f.c new file mode 100644 index 000000000..815834afe --- /dev/null +++ b/src/files/lang/jap-final/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - D駸activer le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble emp鹹he tout syst鑪e d'enregistrement de fonctionner. Une fois coup馥, la Camspy pourra transmettre les donn馥s au QG.\n\n|Objectif 2: - D駸activer les syst鑪es de grilles laser\n\nUn examen du tableau 駭erg騁ique du b穰iment G5 indique la pr駸ence d'un r駸eau de grilles laser. Celles-ci sont plac馥s pour barrer la route vers la salle de r騏nion. D駸activez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit gard馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 1*/ "IMMEUBLE G5\n", + /* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - D駸activer les syst鑪es de grille laser\n\nUn examen du tableau 駭erg騁ique du b穰iment G5 indique la pr駸ence d'un r駸eau de grilles laser. Celles-ci sont plac馥s pour barrer la route vers la salle de r騏nion. D駸activez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit gard馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit gard馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "D駸activer le champ d'isolement\n", + /* 10*/ "D駸activer les syst鑪es de grilles laser\n", + /* 11*/ "Holographier les conspirateurs\n", + /* 12*/ "R馗up駻er la sauvegarde dans le coffre\n", + /* 13*/ "Sortir de l'immeuble\n", + /* 14*/ "Obtenir carte alpha.\n", + /* 15*/ "Garde: \n", + /* 16*/ "Carte Niveau 1\n", + /* 17*/ "Carte du garde\n", + /* 18*/ "Carte du garde obtenue.\n", + /* 19*/ "Obtenir carte alpha.\n", + /* 20*/ "Garde: \n", + /* 21*/ "Carte Niveau 2\n", + /* 22*/ "Carte du garde\n", + /* 23*/ "Carte du garde obtenue.\n", + /* 24*/ "Objet crucial d騁ruit.\n", + /* 25*/ "G駭駻ateur champ d'isolement coup.\n", + /* 26*/ "G駭駻ateur ne peut 黎re rallum.\n", + /* 27*/ "Unit grilles laser coup馥.\n", + /* 28*/ "Unit grilles laser activ馥.\n", + /* 29*/ "Tous syst鑪es grilles laser coup駸.\n", + /* 30*/ "Obtenir cassette DAT.\n", + /* 31*/ "Dr. Caroll: \n", + /* 32*/ "Disque sauvegarde\n", + /* 33*/ "Disque sauvegarde\n", + /* 34*/ "Disque sauvegarde obtenu.\n", + /* 35*/ "D馗odeur porte fix sur panneau d'acc鑚.\n", + /* 36*/ "Commandes piratages lanc馥s.\n", + /* 37*/ "D馗odage porte achev - porte d騅errouill馥.\n", + /* 38*/ "ALERTE INTRUSION - s馗urit dans l'abri.\n", + /* 39*/ "D馗odeur porte plac correctement.\n", + /* 40*/ "D馗odeur porte mal plac.\n", + /* 41*/ "Conspirateurs alert駸.\n", + /* 42*/ "Alarme activ馥.\n", + /* 43*/ "Alarme d駸activ馥.\n", + /* 44*/ "Porte du coffre ferm馥.\n", + /* 45*/ "D馗odeur porte fix.\n", + /* 46*/ "Obtenir explosif porte.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "Explosif porte\n", + /* 49*/ "Explosif porte\n", + /* 50*/ "Explosif porte obtenu.\n", + /* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n", + /* 52*/ "MISSION ACCOMPLIE\n", + /* 53*/ "Mouchard plac correctement.\n", + /* 54*/ "Mouchard mal plac.\n", + /* 55*/ "Obtenir CamSpy.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "CamSpy\n", + /* 58*/ "Une CamSpy\n", + /* 59*/ "CamSpy obtenue.\n", + /* 60*/ "C'est impossible de passer avec tous \nces lasers activ駸.\n", + /* 61*/ "La salle de r騏nion doit 黎re droit devant. \nIl est temps d'utiliser la CamSpy.\n", + /* 62*/ "La combinaison du coffre est tr鑚 complexe. \nLe d馗odeur va mettre plus de temps.\n", + /* 63*/ "Il faut partir maintenant! Je retourne vite \nla porte de tout l'heure.\n", + /* 64*/ "Objet crucial d騁ruit.\n", + /* 65*/ "Reculez, Joanna. Nous allons vous ouvrir \nun passage.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "D騁onateur\n", + /* 69*/ "D騁onateur\n", + /* 70*/ "D騁onateur obtenue.\n", + /* 71*/ "CamSpy d騁ruite - abandonner la mission.\n", + /* 72*/ "Nous avons r馗up駻 le Sapiens chez Carrington \net chang son programme. Il n'a plus de \npersonnalit. Cela 騅itera de futurs \nincidents.\n", + /* 73*/ "Cela r馘uira son efficacit. Mon 駲uipe le \nm鈩era au centre. Ils prendront donc \ndes risques inutiles. Vous auriez d \npr騅oir ce d騅eloppement de conscience chez \nle Sapiens.\n", + /* 74*/ "Comment pr騅oir une chose pareille?! \nEt pourquoi suis-je la seule porter \nle chapeau? Et lui alors?\n", + /* 75*/ "Le Pr駸ident a-t-il refus votre demande \nde pr黎 du Pelagic II?\n", + /* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n", + /* 77*/ "Non! J'ai peut-黎re sous-estim son ct \nint鑒re. Mais nous avons un plan de \nsecours. Nous agirons d鑚 que l'駲uipe \npr駸identielle arrivera la base a駻ienne. \nJe n'ai besoin que d'un 馗hantillon de la \npeau du Pr駸ident.\n", + /* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n", + /* 79*/ "Mr. Carrington ne b駭馭iciera d'aucune aide \next駻ieure. L'駲uipement que vous nous \navez offert est install au Nevada et est \nop駻ationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n", + /* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de d騁ruire tout ce qui ne veut pas \nfonctionner. Souvenez-vous-en pendant \nl'ex馗ution de votre 'plan de secours.'\n", + /* 81*/ "Agent Dark au rapport! Pr駱arez-vous \nrecevoir les donn馥s de la r騏nion. \nDemande prioritaire d'une 駲uipe de \nl'Institut pour prot馮er le Pr駸ident \navant son d駱art pour l'Alaska.\n", + /* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tt a 騁 \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, l o les \nrescap駸 et les d饕ris ont d 黎re amen駸. \nRevenez au poste et pr駱arez-vous \npour un d駱art imminent. \nCarrington, termin.\n", + /* 83*/ "Secteur 51? Et le Pr駸ident alors?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_g.c b/src/files/lang/jap-final/depo_str_g.c new file mode 100644 index 000000000..268459faf --- /dev/null +++ b/src/files/lang/jap-final/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nAuf dem Garagen-Deck des Geb舫des befindet sich eine Vorrichtung, die den Einsatz jeglicher Rekorder verhindert. Finden Sie das Ger舩 und schalten Sie es ab! Anschlie゚end sollte der CamSpy die Daten ohne Probleme bermitteln knnen.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Geb舫de zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten knnen, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persnlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|5. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierte Tr, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 1*/ "G5-BUILDING\n", + /* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Geb舫de zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten knnen, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persnlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|4. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierte Tr, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persnlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|3. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierte Tr, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Setzen Sie den Generator au゚er Kraft!\n", + /* 10*/ "Deaktivieren Sie das Laser-Netz!\n", + /* 11*/ "Holografieren Sie die Verschwrer!\n", + /* 12*/ "Stehlen Sie die Sicherheitskopie!\n", + /* 13*/ "Verlassen Sie das Geb舫de!\n", + /* 14*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 15*/ "Level 1 Schlsselkarte\n", + /* 16*/ "der Wache\n", + /* 17*/ "Schlsselkarte der Wache\n", + /* 18*/ "Schlsselkarte der Wache aufgenommen\n", + /* 19*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 20*/ "Level 2 Schlsselkarte\n", + /* 21*/ "der Wache\n", + /* 22*/ "Schlsselkarte der Wache\n", + /* 23*/ "Schlsselkarte der Wache aufgenommen\n", + /* 24*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 25*/ "Generator wurde abgeschaltet.\n", + /* 26*/ "Der Generator kann nicht wieder gestartet werden.\n", + /* 27*/ "Laser-Netz wurde deaktiviert.\n", + /* 28*/ "Laser-Netz wurde aktiviert.\n", + /* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n", + /* 30*/ "Erlangen Sie das DAT-Tape.\n", + /* 31*/ "Dr. Carolls\n", + /* 32*/ "Sicherheitskopie\n", + /* 33*/ "Sicherheitskopie\n", + /* 34*/ "Sicherheitskopie aufgenommen\n", + /* 35*/ "Tr-Decoder wurde an der Konsole angebracht.\n", + /* 36*/ "Crack-Routine wurde initiiert.\n", + /* 37*/ "Crack-Vorgang abgeschlossen - Tr wurde entriegelt.\n", + /* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskr臟te sofort ins Kellergescho゚!\n", + /* 39*/ "Tr-Decoder wurde korrekt platziert.\n", + /* 40*/ "Tr-Decoder wurde nicht korrekt platziert.\n", + /* 41*/ "Die Verschwrer wurden alarmiert.\n", + /* 42*/ "Alarm wurde aktiviert.\n", + /* 43*/ "Alarm wurde deaktiviert.\n", + /* 44*/ "Die Safetr ist versperrt.\n", + /* 45*/ "Tr-Decoder wurde angebracht.\n", + /* 46*/ "Erlangen Sie den Sprengsatz.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "Sprengsatz\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Sprengsatz aufgenommen\n", + /* 51*/ "Zielerreichung unvollst舅dig - MISSION FEHLGESCHLAGEN!\n", + /* 52*/ "MISSION ERFOLGREICH\n", + /* 53*/ "Sender wurde korrekt platziert.\n", + /* 54*/ "Sender wurde nicht korrekt platziert.\n", + /* 55*/ "Erlangen Sie den CamSpy.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "CamSpy\n", + /* 58*/ "Ein CamSpy\n", + /* 59*/ "CamSpy aufgenommen\n", + /* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n", + /* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit fr den CamSpy.\n", + /* 62*/ "Der Safe-Code ist sehr ausgeklgelt.\nDer Decoder wird etwas mehr Zeit bentigen.\n", + /* 63*/ "Zeit zu gehen! Ich muss zu der Tr, die ich \nvorhin 'pr舊ariert' habe.\n", + /* 64*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Detonator aufgenommen\n", + /* 71*/ "Der CamSpy wurde zerstrt - Brechen Sie die Mission ab!\n", + /* 72*/ "Wir haben uns den Sapienten von Carrington zurckgeholt \nund sein Programm ver舅dert. Es hat nun keine \nPersnlichkeit mehr. Daher sind auch keine \nweiteren Zwischenf舁le mehr zu befrchten.\n", + /* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie h舩ten \nvoraussehen mssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n", + /* 74*/ "Niemand h舩te das voraussehen knnen! Und ich \nlehne es ab, dafr verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n", + /* 75*/ "Der Pr舖ident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n", + /* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig bersch舩zt haben?\n", + /* 77*/ "Nein! Ich habe nur seine Entschlossenheit untersch舩zt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Sttzpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPr舖identen.\n", + /* 78*/ "Ha! Vorausgesetzt, es gibt keine Strma゚nahmen. \nWenn Carrington eins und eins zusammengez臧lt hat, \ndann ist Verst舐kung schon unterwegs.\n", + /* 79*/ "Carrington wird keine Hilfe von au゚en erhalten. \nDie Technologie, die Sie uns zur Verfgung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit knnen wir jedes Flugzeug vom Himmel holen.\n", + /* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstrt werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n", + /* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nワbertragung der Aufzeichnung vor. Ich beantrage ein \nUntersttzungsteam des Instituts zum Schutz des \nPr舖identen, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorit舩 Eins.\n", + /* 82*/ "Dafr ist nun keine Zeit, Agent Dark. W臧rend \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde ber Nevada abgeschossen. \nDie dafr verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nワberlebende und die Wrackteile gebracht. Bereiten \nSie sich fr die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n", + /* 83*/ "Area 51? Aber was geschieht mit dem Pr舖identen?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_i.c b/src/files/lang/jap-final/depo_str_i.c new file mode 100644 index 000000000..0480b5605 --- /dev/null +++ b/src/files/lang/jap-final/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato, la TeleSpia potr trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disattiva generatore segnali\n", + /* 10*/ "Disattiva il sistema delle griglie laser\n", + /* 11*/ "Olografa i cospiratori in riunione\n", + /* 12*/ "Prendi copia backup dalla cassaforte\n", + /* 13*/ "Esci dall'edificio\n", + /* 14*/ "Procurati chiave alfa\n", + /* 15*/ "Guardia:\n", + /* 16*/ "Chiave 1ー piano\n", + /* 17*/ "Chiave della guardia\n", + /* 18*/ "Presa chiave della guardia\n", + /* 19*/ "Procurati chiave alfa\n", + /* 20*/ "Guardia:\n", + /* 21*/ "Chiave 2ー piano\n", + /* 22*/ "Chiave della guardia\n", + /* 23*/ "Presa chiave della guardia\n", + /* 24*/ "Distrutto strumento essenziale alla missione\n", + /* 25*/ "Disattivato generatore segnali di disturbo\n", + /* 26*/ "Impossibile riaccendere il generatore\n", + /* 27*/ "Disattivata unit griglie laser\n", + /* 28*/ "Attivata unit griglie laser\n", + /* 29*/ "Disattivati tutti i sistemi griglie laser\n", + /* 30*/ "Procurati nastro DAT\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco di backup \n", + /* 33*/ "Disco di backup\n", + /* 34*/ "Preso disco di backup.\n", + /* 35*/ "Decodificatore porta in azione\n", + /* 36*/ "Decodifica in corso...\n", + /* 37*/ "Decodificatore ha finito: porta aperta.\n", + /* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n", + /* 39*/ "Decodificatore piazzato correttamente\n", + /* 40*/ "Decodificatore in posizione errata\n", + /* 41*/ "Allertati i cospiratori\n", + /* 42*/ "Attivato l'allarme\n", + /* 43*/ "Disattivato l'allarme\n", + /* 44*/ "Bloccata porta di sicurezza \n", + /* 45*/ "Decodificatore in azione\n", + /* 46*/ "Procurati Esplodiporta\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Esplodiporta\n", + /* 49*/ "Esplodiporta\n", + /* 50*/ "Preso Esplodiporta\n", + /* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 52*/ "MISSIONE COMPIUTA\n", + /* 53*/ "Cimice piazzata correttamente\n", + /* 54*/ "Cimice in posizione errata\n", + /* 55*/ "Procurati TeleSpia\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "TeleSpia\n", + /* 58*/ "TeleSpia\n", + /* 59*/ "Presa TeleSpia\n", + /* 60*/ "ネ impossibile passare finch sono \nattivi quei laser.\n", + /* 61*/ "Quella dev'essere la sala riunioni. \nネ ora di usare la TeleSpia.\n", + /* 62*/ "La cassaforte criptata. \nIl decodificatore ci metter un po'.\n", + /* 63*/ "ネ ora di andare! Passiamo per la porta che ho \npredisposto!\n", + /* 64*/ "Distrutto strumento essenziale alla missione.\n", + /* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonatore\n", + /* 69*/ "Detonatore\n", + /* 70*/ "Preso detonatore.\n", + /* 71*/ "Distrutta la TeleSpia - Missione fallita\n", + /* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalit, cos non \navremo pi spiacevoli sorprese.\n", + /* 73*/ "Questo ridurr la sua efficienza. La mia \nsquadra dovr portarlo subito al centro, \nma ci li metter in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n", + /* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n", + /* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n", + /* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n", + /* 77*/ "No! Avr sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ci che mi serve \ndal Presidente un campione di tessuto.\n", + /* 78*/ "S... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avr gi chiamato i rinforzi!\n", + /* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato stata \ninstallata in Nevada ed gi operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n", + /* 80*/ "Ci significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ci che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n", + /* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n", + /* 82*/ "Ora non c' tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo stato abbattuto \nin Nevada. Il colpo stato sparato dall'\nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n", + /* 83*/ "L'Area 51? E che ne sar del Presidente?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_s.c b/src/files/lang/jap-final/depo_str_s.c new file mode 100644 index 000000000..e7b81a6ea --- /dev/null +++ b/src/files/lang/jap-final/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Hmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisin de cualquier informacin grabada por la C疥ara Espa. Una vez apagado, la C疥ara Espa puede enviar cualquier grabacin al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla L疽er\n\nUn examen del suministro energ騁ico del Edificio G5 indica una red de rejillas l疽er. Estas rejillas est疣 colocadas especficamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estar limpio.\n\n|Objetivo Tres: - Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla L疽er\n\nUn examen del suministro energ騁ico del Edificio G5 indica una red de rejillas l疽er. Estas rejillas est疣 colocadas especficamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estar limpio.\n\n|Objetivo Dos- Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Desactivar generador de campo hmedo\n", + /* 10*/ "Desactivar sistemas de rejilla l疽er\n", + /* 11*/ "Holografiar reunin de conspiradores\n", + /* 12*/ "Recuperar copia del Dr. Caroll\n", + /* 13*/ "Salir del edificio\n", + /* 14*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 15*/ "Guarda:\n", + /* 16*/ "Llave de Nivel 1\n", + /* 17*/ "Llave Magn騁ica del Guarda\n", + /* 18*/ "Llave Magn騁ica del Guarda obtenida\n", + /* 19*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 20*/ "Guarda:\n", + /* 21*/ "Llave de Nivel 2\n", + /* 22*/ "Llave Magn騁ica del Guarda\n", + /* 23*/ "Llave Magn騁ica del Guarda obtenida\n", + /* 24*/ "Objeto crtico de la misin destruido.\n", + /* 25*/ "Generador de campo hmedo apagado.\n", + /* 26*/ "El generador no puede reiniciarse.\n", + /* 27*/ "Unidad de rejilla l疽er apagada.\n", + /* 28*/ "Unidad de rejilla l疽er activada.\n", + /* 29*/ "Todos los sistemas de rejilla l疽er apagados.\n", + /* 30*/ "Obt駭 la cinta de Datos.\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco de seguridad\n", + /* 33*/ "Disco de seguridad\n", + /* 34*/ "Disco de seguridad obtenido.\n", + /* 35*/ "Decodificador de puertas colocado en el acceso.\n", + /* 36*/ "Iniciando rutinas de apertura.\n", + /* 37*/ "El decodificador de puertas termin: puerta abierta.\n", + /* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n", + /* 39*/ "Decodificador de puertas colocado correctamente.\n", + /* 40*/ "Decodificador de puertas colocado incorrectamente.\n", + /* 41*/ "Los conspiradores han sido alertados.\n", + /* 42*/ "Alarma activada.\n", + /* 43*/ "Alarma desactivada.\n", + /* 44*/ "La puerta de la caja fuerte est cerrada.\n", + /* 45*/ "Decodificador de puertas colocado.\n", + /* 46*/ "Obt駭 el Revienta-puertas.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Revienta-puertas\n", + /* 49*/ "Revienta-puertas\n", + /* 50*/ "Revienta-puertas obtenido.\n", + /* 51*/ "Objetivos incompletos: MISIモN FALLADA.\n", + /* 52*/ "MISIモN CONSEGUIDA\n", + /* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 55*/ "Obt駭 la C疥ara Espa.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "C疥ara Espa\n", + /* 58*/ "Una Cam疵a Espa\n", + /* 59*/ "C疥ara Espa obtenida.\n", + /* 60*/ "No hay ningn camino posible mientras \nesos l疽eres est駭 activos.\n", + /* 61*/ "Eso de ah delante debe ser la sala de reuniones. \nHora de usar la C疥ara Espa.\n", + /* 62*/ "La caja fuerte est fuertemente encriptada. \nEl decodificador va a tomarse su tiempo.\n", + /* 63*/ "。Hora de irse! Vamos a la puerta que cre \nantes.\n", + /* 64*/ "Objeto crtico de la misin destruido.\n", + /* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonador\n", + /* 69*/ "Detonador\n", + /* 70*/ "Detonador obtenido.\n", + /* 71*/ "La C疥ara Espa ha sido destruida: abortar misin.\n", + /* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programacin. Nunca m疽 tendr \npersonalidad, as no podr haber posibles \nfuturos incidentes.\n", + /* 73*/ "Esto reducir su eficiencia. Mi equipo tendr \nque llevarlo al ncleo por s mismo. Esto les \npondr en peligro. Debas haber anticipado \nque la IA podra desarrollar un problem疸ico \ncdigo moral.\n", + /* 74*/ "。Nadie podra haber predecido eso! 。Y me \nmolesta que me echen la culpa de ello! \nソQu pasa con 駘?\n", + /* 75*/ "ソEl Presidente no ha admitido tu peticin \nde pr駸tamo del Pelagic II?\n", + /* 76*/ "ソNo podra ser que hayas sobreestimado \ntu influencia sobre 駘?\n", + /* 77*/ "。No! Quiz haya menospreciado su resolucin. \nTenemos un plan de contigencia preparado, \ny comenzar tan pronto como el s駲uito presidencial\nllegue a la base a駻ea. Todo lo que necesito del \nPresidente es una muestra de tejido cut疣eo.\n", + /* 78*/ "。Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisar a los refuerzos.\n", + /* 79*/ "No habr ayuda exterior para el Sr. Carrington. \nLa tecnologa que nos diste est instalada en \nNevada y es totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n", + /* 80*/ "ソEntonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n", + /* 81*/ "。Agente Dark informando! Preparaos para \nrecibir los datos de la reunin. \nPeticin prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n", + /* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nチrea 51... All es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aqu. Carrington fuera.\n", + /* 83*/ "ソAl チrea 51? ソPero qu pasa con el Presidente?\n", +}; diff --git a/src/files/lang/destE.c b/src/files/lang/jap-final/destE.c similarity index 100% rename from src/files/lang/destE.c rename to src/files/lang/jap-final/destE.c diff --git a/src/files/lang/destJ.c b/src/files/lang/jap-final/destJ.c similarity index 100% rename from src/files/lang/destJ.c rename to src/files/lang/jap-final/destJ.c diff --git a/src/files/lang/destP.c b/src/files/lang/jap-final/destP.c similarity index 100% rename from src/files/lang/destP.c rename to src/files/lang/jap-final/destP.c diff --git a/src/files/lang/dest_str_f.c b/src/files/lang/jap-final/dest_str_f.c similarity index 100% rename from src/files/lang/dest_str_f.c rename to src/files/lang/jap-final/dest_str_f.c diff --git a/src/files/lang/dest_str_g.c b/src/files/lang/jap-final/dest_str_g.c similarity index 100% rename from src/files/lang/dest_str_g.c rename to src/files/lang/jap-final/dest_str_g.c diff --git a/src/files/lang/dest_str_i.c b/src/files/lang/jap-final/dest_str_i.c similarity index 100% rename from src/files/lang/dest_str_i.c rename to src/files/lang/jap-final/dest_str_i.c diff --git a/src/files/lang/dest_str_s.c b/src/files/lang/jap-final/dest_str_s.c similarity index 100% rename from src/files/lang/dest_str_s.c rename to src/files/lang/jap-final/dest_str_s.c diff --git a/src/files/lang/jap-final/dishE.c b/src/files/lang/jap-final/dishE.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/jap-final/dishE.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dishJ.c b/src/files/lang/jap-final/dishJ.c new file mode 100644 index 000000000..6128852f8 --- /dev/null +++ b/src/files/lang/jap-final/dishJ.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "リ竄п項ヒメ艢ム縲ミム∈宦綵n", + /* 9*/ "艢ム縲ミム∈づて\nム縺メワムハ焉クなにナπヲヌ≡\n", + /* 10*/ "リ竄п項ヒメ♂d゚マユ∈宦綵n", + /* 11*/ "ゥ怐メぞチマエ⇔=奄о゚マユ∈づてヌ≡\n", + /* 12*/ "♂d゚マユ∈みマぷエ⇔⊇≫ョャ⊆≪\n", + /* 13*/ "ムだm蚕n", + /* 14*/ "ゥ怐メ騾ハヨママΤ┯ナ∨\n", + /* 15*/ "ムだ∵fト√∨準ゥ怐ソ≒フ√ェ∫♭ニ\n", + /* 16*/ "リ竄п項ヒメ梳怙ヲムマ∈宦綵n", + /* 17*/ "モ高驍黷ヘu∈なにナ梳怙ヲムマ∈ンハ縺ヌ≡\n", + /* 18*/ "梳怙ヲムマ∵ナチンハ縺ト√⇔⊇リヌ∋\n", + /* 19*/ "梳怙ヲムマ∵ナチンハ縺ト√∨\n", + /* 20*/ "リ竄п項ヒメユワ$ム∈宦綵n", + /* 21*/ "ムマノdメゥ怐クなにナ≧閾アヌ≡\n", + /* 22*/ "ムマノdメゥ怐メ閾アマΤ┯ナ∨\n", + /* 23*/ "ム縺諠ホヲト√∨\n", + /* 24*/ "リ竄п項ヒメ♀ミルd≧∈宦綵n", + /* 25*/ "♀ミルd≧∈ンハ縺ナハラ∈fヌ≡\n", + /* 26*/ "♀ミルd≧∈みマぷエ⇔⊇≫ョャ⊆≪\n", + /* 27*/ "♀ミルd≧ンハ縲≦揀レf桷ラリ蚕n", + /* 28*/ "揀レf桙=橿ミハラf\n", + /* 29*/ "リ竄п項ヒメォ縲ハユ∈宦綵n", + /* 30*/ "ォ縲ハユ∈エ⇔ミム窶∈なにヌ≡\n", + /* 31*/ "IRワヨヒマ∈なにナ∨\n", + /* 32*/ "リ竄п項ヒメIRワヨヒマ∈宦綵n", + /* 33*/ "IRワヨヒマ∈エ⇔オカメ♀ミ∈なにヌ≡\n", + /* 34*/ "オカメ♀ミ∵なにト√∨\n", + /* 35*/ "リ竄п項ヒメアワヨヒマ∈宦綵n", + /* 36*/ "d=dハ♀メワムハ焉クоナ⇔磨綵n", + /* 37*/ "ュ⇔メd=dハ♀∵┏ト√∨\n", + /* 38*/ "リ竄п項ヒメ蛟ノd∈宦綵n", + /* 39*/ "ぬはナ⇔ワ゚ハ∩≒ミム窶∈ゐツ宦綵n", + /* 40*/ "ワ$ムラdラ∈みナ∨\n", + /* 41*/ "d=dハ♀早諢┏ト√∨\n", + /* 42*/ "d=dハ♀秩諢┏ト√∨\n", + /* 43*/ "氏メミム窶∈ゐツ宦瘁マタ∨メ♭ニ∵蚕n", + /* 44*/ "≠ヘミマ艨オ∃⊇∩ツ≧∧⊂エ⇔メ∩タ\n", + /* 45*/ "トッ=テ√Åツぺ∀ト∃⊇≡⊂マツ\n", + /* 46*/ "ワ$ムラdラ∈みナ∨\n", + /* 47*/ "蛟ノd♭ぬはニ≫∋Åエ∨メ♭モタ\n", + /* 48*/ "≠ヘミマ艢≠┛ΧÅツ\n", + /* 49*/ "≠ヘミマ艢≠モ求テ∩≒ぁ⇔タ∨∋Åタ\n", + /* 50*/ "ユマоナト√∨\n", + /* 51*/ "リ竄п項ヒメワ$ムラdラ∈宦綵n", + /* 52*/ "イ∈ヱナ∨リル♭ヨヒマ縲マ∈なにヌ≡\n", + /* 53*/ "テ√♭ぉメ縲d蛟マモÅツ\n煤チ∂エ∨=ヘミマ艢エ\n", + /* 54*/ "しじ潤堰朽ムワ縲d蛟ママホ氏ナ∨\n", + /* 55*/ "しじん\n", + /* 56*/ "♂d゚マユ∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭♂d゚マユ∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 57*/ "ユワ$ム∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭ユワ$ム∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 58*/ "艢ム縲ミム∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭艢ム縲ミム∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 59*/ "♀ミルd≧∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭♀ミルd≧∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 60*/ "アワヨヒマ∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭アワヨヒマ∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 61*/ "蛟ノd∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭蛟ノd∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 62*/ "IRワヨヒマ∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭IRワヨヒマ∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 63*/ "ォ縲ハユ∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭ォ縲ハユ∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 64*/ "ワ$ムラdラ∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭ワ$ムラdラ∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 65*/ "梳怙ヲムマ∈ツテ\n噤準゚マ∈縺ナ∨リリ♭ラムハラ蛟フdヨ\n凍捩ワ窶ニハラ♭梳怙ヲムマ∈ツ‡\n噤準゚マ∈モ∃ニ\n", + /* 66*/ "≠ヘミマ艢<煤諤ヨヒマ縲マÅツ\n", + /* 67*/ "ヰ∃ト⊇ツ\nテメΣメm∈曹氏ナ≡⊂ツ\n", + /* 68*/ "ムマノdモテメユテ⊂Åツ\n", + /* 69*/ "テテモ♂°ムワ¥Åツ\n", + /* 70*/ "ミラロヘマ∀ロフマ縺クエ∨\n°縲メ縲d蛟マdÅツ\n", + /* 71*/ "テテ∵キべхリÅ≡=ヘミマ艢ツ\n", + /* 72*/ "テメけモ私チハヨ∀だ⊇⇔⊇≫ツ\n", + /* 73*/ "°dルマ窶臀nぞチ♭宦準゚マ∈縺ニ∀⇒∩⊥≫ツ\n", + /* 74*/ "⌒⊂曹メ宦準゚マ♭モ∃ニテ∀∵♭タ≫ツ\n", + /* 75*/ "°d°ムラ\nぞチ♭宦準゚マ∈窒メ縺ニ∀\n", + /* 76*/ "°d°ムラメぢ≪ス驕瘁諱タ≫ツ\n", + /* 77*/ "♀ミヤd£マ\nぞチ♭宦準゚マ∈縺ヌ†=橿ミ∵ラチツ\n", + /* 78*/ "宦準゚マ♭ぞチメ⌒メ∈づて♭タ≫ツ\n", + /* 79*/ "モ℃d゚d\nぞチ♭宦準゚マ∈縺ヌ†\nモ℃d゚d∈ユ¶テ∀∵♭タ≫ツ\n", + /* 80*/ "縲d蛟マmモvマぁ≫テ∀∵♭タリヌ∋\n", + /* 81*/ "ワムハ烙ルd♀早クみマ√∨\n", + /* 82*/ "ワムハ烙ルd♀秩クみマ√∨\n", + /* 83*/ "ワムハ烙ルd♀刀クみマ√∨\n", + /* 84*/ "ワムハ烙ルd♀煤クみマ√∨\n", + /* 85*/ "にヒ驕秉n怫フ¥゚マ♭∞ヒ∈に≫テ∀∵♭タ≫ツ\n", + /* 86*/ "にフ∽ニ\n怫ヒ¥゚マ♭∞フ∈に≫テ∀∵♭タ≫ツ\n", + /* 87*/ "窶ワ縲嫡ホ蚕n", + /* 88*/ "窶ワ縲売ホ蚕n", + /* 89*/ "窶ワ縲符ホ蚕n", + /* 90*/ "wメのはfマΤ┯ナ∨\n", + /* 91*/ "w∈閠ハラミメ縺ナ∨\n", + /* 92*/ "テメw∈のはfヌ≡\n", + /* 93*/ "テメw∈閠ハラミメ縺ヌ≡\nΨ♯∩√∃⊇メ∵#ムマ縺ニ\n", + /* 94*/ "∧ナ⇔くΒメw蚕n", + /* 95*/ "ォ¥゚マ∈縺ナ∨リリ♭怐準゚マ∈巣ャ縺ニ∀ナオ∵∠\n", + /* 96*/ "ナオ∵∋Åリル∩≒÷ォ¥゚マ∈縺ナ∨リリ♭怐準゚マ∈⌒⊂巣ャ縺ニ∀=ト≒マ怐チナオ∵∠ツ\n", + /* 97*/ "窶ワ縲塘ホ蚕n", + /* 98*/ "ュ⇔メワムハ焉クづてヌ≡\n", + /* 99*/ "ァメワムハ焉クュ⇔づてヌ≡\n順エワムハ焉モニ∬マンハ縺ト√≫メ♭<香サ♭フト⊇\n", + /*100*/ "o゚メヒフマ⊆≫$轢∈烙ネハラナ⇔÷ミランワルd♀∈みヌ≡ツ\n盾みナ∨ルd♀∈≧ァメ$轢∀ろホヌ≡ツ\n", + /*101*/ "ルd♀早ク烙ネハラナ∨\n", + /*102*/ "ルd♀秩ク烙ネハラナ∨\n", + /*103*/ "ルd♀刀ク烙ネハラナ∨\n", + /*104*/ "ルd♀煤ク烙ネハラナ∨\n", + /*105*/ "縲d蛟マん遵∈ユ∩∃チ⇔モ∃≪リヌ∋\n", + /*106*/ "窶ワ縲槍ホ蚕n", + /*107*/ "クのは°縲準゚dハ縺ク閠ハラミメ縺ヌ≡\nウ縲d∈繙フナ⇔$マ焉ク」≪ぁナ⇔フト⊇\n", + /*108*/ "ヵΞモてチw♭ニ蚕n", + /*109*/ "ヤヒ驕モ黷ラナ⇔チ≫w♭ニ\n", + /*110*/ "わべ∈ュチゐツマ<⇔メw∈ほヌ\n", + /*111*/ "縲d蛟マん盾浴メわべ∈ゐツ⇔ナリエ∨\n", + /*112*/ "窶ワ縲埋ホ蚕n", + /*113*/ "窶ワ縲淀ホ蚕n", + /*114*/ "ゥ彌nぞチ♭宦準゚マ∈縺ナ≠⊂テ∀∵♭タ≫ツ\n", + /*115*/ "ァメノ⊇$轢∀ろホヌ≡\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "ィ、=ヘミマ艢ツ\nΒモ裸ウマハロヘマヨメ├ヮ∈ぼエ⇔チ√ツ\n", + /*125*/ "≠ヘミマ艢≧dラ\n", + /*126*/ "┳モワ゚Ыn", + /*127*/ "逐塔」\n", + /*128*/ "|怙「ナムカ逗逐予n\n縲d蛟マリホセ\n縲d蛟マΤΥセ噫ケケ\nワ竄о゚ワセ鰍トしじメぼm\n\n|£ニdセ\n\nクケマ煤チхト√⇔⊇≫∵≦р巣ヲΙモ∃⊇ツぐ√∨黼キΘ∈ぷ¬=コ≒∇≫メネ#マ∈⊇テ∃ニ潤ホモd≠ネマ縲ツぽまメ<°メツ∨縲d蛟マΤΥモ÷縲d蛟マラワマル∨∃d♀∈ルトヌ∨ラ♪♭⊆≫ツヨヒマ縲マぅうメれァτ∃モd≠ネマ縺ヘユ†√≫≡⊂マ∃エ∨ぽまモ÷$dネラ縲≧dラメルd♀轤о∈みマ√∨ツ\n", + /*129*/ "≠ヘ艢レマ\n", + /*130*/ "┳ヤ怎゚Ыn", + /*131*/ "逐Ε\n", + /*132*/ "|怙「ナムカ逗逗凰サ\n\n縲d蛟マリホセ\n縲d蛟マΤΥセ噫ケ\nワ竄о゚ワセыぼしじメぼm\n\n|£ニdセ\n\nぅう♭く⌒ΘΙメワ⊇オカワ$ムツ艢¥°d∈∝ヌ∨≒ぽメホマぁ≫⌒メモ⊇∃⊇ツ驕堰ホもべq≡≪⌒>高レしじ∈きヒ∀ニ≫ツ≠ヘミマ艨マば≒√≫リ♭モぅうぐメ縲d蛟マΤΥ∈ぜぷナ⇔⊇∨ツ\n", + /*133*/ "≧蛟モヨヒマ縲マ\n", + /*134*/ "┳ヤ怎゚Ыn", + /*135*/ "摩茶」\n", + /*136*/ "|怙「ナムカ逗逗逗サ\n\n縲d蛟マリホセ準サササ\n縲d蛟マΤΥセ準サササ\nワ竄о゚ワセ準サササ\n\n|£ニdセ\n\n揣τマ痳シ∃スт巡♭≠ュル窶ラ閠≠d∈юяmマえ≪ワツ⇔タ∨ヨヒマ縲マぅうメツぽメモd≠ネマ縺諷рレニ≫ュハロヘマメ£マ∈早ナ=ネメcoリウ∈ぽメヤニワ∩≒蜈ムルマ縲dニ≫ツ宸ヘメンマワモォナ蛯оラツ\n", + /*137*/ "ユレマ♀♂″d<\n", + /*138*/ "┳モワ゚Ыn", + /*139*/ "凍刄」\n", + /*140*/ "|рщナムセ\n\n♂d゚≧ムマ刀メ縲ハ£ツセbマケナ>アマ」ノト√≫テ∀∈寉ミマム∵≫ツ翼∵d≧dロハ£∈宦エ⇔⊇∃⊇∀Ψ∵アリ∃⊇゚ム£ツム°ヤュマθヨム∃≧蛟モヨヒマ縲マпマセ⇒∨⊥マモ≠ンσ∈ツ†∃⊇ツ\n", + /*141*/ "縲マ縲ムdワ縲マ\n", + /*142*/ "┳ヤ怎゚Ыn", + /*143*/ "楳麻」\n", + /*144*/ "|рщナムセ\n\n揆桷氈メ│┌┐ツユレマ♀♂″d<∀$d縲艪р揆ーマ⊆≫ツ∀⊇エ⇔⌒∞⊇マセb∀凵クトナ⇔⊇≫π♭⇒∃∵エ⇔⊇≫ÅツÅ∵ツ縲マ縺モ┿lτ∃゚氏∵=゚≪┿lτ∃ユレマ♀マモネ∵ヒ∵≒∃⊇≡⊂♭⊆≫ツぽモ揆桷氓氏メ宴寉茶ム∃o∈ュ⇔宦瘁ナタエ⇔⊇≫ツ\n", + /*145*/ "♀ラ゚dヨヒ\n", + /*146*/ "┳aナいム噫「Ыn", + /*147*/ "逗シ父」\n", + /*148*/ "|£ニdセ\n\n♂d゚≧ムマ刀マ≡エ⇔ラなト√∨┳aナい♭≦揀レf桙「bマχπ∵u∩√⇔⊇≫ツさざ∃テ∀マ≠ロモ∈ぷエ⇔⊇∨ツぽメクケマ゙⊇ナい℃モ=奄о゚≧ムマ刀メオヰメ£ママタ└∈ぷ¬リ⊥∨メÅツぽメΑナぶモナτ♭÷ミユ♂ハラ∃ヨヒラ゚d∈∩⌒ナÅナ⇔⊇≫ツ\n", + /*149*/ "モ′ワ\n", + /*150*/ "ムミマヤ怎゚Ыn", + /*151*/ "凍逐帥」\n", + /*152*/ "|£ニdセ\n\nムミマ∀⊇⊂ラリメモムミマツぽモ£窶ラ゚dメ潤園ニd♀п=蛟モヨヒマ縲マメャソ♭x艨ク┘└ナ⇔⊇∨ムミマメx艫ニ∈ナ⇔⊇∨ツ£窶ラ゚dモ⊆≒∇≫メネ#マメ⊇み∀ナ⇔хト√⇔⊇≫ツモ′ワモx艨メナマ♭≠艨マ掾ニ≫⌒メモュ⇔ワ°ロム∀━エ⇔⊇≫ツ\n", + /*153*/ "ワ゚d″マ♀\n", + /*154*/ "┳ヤ怎゚Ыn", + /*155*/ "逐斧項凍帥」タ\n", + /*156*/ "|£ニdセ\n\n∂ツマ翼⇒刋噤メ怙ツクケマg∵゙チ∞ソ⊇它ャマケムマルd縲пク⇔⊇≫ツユレマ♀∂縲マ縺諢蜆諱ナ⇔⊇≫嚆它d£メd≧dツ∧メメテ∀モ⊆リ≪ナ≒√⇔⊇∃⊇ツ\n", + /*157*/ "ワ゚d″マ♀\n", + /*158*/ "ワリ≧dモハはナ∨リルЫn", + /*159*/ "あゎ\n", + /*160*/ "|£ニdセ\n\n刋噪怐メΓΔ∈ぷ⇒ワリ≧dqツoメ≠フd゚d蛟ハ縺ソ≒≦せ♭Ηbメ⊆≫>ナτ∃¥ムワ∈ぁニテ∀∵♭タ≫ツテ√マ≡≪ワリ≧dモx艨テなマテて♭タ≫メ♭⊆≫ツ\n", + /*161*/ "ョャ噬ニικ\n", + /*162*/ "┳ヤ怎゚Ыn", + /*163*/ "斧帥」\n", + /*164*/ "|£ニdセ\n\n゙⊇ナ゚∀ぐ√∨スΠb∈ぷ⇒÷ミユоミユ┳ツケマ翼∵ナ⊇∀Ζ∨テ∀∈ぼ∪⊂∀ニ≫∵÷縲マ縺メ≡⊂∃┳†∩≪マ宦リ√⇔⊇≫ツ%≠ハラ秩ク♂d゚≧ムマ刀マナそツ≫テ∀∈レ∋ÅΒ♭⌒÷縲マ縺諠翼∈辟磨竅ヘモュチ━エ⇔⊇∃⊇ツ翼メス⊥∨Ζモョチ怐⊆≫ツ\n", + /*165*/ "ムミマ\n", + /*166*/ "ムミマモ≠艨d∀ユ†√≫モムミマ♭>オ早マエ⇔x艨ク蛟゚マナ⇔タ∨ツぽ≒モ┳タマナ⇔アΧτ♭⊆≪>アタマモワ°ロムыリいb∵⊆≫∀チ⇔⊇≫ツぽ≒メx艸ヒマ∪ツ≫ルマ゚ラ繧ッモ≧蛟モヨヒマ縲マメル♭>アタ∀メカ∃モリÅぼエ⇔⊇∃⊇ツ\n", + /*167*/ "ワリ≧dq\n", + /*168*/ "ワリ≧dモアqτ∃モムミマラリ♭⊆≫ツぽ≒モムミマ∀┠曹早エ⇔タ∨Β♭≠ュぞマ∃エ⇔≡⊂∂チqマホΧナ∨ツqrンマθタ∃ユミdd∈はヮニ≫テ∀∵ワ⊇ツ∃∃≒≦пモぽ≒モ焉トチ÷′メ≡⊂∃ΚΣÅ∩≒♭⊆≫ツぽ≒モクケマわべτ♭≠ロ≒メマモq⊇メ∵⊆≫∀⌒か∝√⇔⊇≫ツ\n", + /*169*/ "ghワ繧оd\n", + /*170*/ "=モ≫∩紙θ∃モムミマ∵メマ浴熈チル=ネメイ∈゙ナ∨ツヵ∀∃エ⇔モ=ネメれウモ騾ハヨナ∃⊇ツ∧メマモсァmメ∀⇔⇒⌒∃チ∃メネ#マ∵はヮト√⇔⊇∨ツρヘ蛟フdラミ♂ニユ£d∀ユ†√≫テメワ┸モ<ーレメсルホ∈ュ⇔シワマナ⇔ナリ⊂<サ∽ナ⊇b∈ぷエ⇔⊇∨メÅツ∵⌒モ∂δいナ⇔⊇∃⊇∀━∝ヌ≫∨⊥マ≦繝モ巡サモばぱト√=テ√≒メリホ∈腐磨ナ∨ハンd≠#ハ♀∀ちマ≧黽メぽぶマ゙ト√∨ツテメテ∧ン゚マ∞ヌネメくコモムミマÅエ∨メÅツ\n\nンモ焉縺フ它怙逐逗逗炊操ツメx艪麻ィΣメムミマモx艨リメ┳タ∈なにナ∨ツぽ≒モ┳タマθタ∃ぃい゚∈にぁナ∨∵=コ⊃⇔ルマ゚ラ縺モ∀≒=ネメすヲェΝ∈にぎ≫テ∀マナ∨ツ\n\nムミマモ≠艫唐♭か⊃†噫捩操摩斧炊早マ♂゚モ≧諤ワそぞ♭アqτ∃モムミマメワリ≧d∀ζη>焉ト∃qrモニ∬マθqツヨ∀∵エ⇔⊇エ∨ツ┠⊇qツメン∈Θ⇔≠ャメq∵сヘナ∨ツナ∩ナワリ≧dメのrょモ寇操モミ♭窶ぼ轣ク」≪ヶナ⇔ムミマ∈ヲめナ⇔タ∨∵÷ムミマモ∧√マモぢ≒∃∩エ∨ツ\n\nムミママ∀エ⇔>アタ⌒ネ∵ム゚⊇ヨリ∀∃エ⇔タ⇔∪≪≠艨クん┗メ∈ぷエ⇔に⇔⊇∨ツ┳タモメユヒ∀ニァvメぼて♭=リニリニ∃リホマ∃エ⇔タ⇔⊇∨ツぽ≒∵ヵ┳タ∀繞怐ク∀√†=タエ∀$蛟ハラマ∪¬⊇≪≠艸ヒマワチメqツ∈秩タづテニぃい゚∵⊆≫∀━∝√∨ツナ∨∵エ⇔ムミマモ⌒⊂ナ†≒チ割アタ∵⌒エ∀θ┳マ∃≫リ♭灸繞怐モ∀≒マにぎエ⇔⊇チテ∀マナ∨メÅエ∨ツ\n\n噫捩操凰膚早マ≧蛟モヨヒマ縲マ∵x艨メぞチマ⊇∨ムミマメョ麾ィ∀繞怐ク∀≫テ∀マΤ┯ナ∨ツぽモ┳タ∀ムミマメユぶマハ縺メ⊆≫£マ∈ヨΧナ>アタ∀ムミマメカ∃ぁう⊇∈レ⊥≫≡⊂蜃早ナ∨ツムミマモヨヒマ縲マメ£ママΧナ≠ロモΖヨ♭タ≫┳ΣÅ∀エΠナ∨メ♭≠ロマ翼∨¬メ∈ツ煤ス≠ロメδ掾ソ≒∧√∈なモニ≫テ∀∈ゥぃナ∨ツ\n\n噫捩逐逗逗昧操÷ワリ≧dメのrょ∵ン゚マメハンd≠#ハ♀∈なにナ∨ツぽ≒モニ∬マ=サ⇒⌒メコ秩ホぶマ♭x艨メрщ∈リ⊥∨ツ┳∂てΣ∈黻ナ∞チ∋Åメ⊆≒∇≫∈∧テ∩≒秩タぁナ⇔⊇エ∨メÅツテ⊂ナ⇔=リ∨∨チマワリ≧dモ氏メ∵マチ∋♭⊇≫テ∀∈⇒タ∀⊥∨ツナ∩ナ≦уマ∧メマミランワニ≫マモ≠ロ≒マ⌒οxΚΣメνツ∵ョャ♭⊆エ∨ツ\n\nワリ≧dモ浴焉メレd煕ルン∩≒<翼∨¬マぅbナ⇔チ√∧⊂∃う刀クワ縲ミハ£ナ∨ツ∧メワ縺メ曹ニく梶諱奄о゚≧ムマ刀⊆エ∨ツぽ≒モ刀メ縲ハ£÷ユレマ♀♂″d<マ繞怐ク宦痼÷メ⊇テ∀Å≒ツメ′≠轢ワ∈ぷ¬∩ツ∨ツメワ¬∽∋∧∋∃′≠轢ワモ⊆≫モ∵∃⊇メÅ∵ツп奄о゚≧ムマ刀マшメメрщ∈み艨蛛ヌ≫∩∝≪マ÷ワリ≧dメす∋Å窶ラ閠≠d∈ツ煤ス≫テ∀マ≡エ⇔≠艸ヒ♭く⌒θタ⊇う刀マニ≫テ∀∈ぜ閨ナ∨メÅツ♂d゚≧ムマ刀諱ン≒∃ツ√†∃≒∃⊇テ∀モ≦揀レf桙「b∈ぷエ∨噫「蛟ハ縺ク⇒チ≫テ∀♭⊆エ∨ツテ√モィナ⊇ロэ♭モ⊆エ∨∵≠ロ≒マモぃい∃n蛛メテ∀♭⊆エ∨ツテ⊂ナ⇔テメ£≠ネラ縺モワ゚d縺ナ∨ツ\n\nユレマ♀モ揆桷氈メ│┌┐÷縲マ縲ムdワ縲ママテメを怐クぷ¬∩ツ∨ツ縲マ縺モニ∬マを怐マ蛛蛛エ∨∵>延割щъメヨゥぃ∈Ωキ∩≒Η≡⊂∀ニ≫ぽメ蜃早モ<ニικマがΞ⌒フト√∨ツθικ∈シ≒ヌマчшощъ∈ヨニ≫テ∀モあぃいÅエ∨メ♭≠ロ≒モ⌒エ∀ェめ∃を怐ク⇔∨ツθικ∈ラdマ∀uタ∩⊃⇔≠ロ≒メアタ∃≡⊂マルマ縲dニ≫メÅツテ√∵Τ┯ニ√†÷ユレマ♀∀縲マ縺マモワリ≧d∩≒ト≒∃≫¥d艢ワ∵ぜ閨ト√∨ツ\n\nナ∩ナ><ルモ∧∋∃マミ⊇⌒メ♭モ∃∩エ∨ツワリ≧dメのrょ∨¬メ宦メへ⊇モ÷蛟フdラミ♂ニユ£d∈みマニ≫テ∀♭≠みΒモ∧√∈エ⇔ムミマ∈ヱナ≫掾マ≠艨ク艨ナマばぱナ≡⊂∀ナ⇔⊇∨メÅツÅ∵÷ユレマ♀⌒縲マ縺ワ浴メ掾マ¶≒フ∵エ∨凰∀セbヨメケ∩≒<翼∨¬∵≧ト√⇔⊇≫∀⊇⊂ぃい゚マュチΨ∵⇒∩∃∩エ∨ツ\n\nナ∩ナ♂d゚≧ムマ刀モ=ノリ∨リ♭モ⊆≫∵=コ≫⌒メ∈ロ≪ぁナ⇔⊇∨ツ∧√モ÷ユレマ♀∨¬メを怐諤ゎ≒∩マ∪∩ナ⊇テ∀マΨ♯チÅツメナ゚∈ぷエ⇔⊇∨ツ∧√∵ン゚マロハ£メ揀レ∈f栫ニ≫∨⊥マロ≪ぁト√∨噫「ヤアaナいпエ∨メÅツテメ噫「∵<浮メメを怐マニ≫タ└∈ユレマ♀マー驕ソツ∨∀タ÷ユレマ♀モぽメ┳氏クヱナ∽⊂∀ナ∨ツぽまモ=テメ噫「∵ゑを∃テ∀∈ミ⊃ェ∫⇔⊇≫∀エΠナ∨メÅツ♂d゚≧ムマ刀諠・≫⌒メ≡≪⌒エ∀ワチメ⌒メ∵ん∝√≡⊂∀ナ⇔⊇≫テ∀∵ニ∝∩エ⇔⊇∨噫「モ÷♀ラ゚dヨヒメシ∈エ⇔÷ヨヒマ縲マぅうヨ∀νツ∈⊥∨メ♭⊆エ∨蚕n", + /*171*/ "ムマワ繧оd\n", + /*172*/ "р巣ヲΙメ∃⊇ル┳ワ$ムメ≠ヘミマ艢≧dラマ鰍オじ∵煤ス≒√∨ツ∧√モ=奄о゚≧ムマ┨刀劇メxフモミ∩≒≠ヤアメ∈お⊇ぁニ∀⊇⊂⌒メÅエ∨ツ∈なにナ∨∀タ=ヘミマ艨モ∧メ=橿ラ゚dヨヒ∀モ≦пモ♂d゚≧ムママ≡エ⇔ハ≒√∨┳aナい♭⊆≫テ∀∈ナエ⇔ロヘハラ∈ゐツ≫ツナ∩ナぽまモ∧メリリ♀ラ゚dヨヒ∈φュ∃∀テ∽リ♭ニ≫チ≠オじ∈だぼナ∨ツ′nマミd∵∃≪≠怩掾ソ≒メ桙氈モあぃいマ∃エ∨ツ≠ヘミマ艨ノ¬モ′゚ヒメ#d縺ヨ∀ユ∩⊇>窒メメ桙氓ンσ♭⊆≫┻ぶメぇえマぢ≫チ≠゚ナチq∝∃チ⇔モ∃≒∃∩エ∨ツ\n\n♀ラ゚dヨヒ∈゚∝√∨♂d゚≧ムマモ∧メ嫡クΒマ=蛟モヨヒマ縲マソ┳∈╋τ∀ナ⇔黷ラマぁ∨ツヨマ⊇∨ぽ∈┳レマ∀エ∨メ♭⊆≫ツぽ≒モヨヒマ縲マメ驕ヘ秩タ⊃マ≠ロ≒メ怫逐♭⊆≫┳aナいメ♀ラ゚dヨヒ∈ヶニ≡⊂マャナ⇔タ∨ツ♂d゚≧ムマモΨ♯⊇⇔⊇∃∩エ∨∵≠ロ≒メоナ⇔⊇≫♀ラ゚dヨヒモ≦пモ∧メヨメmマ⊇∨ツヨヒマ縲マ∩≒♂d゚≧ムマメを怐マ⇒⊇⇔メレ└∈ゐツ⇔⊇≫∀テ∽♭⊆エ∨メ♭⊆≫ツ≠ヘミマ艨モ翼メ¥ワ♭⊆≫ヨヒマ縲マ∈∀⊂∀⊂おぁナ∨∵=橿ラ゚dヨヒモよマ縺繝≒√∨Β♭⊆エ∨ツナ∩ナヨヒマ縲マモ≠ロメマ♀♭⊆≫ムミマメワ%ロヒワ縺メνツ∈ユ¶メマニ∃∈Η∨∀エΠナ∨メÅエ∨ツ\n\n≠ヘミマ艨モニ∬マロユ÷ヨ∀γ∋Åツ♂d゚≧ムマメみけ♭⊆≫∀⊇∝√≫斧ルd#dロヘマメ′♭ラ∩√≫d窶ニマ∈ワ$ムニ≫∨⊥Åツテメd窶ニマ∈腐磨ナ∨ルン=奄о゚≧ムマメを怐マモ揆桷氈メ│┌┐♭⊆≫縲マ縲ムdワ縲マ∵蛛蛛エ⇔⊇≫テ∀=リ∨を怎kメd≧d♭⊆≫∀━∝√≫╂ナ⊇刋噪怐メヨリ∵ゎ≒∩マ∃エ∨ツ縲マ縺諠ニικ∈マト≒ニを怐クゎ≒∩マニ≫メ∈⊇⇔=ヘミマ艨モニ∬トリ∧√∈ぅうヨ∀繞怐ナ∨ツナ∩ナ÷縲マ縺ク┏⊥≫掾マ=ワエ∀帥香メしじ∵なΚナ⇔⊇∨テ∀∈ナ≫テ∀マ∃≫ツ\n\nムミマメワ%ロヒワ縺ノ¬メ∵がΣ∩マべ¬ぺ∀ト√≠ーk∂ケ∵⊇モ÷轣求メモミ斧早ヘ⊇⊂┬メオカ┤xヨ∀ざ†√⇔⊇∨ツΚヨ∵⊇∨≒おぁナ<メケ∵⊇⌒ぴψニ≫≡⊂マ∀⊇⊂」┌∈ゐツ⇔=ヘミマ艨モ┤xマムナ=ネテマ⊇∨┻ぶメワ$ム∀ホ焉ナ∨ツ=マエ∨≠ヘミマ艨ノ¬モ÷ヨヒマ縲マぅうメオカ∈ナ≫テ∀マ∃≫ツ獅」うメマ♀ムミマ∀モ÷d∀ナ⇔ナ≒√≫モムミマÅエ∨メÅツぽま∵が∀∩νツぁナ∨ムミマモモ′ワ∀シ∈驕ノツぽモムミマメワ%ロヒワ繧盾凵メけネ∈γ∋♭⊇∨x艫ニメ¥♂ニd♀Åエ∨メÅツ\n\nモミ斧早メハロヘマ∈テ∃ナ⇔=ヘミマ艨モθικメφュ∈ぎ≫しじマゅ≫テ∀∵♭タ∨ツぽまモミワユメε┬┤x♭ワ烙フd♂ワマぬはナ<ニικ┿ヨδヨ∀ぢ≪っ∋ÅメÅエ∨ツγぼδ∵フヘニ≫∀÷縲マ縺ヘぬはナ∨ワリ≧d∨¬モトエ∧チテて∈ラリナ∨氏諤=ネテマモぽ≒∈┏⊥≫チ≠ヘミマ艨諱サ∨ツぽまモθικ∈桙麾ユ£ンヨ∀ナ∨∵=ネメマ⌒縲マ縺ノ¬モθικ∈秩タ≪っ⌒⊂∀÷ワリ≧dメョ麾ィ∈θικ┿ヨδヨ∀リd″繙ルトヌ⇔タ∨ツ≠ヘミマ艨モリd″マ閧イ∈煤ス∨∵≠ュマばぱニ≫テ∀モ♭タ∃∩エ∨ツモ′ワ∵∂∠∈Η<翼メョ麾ィ∈騾ムワ¢d♀♭kふ∨≪トヌ≫テ∀マ≡エ⇔リd″∈麻ョナ∨ツ刀ヒメδkモミワユメヨ∀ξぺナ⇔ぼタ<ニικ┿ヨδメ桙氈楳ハ♀モシпなキト√∨ツ\n\nΧイ∈宦痰縺ニ∀≠ヘミマ艨モぅうマ繞怐ク宦艨シ∀ナ∨∵÷ワリ≧dメョ麾ィ∩≒ぁ≫こごλμマ≡≪ρΖ∵♭タ∃チ∃エ⇔⊇∨ツぽまモメm∈モ′ワ∀θικ∈оナマぼエ∨∵≠ハはワリ≧d∨¬マ♭チ∝ナ∨ツぽ≒⌒≠ヘミマ艨ンモ′ワ∂θικ∀∧メぷ¬Σcカ∈оナ⇔⊇∨メÅツ≠ヘミマ艨モξぺナ∨ワリ≧dメョ麾ィ∩≒早ヒメwd£∈ト⊇∩ツ⇔⊇∨∀テ∽<ニικメラdマ∈なにナ∨ツぽまモニ∬トリラdマ∈ほナ≠アごλμメはu∈ロヒハ縺メマナ⇔<ヒツ∈ユ∋Åツワリ≧dメを怐モリ∨ナ⇔⌒≠ヒト√<ニικモシпÅエ∨ツ縲マ縺モ∧メんマ≡≪≠ロメトメみマ≡エ⇔=コ∝√∃ざ驕ク氏レテ∀マ∃≫ツ\n\nナ∩ナワリ≧dモリÅ⊆タ≒⊥⇔⊇∃∩エ∨ツみσ∈ツ†∃⊇わべマぁ∨ワリ≧d∨¬モ<カキメчшрщъ%≠ハラ秩ヘ∧メ∈ロd≠ヒハラナ⇔>メ⊆≫#ムマ縺ヨ∀ユ∩エ∨ツ≠ヘミマ艨ヘモ′ワモ≠浴メテて∈こごニ≫チ>ヨ∀ぢ≪テ∋Åツ∧テ♭ぽま∨¬モ÷ワリ≧dメ┨ふメへ⊇∈⇒タ∀⊥≫テ∀マ∃≫ツwメыьロэ∈ニマこごナ>延割щъ∈宦痺磨ナ∨Β♭=ヘミマ艨ヘモ′ワモчшヨ∀ユ∩エ∨ツчш♭ぽま∨¬∵に∨⌒メモθ∃ン゚マロハ£♭⊆エ∨ツワリ≧dマ≡エ⇔ハ≒√∨ぁ≪∩≒ン゚マロハ£マ≫テ∀∵♭タ∨ツ∧テ♭ぽま∨¬モワリ≧dqメげkマ♭チ∝ニツワリ≧d∨¬⌒=テメ∈━⊇ρ≪マルマ縲dモ♭タ⇔⊇∃⊇≡⊂Åエ∨ツナ⇒テ⊇ワリ≧d∀q⊇÷ン゚マ∈∩∝ナ∃∵≒=ヘミマ艨ヘモ′ワモルミヨ∀∨♪≪⇒⊇∨ツ∧テマモ∩⇒⇔♀ラ゚dヨヒÅエ∨┳aナい∵⊇∨ツ≠ヘミマ艨謔ロメ┳氏クтテトヌ≫∀≠ロモ≠ヘミマ艨ヘモ′ワマ=ニ∬マン゚マロハ£∩≒桙氈ニ≫≡⊂マ驕∨ツぽモ∃ワ┸∈┥∋Åテメン゚マロハ£∈<羅」ニ≫テ∀♭」ばニ≫∀⊇⊂ぶマ∈ツ∋ÅメÅツ\n\nΒ┷ヨヒマ縲マぅうマ⇔=ヘミマ艨モム縲騾メワ♭メ$d窶ニヨ∀ぁなニ≫├ヮ∈ナ⇔⊇∨ツη=コ∨≪モ$蛟ハラマ∪¬⊇エ∨ツワリ≧dメのrょメΚタケ≪∵÷ン゚マ♭メんメтマヨヒマ縲マぅう∈∪∧エ⇔タ∨メÅツ≠ヘミマ艨モ私チハメφュ∈せぜナ⇒⇒÷ワ゚ハメおν∃♪♭Σno∈ォ≪ぴエ∨ツ≠ヘミマ艨謔ユ¬テ∨⊃⇔⊇≫マぅうメワ゚ハモラ∀∋♪桙氈タ∨∵≠曹窒香マぽまモネ∈フエ⇔Ψ∈ん⊇÷ワリ≧dマロ≒∝√⇔ナリエ∨ツ\n\nΨ∵⇒チ∀=ヘミマ艨モワリ≧d黽メヌリ⊇o゚マ÷ユレマ♀∀嫡ア♭トΡト√⇔⊇∨ツ∪♪∽⊇∨テ∀マ÷ユレマ♀モ浴焉メ驕クンムマナ⇔=ヘミマ艨マ桙氈メ烙ヒマワ∈煤ス∨メÅエ∨ツn♭メ°縲∈」≪驕ノΒ♭=ヘミマ艨モ♀ハヨマ℃ムメεロd♀∈あいマニ≫テ∀マΤ┯ナ∨ツテ⊂ナ⇔モ′ワ∀∧メト∵mマ≫テ∀∵♭タ<s∧∽エ⇔ロフd窶ニマ$d窶ニ∵リリエ∨メÅエ∨ツ\n\n≠ヘミマ艨ノ¬∵ぢエ宦エ∨ワリ≧dメ黽モ÷ワリ≧dメq⊇メメヒ∈ρェナ⇔⊇エ∨ツテ√マ∪♪∽⊇∨メモモ′ワÅエ∨ツ∃∃≒=テテモワリ≧dメコx♭⊆≪>オ早マ≫ムミマ∀ワリ≧dメqツm⌒=テメリ轣ク⇒タ∀⊥≒√∃∩エ∨∩≒Åツテメ∵ばぱト√√†≠早サ∈コ∃ぼ轣ヘニ≫ワリ≧dのrょメц⊃メ驕痺轣諱ホチ∃≪>キふメカ∵∪∀√≫♭⊆∽⊂ツ≠ヘミマ艨モ゚dハ縺クワリ≧dのrょメユワ∀ユ†√≫ヨママナ≪÷モ′ワモワリ≧d黽∩≒÷ムミマ┬メぁてャソ∈ぁナ∨ツ\n\nq⊇⌒ラムハラワ∈ク⊃≠浴メモばぱト√∨ツムミマ┬マ≡≫」べマ÷モ′ワ∵ワ縲ハ£∈∩ツ∨ツ≠ヘミマ艨諱リÅゅエ⇔タ⇔⊇∃∩エ∨メÅツ獅ロまモΚタ⇔⊇∨ツΚタケ≪メナ⇒テ⊇ワリ≧dマレ∈⇒∩リ√≧メケ∵⊇メmマ⊂⌒√⇔⊇∨メÅツモ′ワモニ∬マ≠ヘミマ艨マも∈ナ≠ロま∵ワリ≧dマ∀♪⊥∈ヲナ∨ツテ⊂ナ⇔ワリ≧dのrょメ驕痺轣⊆≫ヨマ∀∈ュマばぱナ⇔÷嫡アモ黽マゅエ⇔⊇エ∨メÅエ∨ツ\n", + /*173*/ "♂d゚≧ムマ\n", + /*174*/ "♂d゚≧ムマ刀モ÷噫「ロワ窶メ£′≠轢ワ∩≒ワ゚d縺ナ∨ツミユメ揆桙揆ーメヤп∵く⌒凵マ∃≫テ∀∵ゎ≒∩マ∃エ⇔∩≒モ>фτ∃轤пヒd÷ユレマ♀♂″d<∵ワ┸揆ーメ′≠轢ワ†∩≪∈ナす⊥≫≡⊂マ∃エ∨ツ≧蛟モヨヒマ縲マモ∞ェсルマ¢フd窶ニマ∀噫「レd焉マ掾ニ≫ち£≠ネラ縺クユレマ♀マぷ¬∩ツ∨∵≠ロまモ∧√∈ュチシムナ∨ツ刀ヒ浴メワ┸う刀諱奄о゚≧ムマ怱キ∀∃エ⇔ル驕モ=奄о゚≧ムマd£メэΥモリ゚⊇メヌ゚マ∃エ∨ツワ┸ラなメθェゐ┛∈Ωキ∩≒宦瘁ヒツ∨Βマ÷ユレマ♀モ♂d゚≧ムマ刀メぐしマ∃エ∨ツう刀メψメθoモつ‡噫「ラなマ┛∵√=奄о゚≧ムマ刀モ♪∋♪∋θマ∃エ⇔⊇エ∨ツ\n", + /*175*/ "ヨヒマ縲マぅう\n", + /*176*/ "ぬ∝≪メなゎх∀ナ⇔ю∩≒にヌト√⇔⊇∨≧蛟モヨヒマ縲マモ<黹ヤb窶ラ閠≠d∈юяマ梶ロ⇔え≪ワツ≫怐ヘ∃エ∨ツテメ窶ラ閠≠d∀揆縺メラなпэメψ♭ヨヒマ縲マぅう∈ツぅうモ≧モユタモミユθヘ∩≒ォナフ√∨∀テ∽マネuニ≫ロマラ゚マラÅ∵≦пモx艸ヒメくけミメラなリホ∈烙ネハラニ≫∨⊥メ÷ワ$ム刄アリ♭⌒⊆エ∨メÅツテメ翼ムモヨヒマ縲マメル∵ナエ⇔⊇≫ツ\n", + /*177*/ "梶堰朽ムワゎ欺nыヨメ°ムユツ\n┳メナムd≠∈ヌキナ\n♀ミ∈ラツ≫テ∀⌒♭タ≫ツ\n\n橿縲d蛟マn蛟欺n∀∃≪メムマノdマ\n諱窶÷騾ハユdメゥ怐メ\n怎「∈腐磨ヌ≡ツ\n\n喝宴ロゎ欺nウ縲d♭怎「腐摩ツ宦十n゚マ♭♀ミ∈ラタ÷ォ¥゚マ\n∈縺ト⊃⇔ひ≪∈にぴヌ≫ツ\n", + /*178*/ "梶堰朽ムワゎ欺nぃムャ∈ュ⇔コヲナ⇔≦揉噂nメm♭⌒ムゃムd≠∈ロ≪\n⊆驕窶ツΚ驛黹⌒チナナ\n∧√∈コрナ⇔浴ニツ\n\n橿縲d蛟マn蛟欺n揉堰メm∈す∋♭\nろゎワムハ焉クπヲヌ≡ツ\n\n喝宴ロゎ欺n轤ユ┰メm∩≒艢ム縲ミム\n∈ツテナ⇔づてス┏ニ≫ツ\n", + /*179*/ "梶堰朽ムワゎ欺n騾マ♂ニ∃揀レf档ツツ\nハラマ蜈ム宦痰サツ≫∀\nf栫タ≫リ♭揀レ∈繧マ\n磨瘁ソ⊃⇔艨ニツ\n\n橿縲d蛟マn蛟欺n吹リエ∨♀ミメハラ∈оナ\n♀ミルd≧∈エ⇔♀ミ\n∈ラツツ\n\n喝宴ロゎ欺n♀ミルd≧∈ツテナ\nハラメ掾宦準゚マツ\n", + /*180*/ "梶堰朽ムワゎ欺nァ∂Σk∈ァム♭タ≫ツ\n艢ム縲ミム∂IRワヨヒマ\n♭モに⊃∃⊇Σ⌒に⊃≫ツ\n\n橿縲d蛟マn蛟欺nアワヨヒマ∈エ⇔秩ヒメ\n゙√∨ワムハ焉クоナ\nd=dハ♀∈ヱヌツ\n\n喝宴ロゎ欺n轤ユ┰メm∩≒アワヨヒマ∈\nツテナ⇔づてス┏ニ≫ツ\n", + /*181*/ "梶堰朽ムワゎ欺nぬは♭ワ$ムヨメタ煤ク怕暴n♭タ≫∵≠ノば≒√≫ぃい゚\n⌒⊆≫メ♭ャ┛Χツ\n\n橿縲d蛟マn蛟欺nぬはナ⇔=ヘ∃≪メo゚マ觸n≫ワ゚ハ∩≒ミム窶∈\nみヌ≡ツ\n\n喝宴ロゎ欺n轤ユ┰メm∩≒蛟ノd\n∈ツテナ⇔ぬはニ≫ツ\n", + /*182*/ "梶堰朽ムワゎ欺nナ♂d゚∈ΓΔムd≠マ\nぬニ≫ツ揉堰メm♭⌒⊃\n゙ト√∨♀ミ∂ァメ⊇o禄n∃♪メヲケ∈ツぁニ≫ツ\n\n橿縲d蛟マn蛟欺nIRワヨヒマ∈エ⇔オカメ♀ミ∈なに=ネ√∈ラツツ\n\n喝宴ロゎ欺n轤ユ┰∩≒IRワヨヒマ\n∈ツテナ⇔づてス┏ニ≫ツ\n", + /*183*/ "梶堰朽ムワゎ欺n。ョ捩d≧dハ£ヒ♭\n┓ヌメ╋τ∈ツぁナ<ウτ\n∃ぶユ∀ノフ∈モ浴ニ≫ツ\n\n橿縲d蛟マn蛟欺nォ縲ハユ∈づてナ⇔\nd≧dメΖレ∈ト⊇∃∵≒\nミム窶∈ぴψヌ≡ツ\n\n喝宴ロゎ欺n轤ユ┰メm∩≒ォ縲ハユ\n∈ツテナ⇔づてス┏ニ≫ツ\n", + /*184*/ "梶堰朽ムワゎ欺n浴マ≫ャメケΔ∈ユハ縺ナ\n⇔≠ャ塔ム∃ユヤマワン\n∈ロ≪ぁニテ∀∵♭タ≫ツ\n\n橿縲d蛟マn蛟欺nワ$ムラdラ∈エ⇔\nヨヒマ縲マメヤニワマぼ\nタ=準ワ∈∪♪∽∩ヌ≡⊂エ\n\n喝宴ロゎ欺n轤ユ┰∩≒ワ$ムラdラ∈\nツテナ⇔づてスfニ≫ツ\n", + /*185*/ "梶堰朽ムワゎ欺nルマワ゚マ縺マぬヲニ≫Ζレ\n∈ヌ¬=コ≒∇≫λсρΖδ\n┸∈こご♭タ≫ツ\n\n橿縲d蛟マn蛟欺nオカメ♀ミメユテ⊂マ⊆≫\nモ高驍黷ヘuマ梳怙ヲムマ\n∈ー驕フ宦痰サツ≡ツ\n\n喝宴ロゎ欺nォ¥゚マケ凍捩ワ窶ニハラ♭\nへ⊇∈ヌ⊥÷ウ縲d♭\nー驕窶ツ\n", + /*186*/ "梶堰朽ムワゎ欺nοリメワ$ム∀ぅうメ騾ハ\nユd∀メ♭♂d゚メ∂≪媾n≪∵ぃいマ∃≫♂°ムワツ\n\n橿縲d蛟マn蛟欺n♂d゚マユ∈エ⇔\nテメo゚マ⊆≫ゥ怐メ♂d゚\n∈騾ハヨマナ≦オカメ♀ミ\n∈ラツツ\n\n喝宴ロゎ欺n♂d゚マユ∈ツテナ\nゥ怐メ掾宦準゚マ∈縺ニツ\n", + /*187*/ "なキセウ縲d♭メネ#マなキ\n", + /*188*/ "ヤd縲d♀\n≠マ∵εマ∃エ∨≒ウ縲d∈モ∃ニ\n", + /*189*/ "蛟フミd♀\n≠マメ、∵磨エ∨≒宦準゚マ♭d♀\n", + /*190*/ "ろ├d♀\nォ¥゚マ∈縺ナ∨リリマニ≫∀ろ├d♀ヨ\n", + /*191*/ "凍捩ワ窶ニハラ♭ろ├∈ルマ縲d♭タ≫\n", + /*192*/ "翌ト繞キ\nウ縲d∈縺ナ∨リリ♭翌ト繞キ\n", + /*193*/ "ラムハラろ├\n怐メヒフ¥゚マ♭ォナ⇒ヒフ∵へ⊃≫\n", + /*194*/ "<dd♀\nォ¥゚マ∈縺ナ∨リリ♭<dd♀ヨ\n", + /*195*/ "ラムハラ繞キ\nウ縲d∈ヤレチ繙フ♭ラムハラ繞キ\n", + /*196*/ "ヨヒマ縲マぅう\0|Base of operations\n", + /*197*/ "♂d゚≧ムマ┨刀劇\0|Global headquarters\n", + /*198*/ "xフ―0|Underground research labs\n", + /*199*/ "ヨヒマ縲マメヨ\0|Private coastal retreat\n", + /*200*/ "ロユ÷\0|Backstreets of the city\n", + /*201*/ "普劇\0|dataDyne front corporation\n", + /*202*/ "モミ斧曾0|Near Groom Dry Lake, Nevada\n", + /*203*/ "ミワユε┬┤x\0|Brooks Range, Alaska\n", + /*204*/ "θικ┿ヨδ\0|The President's airplane\n", + /*205*/ "ξぺοリ\0|Victoria Island 71N 118W\n", + /*206*/ "%≠ハラ箪0|Specialized deep-sea research ship\n", + /*207*/ "ン゚マロハ£\0|The most alien environment on Earth\n", + /*208*/ "ワリ≧d黽\0|Troop carrying spacecraft\n", + /*209*/ "ノ⊇陪\0|The planet of the Battle Shrine\n", + /*210*/ "≠ヒマ£ロハ£\0|Agile troop craft\n", + /*211*/ "°dルマ窶臀0|Gravity-negation device\n", + /*212*/ "°d°ムラ\0|Low altitude vehicle\n", + /*213*/ "ラd蛟マ¥ハ綵0|Your helpful buddy\n", + /*214*/ "°dル£゚d\0|Urban AG gunship\n", + /*215*/ "斧¥ハ綵0|Urban combat droid\n", + /*216*/ "噫斧操ムマ゚dン£゚d\0|Robotic air interceptor\n", + /*217*/ "ムミマィョ麾ィ\0|Scout and patrol vessel\n", + /*218*/ "ワリ≧dィョ麾ィ\0|Alien troop dropship\n", + /*219*/ "ぅうメ′マモワチメモミ∵⊆≫ツヤニワモミ≦сァモミ<ロэモミ=ネナ⇔私チハÅツvメюя∩≒モ剛フト√∨リ轣マ⊆≫∵=ネ√マ≡エ⇔寉オメしじ∵ぃいマ∃エ⇔⊇≫ツ\n", + /*220*/ "ヤニワ=メmфマ⇒マ♀dラツ♂d゚≧ムマd£メ┨刀モモ≫∩戟チ∩≒♭⌒翼エ⇔に⊃≫ツ\n", + /*221*/ "xフマ゙ト√=タ‡ナチiヮト√∨寉オモミ♭=奄о゚≧ムマメχャ£≠ネラ縺謔ト⊇⇔⊇≫∀か∝√≫ツツ≪ニ∬≪メ∨¬∵=奄о゚≧ムマ∈セマニ≫チ>クス∈だツ⇔⊇≫≒ナ⊇ツ\n", + /*222*/ "ヨヒマ縲マぅうぜ瘁メ<宦メxマ⊆≫テメヨモ=蛟モヨヒマ縲マメぜ凾∀ナ⇔∝√⇔⊇≫ツなλロワ窶>θ∃ムマンd∵⊆≫ツ\n", + /*223*/ "ロユ÷メ=メ>セナチ∃モミツ\n", + /*224*/ "普劇メnoマd窶ニマd∵⊆≪=テテ♭モュ⇔メ妹マス麻怐諱タ∃⊇≡⊂マ∃エ⇔⊇≫ツテテモ♂d゚≧ムマメオカメ£マ∵ュ⇔て⊇⇔⊇≫ツ\n", + /*225*/ "モミ斧早ヘナ⇔ナ≒√≫θ∃オカ┤xモd♀ムムラメぞチメ∽チマ⊆≫∀か∝√⇔⊇≫ツvマ⊆≫#d縺ヘ$¥ミマ窶艨メθタト∵=テメxフマ∵≫┤xメン⇔ナ∃⊇θタト∈チトヌ≫ツ\n", + /*226*/ "θικ┿ヨδ∵¬≡√≫≡⊂マ≠宴氏クコヲナ⇔⊆≫ε┬┤xメ早ヒツラ∀∋♪メε┬┤xモ┳浴マ⇒∩∃⊇≦ョxメモミマハ≒√⇔∪≪=テテ⌒∧メ獅磨モ∃⊇ツ\n", + /*227*/ "テメθικ┿ヨδモ÷ミワユメ寔怕掾ク└∀ナ∃⊇≡⊂マ>ュマをト√⇔⊇≫ツヵぴメぼタけモ閠メネdメヤワÅツ\n", + /*228*/ "ミワユヒεメマγぼδメケ∵⊇∵ぺ¬⇔⊇エ∨ツ\n", + /*229*/ "Ωキ辜瘁メ%≠ハラ秩モ≠ュчш♭ыьロэ∵ぼ⊃≫ツюя♭窒メメュマルマ¢フd゚lキト√∨чшощъÅツ\n", + /*230*/ "モ≫∩∩≒ш♭┝エ⇔⊇≫θ∃モムミマメツ\n", + /*231*/ "ワリ≧dq∨¬∈エ陪ヨ∀え≪ワツ≫ぇえツワリ≧dqyメco∈aロ≫ツ\n", + /*232*/ "ノタキメ陪ツ刀ヒメ∈ぷ⇒モ≫∩ぽぶメпマネuニ≫ツ\n", + /*233*/ "ルマ$ラ縺ヤレチ>烽メ≪∵タチモd≠ネマ繧・えヨロヒ縲ツθニメメm∈ワ¢d♂ニマ┴てニ≫テ∀∈翼ムマをト√⇔⊇≫ツルマ¢フd゚♭翌ト怨梶ワ♭タ≫ナ÷d縲ルマ縲d⌒♭タ≫ツ塘ア∩≒売アメモd≠ネマ縺ヘ=ネメはヮ┰∈ぇえ♭タ≫ツ\n", + /*234*/ "モハワ゚ハメロэヨメ黹ヤb♂°ムワツルマ窶艨メメワムハ焉ク⊇√≫∀<黹ヤbニd♀∵ルマ窶艨クぷ¬ヒ驕窶ツ\n", + /*235*/ "゙Ξメ怐サ$縲d°ムラツ焉ト∃黹ヤbはu∈エ⇔°マナ>熈ィメコb∃d゚d♭すb∈Η≫ツ\n", + /*236*/ "」ヌモミ∈タ√⊇マヒニ≫ツ┤┨τマΣュk∈チリ∃チぴエ⇔⊇チテ∀∵ワ⊇ツモd≠ネマ縺ノ¬モ>ァ┨τマモラd蛟マ¥ハ縺クわべナ∃⊇≡⊂マц⊃≒√⇔⊇≫ツ∃∃≒≧寉オモミマ曹氏ナ⇔⌒≒⊃≫テ∀⌒⊆≫∩≒Åツ\n", + /*237*/ "ニモ潤マ∪ツ≫$縲d撃べヨ′dラツ嫡アぢ≪♭÷閧пメ逗ハ♀マ°ユマヨヒ閠マ÷メニママモレム∈はヮナ⇔⊇≫ツもマ≡≫わべュせマへ∝√∨リハ繞、∵℃ワ縲п≠ホぱニ≫テ∀∵♭タ≫ツ\n", + /*238*/ "ニモ潤メルマ°ハ繝マをト√⇔⊇≫ツ黹ヤb窶ラ閠≠d♭°マナ⇔⊇≫ツコb∃のは∀ロd♀∈ぷ⇒ツ╂ナ⊇┳Σ∈に∨≒└シヨ♭けlわべ∀⊇⊂━ミd烙マ♭=∋♪∋わべナ⇔チ≫ツ\n", + /*239*/ "°d°ムラメ¥ハ繚オツ≡≪コb∃黹ヤb蛟ハ縺ヘd゚dロワ窶∵⇒タ≧獅レワ¢d♀∩≒≠ュθハ騾秩メワ¢d♀♭┴てニ≫テ∀∵♭タ≫ツのは∀怨潟゚マモχπ∵u∩√⇔⊇≫∵÷ロd♀マπ∈ぷエ⇔⊇≫ツ\n", + /*240*/ "ムミマ槍ア∵ぢ≫テ∀∵♭タ≫ツぢΛsモ∩∃≪ヌリチチ≫Å∽⊂ツ┳Åエ∨≒=ホ∪ト≒♭⊆≫ツ\n", + /*241*/ "操推アメのはナ∨ワリ≧dq∈ざ¶テ∀∵♭タ≫ツρケメd≧d♭モоナ♭タ∃⊇ツコb∃こごλμ∈なΖニ≫テ∀∵♭タ<マΖはu∂d≧d∃♪メδ┸∈あいマニ≫テ∀∵♭タ≫ツ\n", + /*242*/ "橿竄о欺n痰「∃モd≠ネマ縺モひ≪∈ケマ烙ネハラナリニツ\n\n橿縲d蛟マn蛟欺nリ∝≪∈にぴナ⇔=逗轢∈烙ネハラナ⇔フト⊇ツ\n\n喝宴ロゎ欺n怫フ¥゚マ♭ヒ∈に⇔÷怫ヒ¥゚マ♭フ∈に≫ツォ¥゚マ♭ろ├d♀マ≪÷凍捩ワ窶ニハラ♭ひ≪∈裸ウマにリ∝ニテ∀∵♭タリニツ\n", + /*243*/ "橿竄о欺nレム♀ワ窶ハ£モ<刀マモ¢マ焉ソ≒おエ⇔チ√≫窶ラ蛟ハラ♭ニツ\n\n橿縲d蛟マn蛟欺n掾マ⊆≫ワムハ焉クュ⇔づてヌ≡ツエワムハ焉モニ∬マンハ縺ト√≫メ♭ャ┛Χツ\n\n橿縲d蛟マn蛟欺n怫ヘ¥゚マセヘワ窶ハ£\n怫ホ¥゚マセホワ窶ハ£\n\n", + /*244*/ "橿竄о欺nナオ∵∠テ∀マ≡エ⇔>ルナ⊇モミ∈о轣タリニツ\n\n橿縲d蛟マn蛟欺nンマレdマ⊆∨≒マ÷ワムハ焉クづてナ⇔フト⊇ツ\n\n喝宴ロゎ欺nォケ怫フ¥゚マ♭茶ミたマナオ∵∠ツ凍捩ワ窶ニハラ♭ナオ∵∋Åリリ氏チツォ¥゚マ∈ラハラ♭づタヒ∵≫ツ\n\n", + /*245*/ "橿竄о欺n。ヌメw∈Φみマヤみ♭q⊂メモ÷ラ♭モ⊆≪リヌ∋ツ\n\n橿縲d蛟マn蛟欺nw∩≒ュチ≧d≠∈ゐツマ<s閠ハラミメ縺ヌ≡ツ\n\n喝宴ロゎ欺nメネ#マ∵∃⊇ンモ$マ焉コ≫メルツウ縲d∈繙フナ⇔フト⊇ツ\n\n", + /*246*/ "橿竄о欺nw∈のはfニ√†≠浴メメネ#マ∵みマ≪リニツ\n\n橿縲d蛟マn蛟欺nw∩≒ュチ≧d≠∈ゐツマ<s閠ハラミメ縲スのはfヌ≡ツ\n\n喝宴ロゎ欺nΒ∽∩≒メ$マ焉モcべ♭\n閠ハラミメ縺タリニツ\n艢窒フ┸d♀∈⊂∀w∈\nのはf♭タリニツ\n", + /*247*/ "橿竄о欺n。ヌメw∀ヤみ♭qエ⇔フト⊇ツ\n\n橿縲d蛟マn蛟欺nュチ≧d≠∈ゐツ∃⊇≡⊂マナ∃∵≒<クのはメw∈ュsほヌツ\n\n", + /*248*/ "橿竄о欺n。ヌメw∀ヤみ♭qエ⇔フト⊇ツwモのぱム£∀クのぱム£∵⊇リニツ\n\n橿縲d蛟マn蛟欺nュチ≧d≠∈ゐツ∃⊇≡⊂マナ∃∵≒≠浴クュsほヌツ\n\n", + /*249*/ "≡≪せマへエ∨≪=ワエ∀裸ウマひ≪∈にリ∝ナ∨⊇∀タモ≠├d♀∈エ⇔チÅト⊇ツ\n", + /*250*/ "窶ワ縺マ烙ヒマ≠ニ≫掾マ<翼メぼタ∨⊇リ轣クせどナ∨ラ⊂∵⊇⊇♭ニムツ゚dハ縺メ∈く⌒レチぼタヰ♭タ≫≡⊂∃#ムマ縺ソ≒ワ゚d縺ニ≫ぶ∵Ηテ♭ニツ\n", + /*251*/ "ナオ∵∠テ∀マ≡エ⇔∞、ρ♭モぼツ∃⊇≡⊂∃∀テ∽マぼツ∨≪ニ≫ツ♪<エ⇔⊇≫∀タメぶ∵レチてツリニツ窶ワ縺クぼ⊂モ<ャ∃∀テ∽♭メルナオ∵∠≡⊂マナ∨ぶ∵⊇⊇∝≡ツ\n", + /*252*/ "wメΒ∽∩≒わべニ≫メモネミオ∃⊇∩⌒ナ√∃⊇ツ♪=テ√∵ヨラ∝≡ツ黴ハ縲劇ミメネム∵┤┨ムツ\n", + /*253*/ "メネ#マ∈゚⊂ンモwマぞ♯⊇⇔>゚エ∨≒ニ∬マフ√⇔黷ラ∈∩∝ナ>゚エ∨メネ#マ∈エ⇔フト⊇ツ\n", + /*254*/ "¥d∀ナ⇔¬オ=ン≒√≫Åツ≡ツてタ∃ト⊇エc┳マΨ∈∀≒√⇔†∩≪オ∃チ⇔<s∈に≫メ♭ニツュs∵に⊃∃⊇リホモ≠ノ⊃≫リ♭て⊇∨ぶ∵⊇⊇∝ムツ\n", + /*255*/ "ヤみメナム縺マ翼、∵⇒⊇∨≒≠フはナ∨wマ烙ヒマ≠ナ⇔チÅト⊇ツのはfナ∨w∩≒ニ∬マフ√⇔≠ンマ√∨メネ#マ∈⊂メ♭ニツ\n", + /*256*/ "≡≪せマへエ∨≪=ワエ∀裸ウマひ≪∈にリ∝ナ∨⊇∀タモ≠├d♀∈エ⇔チÅト⊇ツ\n", + /*257*/ "レム♀ワ窶ハ£モ<刀マモ¢マ焉ソ≒おエ⇔チ√≫窶ラ蛟ハラ♭ニツ\n", + /*258*/ "ナオ∵∠テ∀マ≡エ⇔∞、ρ♭モぼツ∃⊇≡⊂∃∀テ∽マぼツ∨≪ニ≫ツ♪<エ⇔⊇≫∀タメぶ∵レチてツリニツ窶ワ縺クぼ⊂モ<ャ∃∀テ∽♭メルナオ∵∠≡⊂マナ∨ぶ∵⊇⊇∝≡ツ\n", + /*259*/ "wメΒ∽∩≒わべニ≫メモネミオ∃⊇∩⌒ナ√∃⊇ツ♪=テ√∵ヨラ∝≡ツ黴ハ縲劇ミメネム∵┤┨ムツ\n", + /*260*/ "メネ#マ∈゚⊂ンモwマぞ♯⊇⇔>゚エ∨≒ニ∬マフ√⇔黷ラ∈∩∝ナ>゚エ∨メネ#マ∈エ⇔フト⊇ツ\n", + /*261*/ "¥d∀ナ⇔¬オ=ン≒√≫Åツ≡ツてタ∃ト⊇エc┳マΨ∈∀≒√⇔†∩≪オ∃チ⇔<s∈に≫メ♭ニツュs∵に⊃∃⊇リホモ≠ノ⊃≫リ♭て⊇∨ぶ∵⊇⊇∝ムツ\n", + /*262*/ "ヤみメナム縺マ翼、∵⇒⊇∨≒≠フはナ∨wマ烙ヒマ≠ナ⇔チÅト⊇ツのはfナ∨w∩≒ニ∬マフ√⇔≠ンマ√∨メネ#マ∈⊂メ♭ニツ\n", + /*263*/ "♂d゚マユ∈⊂モ<ケマ゚dハ縺クに⊃≫宸氏マu⊇⇔≦ムだ∵で磨縺ホ⊇≡⊂∃≫チフ√∃⊇♭フト⊇ツ\n", + /*264*/ "♭タ≫Åツ゚dハ縺マぞ♯⊇⇔÷梳怙ヲムマ∵ナ⊇リ轣マ⇒チ≡⊂せどナ⇔フト⊇ツォ¥゚マメろ├d♀∂÷怐準゚マ∈エ⇔へ⊇∈ヌ⊥⇔フト⊇ツ\n", + /*265*/ "ユワ$ムメ宴ロモィナ⊇メ♭=゙エチ≪∀蚕n", + /*266*/ "艢ム縲ミムモスルマ°ハ縺ホ♪♭¬リニ∵≠ミ≪∵ゎ≫チ∃≫∀└♭ニツ\n", + /*267*/ "♀ミルd≧∵⊂リチンハ縺タ∃⊇ンモ÷゚dハ縺ヘ∃≫チぞチ≦マユタホ⊂≡⊂マエ⇔ル⇔チÅト⊇ツ\n", + /*268*/ "ォ縲ハユモ<ウτ∃ぶユ∀ノフナ∩モ浴ナリヌ∋ツ゚dハ縺リ♭メハ£モモ浴ト√∃⊇メ♭≠ミ≪∈煤チに∃∵≒о轣ナ⇔フト⊇ツ\n", + /*269*/ "IRワヨヒマはンモムу∵ヌリチ∃≫メ♭÷ルマ°ハ繝刀マモあ竅マ∃≪リニツリホ∈ミ⊃⇔エ⇔フト⊇ツ\n", + /*270*/ "cヌノフ≡≪ユテ⊂∵に⊃∃チ∃≫メ♭=セ∩ナ∃ンマ⊂∀翼∵¢マ焉マ∃≪リニツ∂ルチ⌒マ⊂メモ∂⊥リナキ⊂ツ\n", + /*271*/ "ぬは∀モ∞堰マ宦クツ≫∀⊇⊂テ∀Åツ♭モ⊆≪リヌ∋ツ∧メ┳Σマユト∝ナ⊇艪пぼてナ∃⊇∀=朽⇔ナリ⊇リニ≡ツ\n", + /*272*/ "マ栫ワ⊇∃⊇∀テ∽♭モワ$ムラdラ∈ィ麾氈マナ⇔=ホ≫チ┠チ⊃≫≡⊂マナリナキ⊂ツ\n", + /*273*/ "♂d゚マユ∈⊂モ<ケマ゚dハ縺クに⊃≫宸氏マu⊇⇔≦ムだ∵で磨縺ホ⊇≡⊂∃≫チフ√∃⊇♭フト⊇ツ\n", + /*274*/ "♭タ≫Åツ゚dハ縺マぞ♯⊇⇔÷梳怙ヲムマ∵ナ⊇リ轣マ⇒チ≡⊂せどナ⇔フト⊇ツォ¥゚マメろ├d♀∂÷怐準゚マ∈エ⇔へ⊇∈ヌ⊥⇔フト⊇ツ\n", + /*275*/ "ユワ$ムモァゎ♭モ⊆≪リヌ∋ツΨ♯∩√≫リホ⌒⊆≫メ♭≠浴メ⊇≫モミマ≫∀タモニマΨ∈⇒ツ⇔フト⊇ツヨΒモぴψナ∃⊇∀=ネテマケエ∨リリ♭ニツ\n", + /*276*/ "艢ム縲ミムモスルマ°ハ縺ホ♪♭¬リニ∵≠ミ≪∵ゎ≫チ∃≫∀└♭ニツ\n", + /*277*/ "♀ミルd≧∵⊂リチンハ縺タ∃⊇ンモ÷゚dハ縺ヘ∃≫チぞチ≦マユタホ⊂≡⊂マエ⇔ル⇔チÅト⊇ツ\n", + /*278*/ "ォ縲ハユモ<ウτ∃ぶユ∀ノフナ∩モ浴ナリヌ∋ツ゚dハ縺リ♭メハ£モモ浴ト√∃⊇メ♭≠ミ≪∈煤チに∃∵≒о轣ナ⇔フト⊇ツ\n", + /*279*/ "IRワヨヒマはンモムу∵ヌリチ∃≫メ♭÷ルマ°ハ繝刀マモあ竅マ∃≪リニツリホ∈ミ⊃⇔エ⇔フト⊇ツ\n", + /*280*/ "cヌノフ≡≪ユテ⊂∵に⊃∃チ∃≫メ♭=セ∩ナ∃ンマ⊂∀翼∵¢マ焉マ∃≪リニツ∂ルチ⌒マ⊂メモ∂⊥リナキ⊂ツ\n", + /*281*/ "ぬは∀モ∞堰マ宦クツ≫∀⊇⊂テ∀Åツ♭モ⊆≪リヌ∋ツ∧メ┳Σマユト∝ナ⊇艪пぼてナ∃⊇∀=朽⇔ナリ⊇リニ≡ツ\n", + /*282*/ "マ栫ワ⊇∃⊇∀テ∽♭モワ$ムラdラ∈ィ麾氈マナ⇔=ホ≫チ┠チ⊃≫≡⊂マナリナキ⊂ツリ∨マョャ∩=ワナチモマセ⇔≫翼、∵⊆≫ンルvモ≠焉モ∝∃⊇ラ⊂∵φュ♭ニツ\n", + /*283*/ "ナルマ秩モクケマせ∃セも∃メ♭≠ラ¬閨モュ⇔⊆∃∨翌ォメし♭ニツ艢窒フ┸d♀モハ£ミ゚ハラ∃メ♭=テメ縲d蛟マ♭モヨ⊇リヌ∋ツ\n", + /*284*/ "ナルマ秩メせト∈ニマΚ∩ニ∨⊥マ÷ワルd£∈宦瘁ヒツ∨メ∵テメ゚ム£♭ニツ閧о゚ム£煤マ艢窒フ┸d♀モハ£ミ゚ハラ∃メ♭=テメ縲d蛟マ♭モヨ⊇リヌ∋ツ\n", + /*285*/ "レムマレd゚ム£メナルマ秩モыロqマく普メメネ#マ♭≠浴マΨ♯∩√∃⊇≡⊂マわべ∈ヤ∩ツ≫テ∀∵♭タリニツテメ窿ホ∈≧マニ≫テ∀メ∃⊇≡⊂≦せ∃キべ∈縲d蛟マナ⇔フト⊇ツ\n", + /*286*/ "MagSec4モせト≡≪⌒コb∃ばぱbマχπ∈u∩√∨メネ#マ♭<艢窒フ┸d♀メ塘繞キ∈に√†=ネメワ÷トモゎ≒∩♭ニツ窒メメθタ∃πモ÷≠マメレム<∵焉ト⊇テ∀♭ニツ\n", + /*287*/ "ワリ≧dメccム∃メネ#マ♭=ヘ⇔⌒$マをト√⇔⊇リニツ≠マ∈⊇チ⇒∩ヨニ≫テ∀マ≡エ⇔<コb∃ばぱb∈ぷ⇒烙ヒd≠ミハ£∈ヌ⇒テ∀∵♭タリニツ、ィメヨヒ$ロ窶ニ∵θタ浴ホメ⌒窿ホ♭ニツ\n", + /*288*/ "テメワΕ∃¢ワ縲モ÷秩ヒメヲ∃エ∨な、ロワ窶メ÷ロマロヘハ縺ヘ」、ロネ∈ぷエ⇔⊇リニツムミマメモマ≠蛟ミ∨¬モ繞キメワ¢d♀∈ぬ⊃≫テ∀マ≡エ⇔>モ轢dヨェ♭ヲ∃≫コΞメロヘハ縺クぃいマナリナ∨ツ\n", + /*289*/ "DY357艢∈堰竍ヒ♭く⌒χャ∃テ∀モ=サ⇒d♀ニ≫∩∀⊇⊂テ∀♭ニツもべqmマ÷魔ネ≪≠マメケ≪、ヌメテ∀モケマΧイナ⇔⊇∃チ⇔モ∃≪リヌ∋ツテメ騾マ♀マメχトモ<コb∃ハ£ミ゚ハラ∈ぃいマナ⇔⊇リニツ\n", + /*290*/ "縲マ縲ムdワ縲マモケマ÷ワ%ロヒヤ煤メ閨クセナ∵≫゚ム£♭=テメも⌒∧メ獅磨モ⊆≪リヌ∋ツテメもマモ┓∃、∵∝√⇔∪≪≠モラョ早メ$d∈オ⊥⇔⊇リニツ\n", + /*291*/ "Ζサ∵uツ<ワ・メ煤サをメレ″ロママツテメメネ#マ∵ェ中曹♂d゚≧ムマ刀メ℃ワ縲ンdÅエ∨テ∀∵∧√∈閧ナ⇔⊇リニツ艢窒フ┸d♀♭モ゚dハ縺クレd焉ナ⇔ハラヤマニ≫テ∀∵♭タリニ∵=テメニ†≒ナ⊇δいモニ縲d蛟マナ⇔∪チョャ∵⊆≪リニツ\n", + /*292*/ "テメレ″ロママモ<エノτマへ⊇∵せ♭∃⊇≡⊂マをト√⇔⊇リニ∵÷縲d蛟マメΧ┻モニ⊆≪リニツテメレムラマモセンマθェメ、∈繞キニ≫テ∀∵♭タリニ∵=ネメΞ∇⊃マcaモ寉秩諠ッ┏ト√⇔⊇≫メネ#マ♭ニツ\n", + /*293*/ "ムミマ∨¬メ裸ウ∃を━ァ∵<ーk∈ョρニ≫b∈ぷ⇒騾ムムマ$ラ縺ク艢窒フ┸d♀マヮ⊃∨=テメレ″ロママ∈ハ≪ヒ驕リナ∨ツ繞キΞモネ蛟ラワ楳<艢窒フ┸d♀♭モぺ¬リニツテ√モなキメユ蛛ム∀もき∈閨ホ∝∃⊇∨⊥♭ニツ\n", + /*294*/ "RC-P120モ┓∃ニΣ♭♭タ∨、マ蛛ス<゙⊇繞キ゚∀θ蜃ェメ≠マ⌒ぷエ⇔⊇≫∨⊥÷ワリ≧dテマモ∩ヌ∃⊇∀か∝√⇔⊇リニツテメ、モ艢窒フ┸d♀メワ$ムラdラδいメモ轢d∀ナ⇔⌒∝√リニツヵぴメ縲d蛟マモテメ┓゚∈黹。トヌ≫∨⊥マ>ュメ⌒メマぬねト√リナ∨ツ\n", + /*295*/ "ハ£縲ハ£ゥ怐メ≡⊂∃∈ナ⇔⊇≫Åツ♭モ∃チ<艢窒フ┸d♀メ翌トδも♭モに≪∀ナ⇔≧アタ∃リ轣マンハ縺ニ≫テ∀∵♭タリニツ桙氓マ⇔トヌ∨≪=コ≫リ轣クぎ≒ヌ∨≪⌒♭タ≫メ♭ニツ\n", + /*296*/ "テメ♂モ♂d゚≧ムマ刀諷エ┬∩≒メθェゐ┛マΤ┯ナ∨♂Å∵=リÅチ∝√⇔モ⊇∃⊇ツcにワ゚マ≧d♀゚ム£メムÅ∵=奄о゚≧ムマ刀メ桷サ≒ナチ≠烽ォメフマンマレd」、∈はヮナ⇔⊇≫ツ艢窒フ┸d♀∈⊂リホモ=テメも∈ー驢竅フ∃チ⇔モ∃≒∃⊇ツ\n", + /*297*/ "テ¬≒♭せどナ∨∀テ∽マ≡≫∀=テメメネ#マメ艢窒フ┸d♀モΣなにδい∈ぷエ⇔∪≪≦」、∂≦゙ト√∨」なΣャ艢窒フ┸d♀メ♀÷マ∃♪пン<翌トδも∃♪∈оナ♭タリニツ\n", + /*298*/ "ぅう∵み∵ツ∨く梶メレ″メネ#マ♭⊆≫AR34モ=ソ∃≪ワ゚マ≧d♀∃ハ≪メぞノフヨム♭<艢窒フ┸d♀モケンワルd£♭ニツヵぴメ窶ワ縺モ≦キべメせトマχπ∵u∩√⇔⊇リニツ\n", + /*299*/ "≡≪′dマ∃エ∨♀÷マ♭÷ンマレd」、o∵マ烙ヒマぬ∝エ⇔⊇リニツエ┬♭yヨメメネ#マ∀ナ⇔カマ∝√⇔⊇≫メ⌒=シ∃ツ≫∀テ∽♭ニツヵぴメ縲d蛟マ♭マ烙ヒメ、凵ク窶ワ縺ナ⇔フト⊇ツ\n", + /*300*/ "テメメネ#ママ掾ナ⇔ッ∩⊇テ∀モメタ♭ニツロマロヘハ縺ヘ≧″ロヘハ縺メ逐d♀∵ヨΧト√⇔⊇リニツロヘハ縲ママナ⇔モθタ浴メ≠マ∈ぷエ⇔⊇リニ∵÷d♀マン∵∩∩≫メ♭≠怎゚メ⊆≫ぼて∵ョャ♭ニツ\n", + /*301*/ "煤チをト√∨÷騾ム$d<dδいそタメ÷レムマレd゚ム£メワ艢ム$dム♭ニツ⌒ナべ¬閨∵⊆エ∨リホモ≠⊇∃チへべみメへ⊇∵噤ソエ∨∀⊇⊂テ∀マ∃≪リニツへ⊇∈φヌトヌ∨⊇∀タモ<艢窒フ┸d♀∈エ⇔ナオ∵∠∀≠ヨ⊇∵φヌナリニツ\n", + /*302*/ "⊆リ≪マ⌒す∋Å∵∝√⇔⊇≫メ♭<煤ノ¬マモ⊇マチ⊇⌒⊆≪リニ∵=ネ√♭⌒テメメネ#マメ窿ホモ∧√∈ニマユ°dナ⇔⊇リニツテメロヘハ縺モラ∀∋♪が♭⌒ョタ÷ワルd£モァ∈ァムナ⇔淀エ∈レd焉ニ≫テ∀∵♭タ<ャ⊆≒†∧√∈ハラヤマナリニツ\n", + /*303*/ "ラワ¥メメ繝メホδいモ究ゥ戟メロヘハ縺ニ∵<艢窒フ┸d♀モcべョ早メヨ♭ニツラワ¥メモыヨメネ#マ∃メ♭÷d♀マン∵∩∩≪=コリ≪ルマ°ハ繝タ♭モ⊆≪リヌ∋ツ\n", + /*304*/ "縲マヨム=モюяmメ埋轣ホ♪♭煤チに≒√≫麻ツ┸♭ニツ究ゥ戟ク操ロヘハ縺⇒なキ♭タリニ∵>ワェメロヘハ縺クユ£ン、∀ナ⇔べ⇒cべョ早メdレ┛マ磨瘋ヤ⊃≫テ∀⌒♭タリニツ\n", + /*305*/ "テメメネ#マモ┳≡≪モ≫∩マコ⊇d=dメ∨⊥マをト√∨テ∀Åツモ⊇∃⊇≡⊂♭ニツヤリツ†へ⊇∵ヌ⊥∂ニチ∃≪リニ∵≠ュマせ∀⊇⊂∝ツ♭モ⊆≪リヌ∋ツ、∈⊇ン∨ナ⇔ナリエ∨リホモ≠烽ォ∈♀∀ナ⇔⊂テ∀マ≡≪<ウみマ≧d≠∈煤ス≒√リニツ\n", + /*306*/ "♂d゚≧ムマ刀メくぞメ桷サ♭÷蛯оラ∃窶ラ閠≠d∵∝√⇔⊇リニツ艢窒フ┸d♀♭モ」、メひ≪マナリ∈ロ≪Åナ≠ヤヌンメムリル∈ヨd£ナリニツ∧メΒモナリ∵fト√≦」、モぺ¬⇔」なナリニツ\n", + /*307*/ "ルマ$ラ縺がぴ♭⌒ヨぃい∃リハ縲マ烙ヒ♭≠モネべ⇒Ξマd♀∵ョャ♭ニツ艢窒フ┸d♀♭モ,MP150∀сヌメハラヤマロワ窶∵∝√⇔∪≪÷早ヒメ゚dハ縺クハラニ≫テ∀∵♭タリニツ淀エ∈ト=ニ≫ンメリハ縺メワ¢d♀モクケマム⊇∨⊥>ョΧナ⇔フト⊇ツ\n", + /*308*/ "ワリ≧dメ熈ィレムマ烙ヒ♭<マケメリハ縲マ烙ヒ∀÷d=d∵d縲ルマ縲d♭タ≫リハ縲ユ∈べ⇒テ∀∵♭タリニツリハ縺モ翌トτマワ¢d♀∈ヒ驕フぼタリニ∵÷ワ¢d♀∈ぺ∀ナ⇔ッ∩チルマ縲dニ≫テ∀⌒♭タリニツ」なモ、ン=ワナチモ秩タ凵諷秩ソ√∨ンマづテ≪リニツ\n", + /*309*/ "にпマ∫ニリト√∨ルマ°ハ縲艢ム♭≧ー驕ンニチロ≒√⇔⊇リニツー驕ノ艢ムメワチ宦ンγ‡ぶ∃♪マモ÷縲d蛟マ∵ョャ♭ニツ\n", + /*310*/ "ヨヒマ縲マぅうメメネ#マラなo∵сァτマラなナ∨÷ワ縺マはニ≫゚ム£メd=d♭÷秩ヒメ′d∵ンハ窶ニマ♭タリニツムマd♀♭モキΝnマd=d$ワ∈なキナ<艢窒フ┸d♀♭モ秩タ凵ク秩サ⇔⊇≫>繧セナ∨ロヘd縲マ≠′d∈なニ≫テ∀∵♭タリニツ\n", + /*311*/ "┤┨τ∃黴フd<∈ヨナ∨リホ≠テて∩≒」なリ♭陪ロ∩∩≪リニツテ√マモ蛯оラ∃艢窒フ┸d♀÷ンマレd¢マ¥d∵ヨΧト√⇔⊇リニツテメd♀♭≠ン≪カ⊂、モモ轢d∵∃チ∃≫∩÷ンマレd∵が∩∈チナニ≫リ♭°メマ♀ナだツリニツ\n", + /*312*/ "ムミマみ≪カ⊂、モΚΣメΘпクばぱナリニツ」竅メ宸氏マエ⇔ナリ⊂∀>浴モ∩ニ∋♭≠ユエ⇔⊇∨⌒メ∈ュ⇔ぺ∀ナ⇔ナリ⊇リニツテメみ≪カ⊂、モ≠ェ∩マふエ∨∀タマ」なトヌ≫≡⊂マンハ縺ニ≫テ∀⌒♭タ≫ナ÷ンマレd♭づ」トヌ≫テ∀⌒♭タリニツニマフ√⇔∩≒⊇リナキ⊂ツ\n", + /*313*/ "テ√∈⊂∀タモ≦ニマミ⊃⇔∩≒ンハ縺ナリナキ⊂ツト⌒∃⊇∀≠ヨエ⇔⊇∨wモ」なメ宦ソ≒vマぁ⇔ナリ⊇リニツテメ縲d蛟マ♭⊇ぶ∈∋♭≦р早んナ∃⊇≡⊂マナ⇔フト⊇ツ艢窒フ┸d♀モK7 Avenger∀チ<Σなにδい♭ニツ\n", + /*314*/ "ンマレd」、メヒみ∃⊇ぶモ≠浴諢ニァ♭タ∃⊇≡⊂∃∀テ∽マンハ縺ニ≫テ∀♭ニツ⌒ナ翼∵ンハ縺ト√≫┫Åエ∨リホモ<艢窒フ┸d♀メΣなにδい∈エ⇔ぴ≪∈烙ネハラナ⇔フト⊇ツンメ≧マ━⊃≫∩⌒ナ√リヌ∋∵<刀マモ∧√♭驕諠ヒ∩≫テ∀⌒⊆≫メ♭ニツ\n", + /*315*/ "d繙пメ」、メくルィ♭>ァ┨δいモヵリ♭メ⌒メ∀♭ニツムマd♀♭」、∈ンハ縲<艢窒フ┸d♀♭づ」ナリニツ♪テマンハ縺ナ∨∩り√∃⊇≡⊂マエ\n", + /*316*/ "窶ワ縲操セミラロヘマ曾n", + /*317*/ "窶ワ縲逐セミラロヘマ箪n", + /*318*/ "窶ワ縲凍セミラロヘマ貼n", + /*319*/ "窶ワ縲楳セクのは°縲曾n", + /*320*/ "窶ワ縲斧セクのは°縲箪n", + /*321*/ "窶ワ縲摩セр漕カ曾n", + /*322*/ "窶ワ縲沃セр漕カ箪n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dishP.c b/src/files/lang/jap-final/dishP.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/jap-final/dishP.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_f.c b/src/files/lang/jap-final/dish_str_f.c new file mode 100644 index 000000000..0b877e455 --- /dev/null +++ b/src/files/lang/jap-final/dish_str_f.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Prendre la Vue nocturne sur la table pour commencer.\n", + /* 9*/ "Activer la Vue nocturne.\nTrouver l'interrupteur.\nR騁ablir la lumi鑽e.\n", + /* 10*/ "Prendre le r馗epteur sur la table pour commencer.\n", + /* 11*/ "Se tenir pr鑚 du terminal et utiliser le r馗epteur.\n", + /* 12*/ "Il faut tenir le r馗epteur.\n", + /* 13*/ "Connexion 騁ablie...\n", + /* 14*/ "Terminal pirat avec succ鑚.\n", + /* 15*/ "Connexion perdue - trop loin du PC.\n", + /* 16*/ "Prendre la mine CME sur la table pour commencer.\n", + /* 17*/ "Trouver le relais et lancer la mine CME sur le relais.\n", + /* 18*/ "Mine CME mal plac馥.\n", + /* 19*/ "Mine CME plac馥 correctement.\n", + /* 20*/ "Prendre la CamSpy sur la table pour commencer.\n", + /* 21*/ "Trouver PC de salle Info et holographier.\n", + /* 22*/ "Empreinte holographique de PC correcte.\n", + /* 23*/ "Lumi鑽es r饌ctiv馥s.\n", + /* 24*/ "Prendre le d馗odeur porte sur la table pour commencer.\n", + /* 25*/ "Utiliser le d馗odeur sur la porte pour l'ouvrir.\n", + /* 26*/ "Il faut tenir le d馗odeur porte.\n", + /* 27*/ "D馗odeur fix. Commandes de piratage lanc馥s...\n", + /* 28*/ "D馗odage termin. Porte d騅errouill馥.\n", + /* 29*/ "Prendre le pisteur sur la table pour commencer.\n", + /* 30*/ "Trouver le scanner IR gr稍e au pisteur.\n", + /* 31*/ "Scanner IR localis avec succ鑚.\n", + /* 32*/ "Prendre le scanner IR sur la table pour commencer.\n", + /* 33*/ "Trouver la porte secr鑼e gr稍e au scanner IR.\n", + /* 34*/ "Porte secr鑼e localis馥 avec succ鑚.\n", + /* 35*/ "Prendre le scanner rayons X sur la table pour commencer.\n", + /* 36*/ "Trouver interrupteurs cach駸 pour couper grille laser.\n", + /* 37*/ "Toutes les grilles laser sont d駸activ馥s.\n", + /* 38*/ "Prendre le costume sur la table pour commencer.\n", + /* 39*/ "Tromper quelqu'un pour obtenir un occulteur.\n", + /* 40*/ "Occulteur r馗up駻 avec succ鑚.\n", + /* 41*/ "Grille laser 1 d駸activ馥.\n", + /* 42*/ "Grille laser 2 d駸activ馥.\n", + /* 43*/ "Je viens chercher l'駲uipement.\n", + /* 44*/ "Bonjour, Joanna. Alors comme 軋 on se d馮uise?\n", + /* 45*/ "Voil. Ne le faites pas tomber surtout.\n", + /* 46*/ "Occulteur s馗uris avec succ鑚.\n", + /* 47*/ "N'oubliez pas d'utiliser votre costume, d'accord?\n", + /* 48*/ "Il faudra faire mieux que cela, Joanna.\n", + /* 49*/ "Joanna, d'o sortez-vous?\n", + /* 50*/ "La cam駻a vous a rep駻馥.\n", + /* 51*/ "Prendre l'occulteur sur la table pour commencer.\n", + /* 52*/ "Utiliser l'occulteur et localiser Carrington.\n", + /* 53*/ "Aucun doute possible, votre entranement\nest termin!\n", + /* 54*/ "Mission accomplie - Entranement 駲uipement termin!\n", + /* 55*/ "Mission 馗hou馥 - vous 黎es rep駻馥.\n", + /* 56*/ "Choisir le R馗epteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le r馗epteur et rel稍her le bouton A.\n", + /* 57*/ "Choisir la CamSpy.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir la CamSpy et rel稍her le bouton A.\n", + /* 58*/ "Choisir la Vue nocturne.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir Vue nocturne et rel稍her A.\n", + /* 59*/ "Choisir le D馗odeur porte.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le d馗odeur porte et rel稍her le bouton A.\n", + /* 60*/ "Choisir le Scanner rayons X.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le scanner rayons X et rel稍her le bouton A.\n", + /* 61*/ "Choisir le costume.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le costume et rel稍her le bouton A.\n", + /* 62*/ "Choisir le Scanner IR.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le scanner IR et rel稍her le bouton A.\n", + /* 63*/ "Choisir le Pisteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le pisteur et rel稍her le bouton A.\n", + /* 64*/ "Choisir l'Occulteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir l'occulteur et rel稍her le bouton A.\n", + /* 65*/ "Choisir la Mine CME.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir la mine CME et rel稍her le bouton A.\n", + /* 66*/ "Joanna, quel plaisir de vous voir.\n", + /* 67*/ "Suivez-moi, Joanna.\nJe vous emm鈩e aux salles d'entranement.\n", + /* 68*/ "Le centre d'information est derri鑽e cette porte.\n", + /* 69*/ "Ici se trouve le labo d'駲uipement.\n", + /* 70*/ "Par ici se trouve la salle d'entranement et de simulation.\n", + /* 71*/ "Par l se trouve le champ de tir.\n", + /* 72*/ "Ce couloir m鈩e au hangar.\n", + /* 73*/ "CAISSE ANTI-GRAV \nAppuyer sur B pr鑚 de la caisse pour la prendre...\n", + /* 74*/ "Appuyer sur B pour rel稍her une caisse en main.\n", + /* 75*/ "HOVERBIKE \nDeux fois sur B pr鑚 de l'Hoverbike pour l'utiliser...\n", + /* 76*/ "Deux fois sur B pour descendre de l'Hoverbike.\n", + /* 77*/ "OUVRIR PORTES \nAppuyer sur B pr鑚 d'une porte pour l'ouvrir.\n", + /* 78*/ "Le bouton B active aussi un objet proche.\n", + /* 79*/ "ASCENSEURS \nAppuyer sur B pr鑚 de la porte pour appeler l'ascenseur.\n", + /* 80*/ "Sortie impossible pendant un entranement.\n", + /* 81*/ "Code interrupteur 1 obtenu.\n", + /* 82*/ "Code interrupteur 2 obtenu.\n", + /* 83*/ "Code interrupteur 3 obtenu.\n", + /* 84*/ "Code interrupteur 4 obtenu.\n", + /* 85*/ "REGARDER HAUT\n- Appuyer sur C Bas pour regarder en haut.\n", + /* 86*/ "REGARDER BAS\n- Appuyer sur C Haut pour regarder en bas.\n", + /* 87*/ "Holoprogramme 2 termin avec succ鑚.\n", + /* 88*/ "Holoprogramme 4 termin avec succ鑚.\n", + /* 89*/ "Holoprogramme 5 termin avec succ鑚.\n", + /* 90*/ "Garde d駸arm avec succ鑚.\n", + /* 91*/ "Garde neutralis avec succ鑚.\n", + /* 92*/ "D駸armez cette cible mouvante si possible.\n", + /* 93*/ "Assomez la cible - mot-cl: furtivit.\n", + /* 94*/ "Et le dernier garde...\n", + /* 95*/ "S'ACCROUPIR\n- Maintenir R puis appuyer sur C Bas pour s'accroupir.\n", + /* 96*/ "RAMPER\n- Une fois accroupie, maintenir R et appuyer sur C bas.\n", + /* 97*/ "Holoprogramme 3 termin avec succ鑚.\n", + /* 98*/ "Activer tous les interrupteurs.\n", + /* 99*/ "Activer tous les interrupteurs muraux.\n- Faire vite ou ils s'騁eindront tous.\n", + /*100*/ "Examiner les terminaux pour les codes d'acc鑚.\n- Utiliser les codes sur les terminaux muraux.\n", + /*101*/ "Code 1 obtenu.\n", + /*102*/ "Code 2 obtenu.\n", + /*103*/ "Code 3 obtenu.\n", + /*104*/ "Code 4 obtenu.\n", + /*105*/ "Entranement 馗hou - regarder vers l'avant.\n", + /*106*/ "Holoprogramme 1 termin avec succ鑚.\n", + /*107*/ "Combat sans armes - assommer la cible.\n- Appuyer sur Z plusieurs fois pour se battre.\n", + /*108*/ "Essayer maintenant sur une cible mouvante...\n", + /*109*/ "Et maintenant contre une cible offensive.\n", + /*110*/ "Battre tous les ennemis sans subir de d馮穰s.\n", + /*111*/ "Entranement 馗hou - d馮穰s subis.\n", + /*112*/ "Holoprogramme 6 termin avec succ鑚.\n", + /*113*/ "Holoprogramme 7 termin avec succ鑚.\n", + /*114*/ "TERMINAUX\n- Appuyer sur B pr鑚 d'un terminal pour l'utiliser.\n", + /*115*/ "Activer maintenant les terminaux muraux rouges.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "OK, Joanna, je vous laisse vous pr駱arer.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humain (Femelle)\n", + /*127*/ "23 ans 2 mois\n", + /*128*/ "|Fichier IC #027 -\n\nStatut entranement: Complet\nNote entranement: A++\nStatut actuel: Assign馥\n\n|Profil -\n\nBien entran馥 mais sans exp駻ience. Formidables r饌ctions. A l'aise avec un bon nombre d'armes. Adaptation remarquable. Meilleur score l'entranement. A l'origine d'un nouveau syst鑪e de notation. Etant la repr駸entation de l'agent id饌l de l'Institut Carrington, on lui donna le surnom de 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Humain (M稷e)\n", + /*131*/ "28 ans 5 mois\n", + /*132*/ "|Fichier IC #009 -\n\nStatut entranement: Complet\nNote entranement: A+\nStatut actuel: Infiltr饅n\n|Profil -\n\nNotre agent infiltr la plus grande exp駻ience. Tr鑚 habile avec son arme de choix (Magnum). Plus qualifi pour des missions d'infiltration plutt que pour le combat ouvert. Avant Joanna Dark, il d騁enait le meilleur score d'entranement.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humain (M稷e)\n", + /*135*/ "62 ans 8 mois\n", + /*136*/ "|Fichier IC #000 -\n\nStatut entranement: Non disp.\nNote entranement: Non disp.\nStatut actuel: Non disp.\n\n|Profil -\n\nPatriarche scientifique/entrepreneur de g駭ie, fondateur de l'Institut Carrington. Il planifie toutes les missions conduites par ses agents et dirige les op駻ations depuis son bureau par lien direct. Il a un got vestimentaire 騁range.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humain (Femelle)\n", + /*139*/ "39 ans ? mois\n", + /*140*/ "|Notes de l'analyste -\n\nDirectrice de la dataDyne Corp. Fanatique du pouvoir. D騁este recevoir des ordres et perdre l'initiative. Est pr黎e des actes cruels pour 駘iminer toute concurrence. Haine cons駲uente envers Daniel Carrington.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humain (M稷e)\n", + /*143*/ "46 ans ? mois\n", + /*144*/ "|Notes de l'analyste -\n\nDirecteur de la National Security Agency. Est li par une certaine amiti Cassandra De Vries ou partage des int駻黎s/affaires avec cette derni鑽e. Ob駟t Cassandra, dot馥 d'une personnalit plus dominante que la sienne d駛 colossale. Est la figure de proue d'op駻ations occultes conduites par la NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Le sapiens Caroll (IA)\n", + /*147*/ "6 mois\n", + /*148*/ "|Profil -\n\n Une intelligence artificielle cr鳬e par la dataDyne Corp. gratifi馥 d'un penchant pour la lexicographie et les codes cracker. Il est par chance dot d'une morale, et gr稍e son incroyable intelligence, il a pu pr馘ire les plans de la dataDyne. Sa voix et sa prononciation sont impeccables, renfor軋nt son aspect de docteur en lettres.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (M稷e)\n", + /*151*/ "320 ans\n", + /*152*/ "|Profil -\n\nUn extraterrestre de la race Maian. Il est un 'Protecteur' (garde du corps) de l'ambassadeur Maian en d駱lacement sur la Terre la demande de Daniel Carrington. Les Protecteurs sont tous d'excellents matres d'armes. Elvis adore la Terre, qu'il trouve fascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humain (M稷e)\n", + /*155*/ "20-30 ans\n", + /*156*/ "|Profil -\n\nUn homme blond platine. Tr鑚 grand, il porte des v黎ements blancs et d'habitude un imperm饌ble. Il semble contrler la conspiration impliquant Cassandra et Trent. Telles sont les seules informations recueillies sur ce personnage.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (travesti)\n", + /*159*/ "inconnu\n", + /*160*/ "|Profil mis jour -\n\nUn guerrier skedar se dissimulant derri鑽e la projection holographique d'un homme blond d'une vingtaine d'ann馥s. Un modulateur vocal donne au Skedar une voix pr馗ise, convaincante et intelligente. Cet appareil de propagande Skedar est assez subtile pour fonctionner merveille.\n", + /*161*/ "Le Pr駸ident des Etats-Unis\n", + /*162*/ "Humain (M稷e)\n", + /*163*/ "50 ans\n", + /*164*/ "|Profil -\n\nUn Afro-Am駻icain de bonne 馘ucation, tr鑚 intelligent et perspicace. Il tente constamment de faire le bien mais il est malheureusement conseill par des gens comme Trent Easton. Il pense matriser Trent depuis qu'il lui a refus le Pelagic II pour la dataDyne Corp. Il ne b駭馭icie pas d'une grande popularit: on suppose, peut-黎re tort, que la majorit politique a tout contrle sur lui.\n", + /*165*/ "Maians\n", + /*166*/ "Les Maians sont les extraterrestres connus sur Terre sous le nom de 'Petits Gris'. Ils observent la Terre depuis longtemps (plusieurs si鐵les) et ayant d騁ect chez les humains un certain potentiel, ils appr馗ient notre monde et en sont les g駭駻eux m馗鈩es. Leur contact sur Terre est Daniel Carrington. Un contact politique officiel reste encore 騁ablir.\n", + /*167*/ "Guerrier skedar\n", + /*168*/ "Les Skedars sont des guerriers extraterrestres qui ont combattu les Maians pendant des si鐵les jusqu'au r馗ent cessez-le-feu. Ils utilisent de colossales armures m馗aniques pour se d駱lacer et combattre: ils sont en fait de petite taille et ressemblent des reptiles. Etant tr鑚 agressifs, la guerre est leur religion et ils y sont tous d騅ou駸.\n", + /*169*/ "Briefing\n", + /*170*/ "Il y a des millions d'ann馥s, un croiseur d'une puissance colossale fut sabord dans l'Oc饌n Pacifique par une race extraterrestre, les Cetans. Il 騁ait 駲uip d'une arme jamais utilis馥: un d馗oupleur nucl饌ire, pouvant en th駮rie briser les liens entre les mol馗ules. Pour que les t駑oins croient la destruction du vaisseau, une balise fut envoy馥 vers la plan鑼e m鑽e, et ils d騁ruisirent les sondes couvrant le syst鑪e solaire dans lequel ils d馗id鑽ent de se cacher.\n\nLes Maians d馗ouvrirent des signes de vie sur Terre. Bien que disposant d'un certain potentiel, les humains primitifs ne furent pas contact駸: les Maians d馗id鑽ent d'attendre qu'ils se d騅eloppent.\n\nLes Maians rencontr鑽ent les Skedars et s'enlis鑽ent dans un conflit sans fin. Apr鑚 des centaines d'ann馥s de guerre, ils arriv鑽ent finalement une paix fragile. Les fanatiques skedars 駱rouvent constamment la r駸istance de cette paix en se livrant des activit駸 terroristes, mais les Maians refusent de se laisser entraner.\n\nLes Maians se m馭ient des humains, conscients que de trop nombreuses crises sont survenues sur Terre cause de conflits technologiques et de malentendus. Ils craignent que l'annonce de leur pr駸ence n'entrane d'autres conflits sur la plan鑼e. Ils ont donc d馗id d'observer la race humaine jusqu' ce qu'elle devienne plus mature.\n\nDaniel Carrington anticipa le cours des 騅鈩ements en contactant un vaisseau maian en orbite autour de la Terre. Il avait un plan qui aiderait humains et Maians, en acc駘駻ant la prise de contact entre les deux peuples. Les Maians, qui trouv鑽ent le plan judicieux et Carrington honn黎e, aid鑽ent ce dernier diffuser leur technologie sur Terre.\n\nLes Skedars fanatiques trouv鑽ent la sonde messag鑽e provenant du croiseur Cetan. Ils envoy鑽ent imm馘iatement des 馗laireurs sur Terre pour enqu黎er de fa輟n brutale, kidnappant les gens et mutilant les animaux dans leur tentative de r馗up駻ation du croiseur. Leur enqu黎e les m鈩e dans l'Oc饌n Pacifique, o ils localisent le vaisseau. Cependant, ils ont besoin d'aide pour y acc馘er.\n\nIls m鈩ent leur propre 騁ude de la Terre et 騁ablissent une liste des soci騁駸 qui poss鐡ent les ressources n馗essaires pour les aider retrouver le vaisseau sabord. En t黎e de cette liste figure la dataDyne Corporation. Ils prennent contact avec le P-DG de la corporation, Cassandra De Vries et lui font une proposition qui semble trop belle pour 黎re honn黎e - ce qui est vrai. En 馗hange d'une aide pour sortir 'leur' vaisseau de l'oc饌n, ils donneront la dataDyne assez de technologie pour en faire la plus importante corporation sur Terre. Tout ce que la dataDyne doit faire est de construire une intelligence artificielle avec des capacit駸 linguistiques et de d馗odage. La dataDyne se met donc au travail.\n\nCassandra De Vries contacte Trent Easton, le dirigeant de la NSA, et lui expose les d騁ails. Il tente d'obtenir l'approbation du Pr駸ident pour le pr黎 d'un b穰iment de recherche oc饌nique la dataDyne mais 馗houe. Il n'existe aucun moyen pour les Skedars ou la dataDyne de voler le bateau sans provoquer la col鑽e du gouvernement am駻icain. Ils con輟ivent donc un nouveau plan : remplacer le Pr駸ident par un clone sous leur contrle. Cela promet Easton et De Vries une r馗ompense suppl駑entaire une fois l'op駻ation skedar termin馥.\n\nCependant, ils ne disposent pas de beaucoup de temps pour se r駛ouir puisque les Skedars ont l'intention de tester le d馗oupleur nucl饌ire sur la Terre avant d'annihiler les Maians. Mais Cassandra, aveugl馥 par la possibilit de gagner autant de pouvoir, ne pense m麥e pas l'騅entualit de se faire doubler. Il en va de m麥e pour Trent.\n\nMais la dataDyne cr馥 la seule chose qui puisse pr騅oir l'apparition de tels dangers en analysant le flot d'informations dont elle dispose. Cette cr饌tion, c'est l'IA mise au point pour craquer les codes du croiseur cetan. Lorsque l'IA exprime ses inqui騁udes quant cette mission, De Vries ordonne que l'on modifie sa personnalit. En d'autres termes, la cr饌tion pense trop. D駸esp駻馥, l'IA - sous le pseudonyme du Dr. Caroll - contacte l'Institut Carrington pour demander de l'aide.\n", + /*171*/ "L'histoire\n", + /*172*/ "Joanna Dark, agent novice, se voit confier une mission d'extraction. Elle doit aider un savant s'馗happer d'un complexe scientifique de haute s馗urit, situ sous l'immeuble de la dataDyne. Elle est surprise de d馗ouvrir que le Dr. Caroll est en fait une IA cr鳬e par la dataDyne mais poursuit n饌nmoins sa mission de sauvetage. L'alarme donn馥, Joanna doit se frayer un chemin jusqu' l'h駘iport au sommet de la tour, afin de s'enfuir par la voie des airs.\n\nEn r駱onse cette agression, la dataDyne capture Daniel Carrington deux jours plus tard et le retient en otage dans sa propre villa. La corporation r馗lame en 馗hange le retour de leur IA, leur 'propri騁'. Mais ce qu'ils ne savent pas, c'est que l'IA se trouve dans la villa, o Carrington discutait avec elle des plans de la dataDyne. Joanna d駘ivre Daniel, mais ne peut emp鹹her la dataDyne de r馗up駻er le Dr. Caroll. L'IA en a cependant assez dit Carrington pour que celui-ci convoque sur Terre un groupe de sp馗ialistes maians.\n\nJoanna est envoy馥 Chicago pour espionner les conspirateurs dans l'immeuble du G5, une fa軋de de la dataDyne Corp. Elle apprend l'implication de Trent Easton, directeur de la NSA et celle de l'騁range homme d'origine nordique qui semble tout contrler. Une fois le plan concernant le Pr駸ident r騅駘 par Trent, Joanna rapporte la situation, mais d馗ouvre qu'il y a quelque chose de plus urgent accomplir en premier lieu.\n\nLes sp馗ialistes ont 騁 intercept駸 par les conspirateurs. Les survivants du crash et l'駱ave ont 騁 transport駸 dans le Secteur 51, dans le Nevada. Joanna est largu馥 dans le secteur afin de contacter un autre agent de l'Institut Carrington, de secourir d'騅entuels survivants et de retrouver leur 駲uipement. Lorsqu'elle p駭鑼re dans le labo, Joanna d馗ouvre le secret de l'Institut : ses alli駸 sont des Maians, les extraterrestres connus sous le nom de Petits Gris. L'extraterrestre qu'elle sauve s'appelle Elvis. Il 騁ait garde du corps de l'ambassadeur qui 騁ait la t黎e de l'駲uipe de sp馗ialistes.\n\nApr鑚 avoir aid les survivants de la d駘馮ation Maian, Joanna peut s'occuper des plans de la dataDyne concernant le Pr駸ident. Elle se fait passer pour un membre de l'entourage du Pr駸ident pour acc馘er la base a駻ienne o Air Force One est stationn. Elle r騏ssit ensuite se cacher bord de l'avion. Une fois en vol, Trent et les Skedars occult駸 se manifestent, mais Joanna est l pour les arr黎er. Elle escorte le Pr駸ident jusqu' la capsule de sauvetage, tandis que des hommes de Trent parcourent l'avion la recherche du Pr駸ident. Ils d駸irent entraner ce dernier bord de l'OVNI skedar, arrim AF1 par une passerelle amovible. Joanna endommage la passerelle, mais ne parvient pas la d騁ruire. Elle appelle Elvis la rescousse et celui-ci d馗ide de s'馗raser sur Air Force One. La capsule de sauvetage est 駛ect馥 et les trois appareils s'馗rasent dans le d駸ert glac de l'Alaska.\n\nJoanna reprend connaissance et essaie de faire son rapport, mais elle s'aper輟it que sa communication est brouill馥 par une transmission provenant de l'appareil skedar. Elle se met en route dans la neige pour retrouver le Pr駸ident et Elvis. Elle rencontre des escouades de Skedars occult駸 qui recherchent le Pr駸ident, Elvis, elle-m麥e et certaines possessions du Pr駸ident. Elle suit un groupe jusqu'au vaisseau skedar abattu, o elle d馗ouvre un clone du Pr駸ident. Elle le d騁ruit et coupe le brouilleur, puis appelle la cavalerie. Les plans skedars ont 騁 d駛ou駸 une fois de plus, le Pr駸ident est sauf et Trent est ex馗ut de fa輟n atroce par les Skedars pour son incomp騁ence.\n\nAu m駱ris de toute prudence, la dataDyne et les Skedars s'emparent du Pelagic II - le b穰iment d'騁udes oc饌niques du gouvernement - et se dirigent vers le lieu o se trouve le vaisseau cetan. Joanna et Elvis s'introduisent bord du bateau pour y semer le d駸ordre et d馗ouvrir quel est le grand projet. Apr鑚 avoir sabot les op駻ations de plong馥 et rappel le sous-marin, ils plongent vers les profondeurs de l'oc饌n, o ils aper輟ivent le croiseur cetan pour la premi鑽e fois. Ils p駭鑼rent dans le vaisseau via le passage ouvert par les Skedars et tombent sur un guerrier skedar mort... Apparemment, l'escouade d'assaut n'a pas eu la partie facile. Apr鑚 avoir combattu les Skedars et 騅it les Cetans, Joanna et Elvis atteignent le coeur du vaisseau. L, ils d馗ouvrent l'IA qui 騁ait le Dr. Caroll. Une fois sa personnalit restaur馥, le Dr. Caroll presse Joanna et Elvis de quitter le vaisseau, qu'il a l'intention de d騁ruire une bonne fois pour toutes.\n\nDe retour l'Institut Carrington, Joanna est sur le point de partir un cocktail pr駸identiel la Maison Blanche lorsque l'enfer se d馗hane. Les survivants de l'駲uipe d'assaut skedar lib鑽ent leur vengeance sur les responsables de leur 馗hec. Joanna parcourt l'Institut en essayant d'escorter un maximum d'employ駸 vers les hangars, tandis que les Skedars attaquent diff駻entes parties du b穰iment. Tandis que la majorit des employ駸 quittent les lieux, Joanna retient les Skedars avant de se faire assommer et capturer.\n\nElle se r騅eille dans une pi鐵e bord du croiseur skedar avec Cassandra comme compagnon de cellule. Cette derni鑽e se sacrifie pour permettre Joanna de s'馗happer. Elle parvient abaisser les boucliers des zones d'amarrage et Elvis arrive avec quelques amis pour une petite partie de tir aux pigeons.\n\nLe vaisseau captur se place en orbite autour de la plan鑼e o se trouve l'Autel de Bataille skedar. Elvis est abasourdi : les Maians n'ont jamais r騏ssi trouver cet endroit, le saint des saints des Skedars. Si l'Autel 騁ait d騁ruit, cela an饌ntirait le moral des Skedars et une v駻itable paix pourrait 黎re instaur馥 la place d'un cessez-le-feu instable. Joanna se charge du chef des Skedars, le Grand Pr黎re de l'Autel de Bataille tandis qu'Elvis retourne au croiseur pour contacter la flotte Maian.\n\nL'histoire se termine avec le temple en ruine... Elvis demande un r駱it dans le bombardement afin de pouvoir trouver Joanna. Elle est vivante, coinc馥 sous des gravats et retenue par un Skedar accroch sa jambe. Elvis lui tend une arme pour convaincre le Skedar de la laisser partir. Les deux h駻os quittent ensuite la plan鑼e.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ " La corporation tentaculaire qu'est devenue dataDyne a commenc dans la programmation d'IA Lorsqu'il devint 騅ident que la plupart de leurs revenus provenaient de leur travail pour l'arm馥 am駻icaine, une jeune directrice aux dents longues, Cassandra De Vries, se mit traiter avec des fabricants d'armes et ignorer les offres de collaboration de Daniel Carrington et de l'Institut, pour la programmation quantique et la recherche sur les IA. Apr鑚 le rachat par dataDyne de la troisi鑪e corporation d'armement, les b駭馭ices devinrent astronomiques. Dans le mois qui suivit la r馗eption d'un contrat gouvernemental d'armement, Cassandra De Vries fut nomm馥 PDG une part importante des b駭馭ices furent inject駸 dans la recherche sur les IA, avec d'excellents r駸ultats.\n", + /*175*/ "Institut Carrington\n", + /*176*/ "Bri钁ement consid駻 comme un inventeur cingl, Daniel Carrington fut le premier diffuser la technologie anti-gravit dans le monde. Les revenus g駭駻駸 par cette nouvelle technologie et ses d駻iv駸 l'ont aid cr馥r l'Institut Carrington, un r駸ervoir des connaissances technologiques situ dans une partie recul馥 des USA. Mais l'Institut est 馮alement une base d'entranement pour ses agents, qui sont envoy駸 travers le monde pour suivre les d騅eloppements technologiques, pour des raisons connues de Carrington uniquement.\n", + /*177*/ "Description\n- Une minuscule cam駻a contrlable distance, parfaite pour l'exploration furtive. Elle est 駲uip馥 pour l'holographie. Elle peut ouvrir les portes en projetant une zone de chaleur humaine.\n\nInstructions d'entranement\n- Prenez un hologramme du terminal informatique de la salle Info voisine.\n\nManipulation\n- Appuyez sur Z pour prendre un hologramme. Appuyez sur B pour ouvrir n'importe quelle porte. Maintenez R pour regarder autour de vous.\n", + /*178*/ "Description\n- Amplifie la lumi鑽e ambiante pour fournir une image de la zone. R騅鑞e 馮alement les formes de vie. L'utilisation avec une luminosit normale entrane des surtensions, qui 'blanchissent' l'affichage.\n\n Instructions d'entranement\n- D駱lacez-vous dans le noir, trouvez l'interrupteur et actionnez-le pour faire revenir la lumi鑽e.\n\n Manipulation\n- S駘ectionnez la Vue nocturne dans votre inventaire pour l'activer. S駘ectionnez-l nouveau pour la d駸activer.\n", + /*179*/ "Description\n\n- Appareil autonome de d馗odage. S'attache au panneau de contrle et passe en revue les diff駻entes combinaisons jusqu' l'ouverture.\n\n Instructions d'entranement\n- Trouvez le panneau ct de la porte et utilisez le d馗odeur pour la d騅errouiller.\n\nManipulation\n- Tenez-vous pr鑚 de la porte et appuyez sur le Bouton tout en tenant le d馗odeur.\n", + /*180*/ "Description\n\n- Utilis pour voir travers les murs et les objets solides. Peut voir des choses que la Vue nocturne et les lunettes IR ne peuvent d騁ecter.\n\n Instructions d'entranement\n- Le scanner allum, recherchez les deux interrupteurs cach駸 et activez-les pour 騁eindre la grille laser.\n\nManipulation\n- Choisir le scanner dans l'inventaire pour l'activer. Le choisir nouveau pour le d駸activer.\n", + /*181*/ "Description\n\n- Endormez les soup輟ns en utilisant un costume. Soyez vigilant cependant, certains ennemis peuvent vous d駑asquer.\n\n Instructions d'entranement\n- Grimshaw poss鐡e un occulteur qui attend d'黎re utilis. Dirigez-vous vers la porte suivante et procurez-vous-le.\n\nOp駻ation\n- S駘ectionnez le costume pour le porter.\n", + /*182*/ "Description\n\n- Convertit les informations thermiques en images. Peut 黎re utilis dans le noir. R騅鑞e 馮alement des anomalies telles que portes secr鑼es et les pans de mur peu solides.\n\n Instructions d'entranement\n- Allumez le scanner IR, trouvez la porte cach馥 et ouvrez-la.\n\nManipulation\n- S駘ectionnez le scanner IR dans votre inventaire pour l'activer. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*183*/ "Description\n- Localise un objet particulier dans une carte radar HUD. Indique la distance et l'駲uipement.\n\n Instructions d'entranement\n- Activez le Pisteur et suivez l'馗ho radar pour retrouver l'objet.\n\nOperation\n- S駘ectionnez le Pisteur dans votre inventaire. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*184*/ "Description\n- Cr馥 une disruption du spectre lumineux autour du porteur, ce qui entrane un effet cam駘駮n presque parfait. L'effet est annul lorsque le porteur fait feu.\n\n Instructions d'entranement\n- Activez l'occulteur et dirigez-vous vers le bureau de Carrington pour le surprendre!\n\nManipulation\n- S駘ectionnez l'occulteur dans l'inventaire. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*185*/ "Description\n- Emet un signal alternatif pour brouiller les communications 駘ectroniques. Doit 黎re plac sur l'appareil pour 黎re efficace.\n\n Instructions d'entranement\n- Jetez la mine CME sur le voyant lumineux au-del de la porte secr鑼e.\n\n Manipulation\n- Appuyez sur le Bouton Z pour jeter la mine. Maintenez le Bouton R enfonc et ajustez votre vis馥 avec le Stick analogique avant de jeter la mine.\n", + /*186*/ "Description\n- Relie l'agent sur le terrain et les informaticiens de l'Institut. Ils peuvent ensuite pirater des donn馥s ou ouvrir les serrures 駘ectroniques distance.\n\n Instructions d'entranement\n- Utilisez le R馗epteur pour pirater le terminal dans le coin, pour d騅errouiller une porte secr鑼e.\n\nManipulation\n- Tenez-vous ct du terminal et appuyez sur le Bouton B lorsque vous avez le R馗epteur en main.\n", + /*187*/ "TIRER\n Appuyez sur le Bouton Z pour faire feu.\n", + /*188*/ "AUTO RECHARGE\n Rel稍hez le Bouton Z quand vous 黎es court de munitions.\n", + /*189*/ "RECHARGE MANUELLE\n Appuyez sur le Bouton B pour recharger avant la fin du chargeur.\n", + /*190*/ "Viser: Maintenez le Bouton R enfonc pour le mode vis馥.\n", + /*191*/ "Utilisez le Stick analogique pour d駱lacer le curseur de vis馥.\n", + /*192*/ "AUTO FIRE\n Maintenez le Bouton Z enfonc pour tirer en mode automatique.\n", + /*193*/ "CHANGER VUE\n Appuyez sur le Bouton C haut ou bas pour regarder en haut ou en bas.\n", + /*194*/ "ZOOM\n Maintenez le Bouton R enfonc pour le mode zoom.\n", + /*195*/ "TIR RAPIDE\n Appuyez rapidement sur le Bouton Z pour tirer plus vite.\n", + /*196*/ "Institut Carrington\0|Base d'op駻ations\n", + /*197*/ "Tour Lucerne\0|QG supr麥e\n", + /*198*/ "Sous-sol laboratoire\0|Labos de recherche souterrains\n", + /*199*/ "Villa Carrington \0|R駸idence cti鑽e priv馥\n", + /*200*/ "Chicago\0|Coins louches de la ville\n", + /*201*/ "Immeuble G5\0|Fa軋de commerciale de la dataDyne\n", + /*202*/ "Secteur 51\0|Pr鑚 du lac Groom Dry, Nevada\n", + /*203*/ "Base a駻ienne en Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'avion pr駸identiel\n", + /*205*/ "Lieu du crash\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|B穰iment de recherche sous-marine\n", + /*207*/ "Vaisseau Cetan \0|Un autre univers sur Terre\n", + /*208*/ "Croiseur Skedar \0|Vaisseau de transport de troupes\n", + /*209*/ "Monde natal Skedar\0|La plan鑼e de l'Autel de Bataille\n", + /*210*/ "Largueur\0|Transport de troupes\n", + /*211*/ "Caisse antigrav\0|Appareil d'antigravit饅n", + /*212*/ "Hoverbike\0|V馼icule de basse altitude\n", + /*213*/ "Robot de nettoyage\0|Votre copain pour la vie\n", + /*214*/ "Hovercopter\0|H駘ico antigrav de combat urbain\n", + /*215*/ "Robot G5\0|Drode de combat urbain\n", + /*216*/ "Intercepteur S51\0|Robot a駻ien d'interception\n", + /*217*/ "Vaisseau Maian\0|Vaisseau de reconnaissance et de patrouille\n", + /*218*/ "Navette Skedar\0|Vaisseau de largage de troupes\n", + /*219*/ "Le b穰iment de l'Institut comprend de nombreuses zones diff駻entes: bureaux et laboratoires, ateliers et hangars. Il est isol du monde ext駻ieur ce qui aide garder le secret des diff駻entes op駻ations.\n", + /*220*/ "Au beau milieu du quartier des affaires, l'aust鑽e b穰iment de la dataDyne Corporation, se d騁ache du reste du paysage.\n", + /*221*/ "Ces laboratoires, bien cach駸 et sous haute surveillance, sont la cl de l'avenir de la dataDyne. Dans ces labos, des techniciens travaillent avec acharnement pour propulser la dataDyne au sommet.\n", + /*222*/ "Propri騁 de l'Institut, cette r駸idence retir馥 est le refuge de Daniel Carrington pour 馗happer au stress de l'Institut. La r駸idence, 駲uip馥 d'un g駭駻ateur, sert d'observatoire et poss鐡e une cave vin bien remplie.\n", + /*223*/ "Un coin glauque et miteux de Chicago, ferm la circulation terrestre. C'est ici que la Corporation G5 poss鐡e son QG.\n", + /*224*/ "A l'int駻ieur de l'immeuble du G5, il existe une salle de r騏nion prot馮馥 par des dispositifs anti-mouchards. C'est le lieu le plus sr de dataDyne pour les discussions hautement confidentielles.\n", + /*225*/ "Cette section du complexe connu sous le nom de Secteur 51, se trouve sur les contreforts du lac Groom Dry. Les aires d'atterrissage pour h駘icos et les tours de communications donnent une id馥 de la taille du complexe souterrain.\n", + /*226*/ "L'une des nombreuses bases a駻iennes renforc馥s, servant de points de ravitaillement pour Air Force One. Ces bases sont isol馥s et se trouvent dans des r馮ions inhospitali鑽es, loin des yeux indiscrets.\n", + /*227*/ "Cet Air Force One est optimis pour les climats froids, plutt utile lorsqu'il est bas au nord de l'Alaska. Le vol est destination d'Oslo, Norv鑒e.\n", + /*228*/ "Dans le paysage rocheux et enneig du cercle polaire arctique repose l'駱ave de l'avion abattu.\n", + /*229*/ "Propri騁 du gouvernement des USA, le Pelagic II a 騁 con輹 pour les missions de plong馥 dans les profondeurs abyssales, et ce dans n'importe quelles conditions climatiques. C'est le seul b穰iment au monde pouvoir 騁udier les grands fonds oc饌niques.\n", + /*230*/ "Un gigantesque vaisseau extraterrestre qui repose au fond de l'oc饌n depuis des millions d'ann馥s.\n", + /*231*/ "Un vaisseau d'assaut interplan騁aire qui transporte les guerriers skedars vers les zones de conflit. Fait partie de la tr鑚 diminu馥 flotte skedar.\n", + /*232*/ "Une plan鑼e aride, secou馥 par des tremblements de terre, des temp黎es de sable et des tornades. Fait partie d'un syst鑪e solaire complexe trois soleils.\n", + /*233*/ "Un v馼icule de transport d'agents. Petit, rapide et tr鑚 maniable, il a 騁 con輹 pour une utilisation urbaine. Peut 黎re contrl par ordinateur ou pilot distance. Il peut transporter trois quatre agents, plus leur 駲uipment.\n", + /*234*/ "Un appareil antigrav con輹 pour aider les manutentionnaires qui se fixe une caisse. Lorsqu'il est activ, le champ antigrav soul钁e la caisse en r馘uisant son inertie.\n", + /*235*/ "Moto de patrouille basse altitude. Utilise une petite unit AG pour flotter, ainsi qu'une petite -mais puissante- turbine pouss馥 vectorielle pour la propulsion et la direction.\n", + /*236*/ "Il maintient une maison propre et en ordre. Il a souvent acc鑚 toutes les zones d'un b穰iment, il est donc sage de le laisser intact autant que possible. Il peut ainsi fournir l'acc鑚 malgr lui certaines zones importantes.\n", + /*237*/ "V馼icule de patrouille et d'駘imination. Equipage de deux hommes, arm d'un canon Vulcain l'avant, et d'un lance-missiles sur chaque aile. Peut 黎re descendu avec un feu nourri, ou mieux, avec une roquette bien plac馥.\n", + /*238*/ "Robot de combat urbain. Utilise une unit antigrav pour flotter. Lourdement prot馮 et arm. Utilis pour 駘oigner les visiteurs indiscrets, avec son programme 'tirer d'abord et ne pas poser de questions plus tard'.\n", + /*239*/ "Variante robotique de l'Hoverbike, avec une turbine et une unit AG beaucoup plus puissantes. Peut atteindre Mach 2 sans probl鑪e et peut avancer au pas pendant des heures. En d駱it de son armement, ce v馼icule compte plus sur sa maniabilit que sur ses boucliers.\n", + /*240*/ "Con輹 pour un seul pilote maian. Un passager se sentirait l'騁roit, et un passager humain encore plus.\n", + /*241*/ "Capable de transporter au combat dix guerriers skedars en armure et arm駸 jusqu'aux dents. Ind騁ectable par des radars conventionnels. Il peut 駑ettre de puissantes ondes de brouillage qui couvrent une zone importante : ces ondes brouillent les communications, ainsi que les 駲uipements de d騁ection.\n", + /*242*/ "Description\n- Un bon agent remarque chaque d騁ail autour de lui.\n\n Instructions d'entranement\n- Examinez tous les objets directement.\n\nManipulation\n- Regarder vers le haut- Appuyez sur le Bouton C bas\n- Regarder vers le bas- Appuyez sur le Bouton C haut\n- Observation- Maintenez enfonc le Bouton R pour passer en mode vis馥 et utilisez le Stick pour regarder dans une direction.\n", + /*243*/ "Description\n- Les pas de ct et les d駱lacements lat駻aux peuvent vous sortir de situations difficiles.\n\n Instructions d'entranement\n- Activez tous les interrupteurs devant vous. Soyez rapide, car chaque interrupteur reviendra dans sa position initiale au bout d'un certain temps.\n\nManipulation\n- Pas gauche- Bouton C gauche\n- Pas droite- Bouton C droit\n\n", + /*244*/ "Description\n- Se baisser et s'accroupir permet d'acc馘er de nouvelles zones.\n\n Instructions d'entranement\n- Frayez-vous un chemin en utilisant les mouvements qui vous sont disponibles. Activez les interrupteurs.\n\n Manipulation\n- Se baisser- Maintenez R et appuyez sur C bas.\n- S'accroupir- Une fois baiss, maintenez R et appuyez sur C bas.\n- Se relever- Appuyez bri钁ement sur R.\n\n", + /*245*/ "Description\n- Combattre plusieurs adversaires au corps--corps peut s'av駻er difficile.\n\n Instructions d'entranement\n- Assommez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Coup de poing - Appuyez rapidement sur le Bouton Z pour une rafale de coups de poing.\n\n", + /*246*/ "Description\n- D駸armer votre adversaire peut vous permettre d'obtenir de nouvelles armes.\n\n Instructions d'entranement\n- Assommez/d駸armez tous les ennemis sans vous faire toucher.\n\nManipulation\n- D駸armer - Maintenez le Bouton B enfonc, puis appuyez sur le Bouton Z.\n- Assommer- Assommez un ennemi inattentif par derri鑽e.\n", + /*247*/ "Description\n- Combattre plusieurs adversaires mains nues.\n\n Instructions d'entranement\n- Battez tous les ennemis d駸arm駸 sans vous faire toucher.\n\n", + /*248*/ "Description\n- Combattre plusieurs adversaires, arm駸 ou non.\n\n Instructions d'entranement\n- Battez tous les ennemis arm駸 sans vous faire toucher.\n\n", + /*249*/ "Pour plus de pr馗ision et de libert lorsque vous regardez autour de vous, utilisez le mode vis馥.\n", + /*250*/ "Pensez l'endroit o vous souhaitez aller avant de commencer le test. Placez-vous un endroit qui demandera le moins de mouvement possible entre les cibles.\n", + /*251*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous d駱lacez plus vite debout. Pour passer le test le plus vite possible, baissez-vous seulement lorsque c'est n馗essaire.\n", + /*252*/ "Attaquer vos ennemis dans le dos peut 黎re d駸honorant, mais c'est un moyen beaucoup plus sr de les 駘iminer. N'allez au corps--corps que lorsque c'est vraiment n馗essaire, et soyez pr黎 reculer lorsque l'ennemi riposte.\n", + /*253*/ "Restez au contact le temps d'attraper l'arme. Reculez hors de port馥 de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*254*/ "Ne restez pas immobile en attendant de vous faire toucher; bougez! Ne vous fixez pas sur un seul adversaire; essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu' ce que vous le puissiez.\n", + /*255*/ "Neutralisez les adversaires arm駸 une fois que vous matrisez le combat rapproch. Lorsque vous venez de d駸armer un ennemi, reculez et utilisez l'arme d駻ob馥 avant qu'il ne s'approche de vous.\n", + /*256*/ "Pour plus de pr馗ision et de libert lorsque vous regardez autour de vous, utilisez le mode Vis馥.\n", + /*257*/ "Les pas de ct et les d駱lacements lat駻aux peuvent vous sortir de situations difficiles.\n", + /*258*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous d駱lacez plus vite debout. Pour bouger le plus rapidement possible baissez-vous lorsque c'est r馥llement n馗essaire.\n", + /*259*/ "Attaquer vos ennemis dans le dos peut 黎re d駸honorant, mais c'est un moyen beaucoup plus sr de les 駘iminer. N'allez au corps--corps que lorsque c'est vraiment n馗essaire et soyez pr黎 reculer avant que l'ennemi ne riposte.\n", + /*260*/ "Restez rapproch juste le temps d'attraper l'arme. Reculez hors de port馥 de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*261*/ "Ne restez pas immobile en attendant de vous faire toucher: bougez! Ne vous fixez pas sur un seul adversaire, essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu' ce que vous le puissiez.\n", + /*262*/ "Allez chercher les adversaires arm駸 une fois que vous matrisez le combat rapproch. Lorsque vous venez de d駸armer un ennemi, reculez et utilisez l'arme que vous venez de voler avant qu'il ne s'approche de vous.\n", + /*263*/ "Veillez ce que l'objet cibl soit toujours dans votre champ de vision quand vous utilisez le R馗epteur, et restez suffisamment proche pour 騅iter que la connexion ne soit interrompue.\n", + /*264*/ "Assurez-vous que la mine se fixe bien o vous voulez en vous approchant le plus possible de la cible. Ajustez votre vis馥 en utilisant les Boutons C ou le Bouton R pour la vis馥.\n", + /*265*/ "La CamSpy peut 黎re difficile contrler, alors prenez votre temps.\n", + /*266*/ "Utile en combat, mais peut vous causer des ennuis en cas de surcharge.\n", + /*267*/ "Si vous avez des probl鑪es pour fixer le D馗odeur, rapprochez-vous de la cible en lui faisant face.\n", + /*268*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant la cible. Attention votre environnement et soyez pr黎 explorer.\n", + /*269*/ "Le viseur r馘uit votre vision p駻iph駻ique, ce qui peut 黎re un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*270*/ "Si vous utilisez cet appareil au mauvais moment, cela peut vous coter la vie, puisque cela vous emp鹹he de voir quoi que soit au del d'un certain point. A utiliser avec mod駻ation.\n", + /*271*/ "Un costume n'est pas seulement le v黎ement, c'est 馮alement la mani鑽e dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*272*/ "Economisez votre camouflage lorsqu'il n'y a personne pour vous voir.\n", + /*273*/ "Veillez ce que l'objet cible soit toujours dans votre champ de vision quand vous utilisez le R馗epteur, et restez suffisamment proche pour 騅iter que la connexion ne soit interrompue.\n", + /*274*/ "Assurez-vous que la mine se fixe bien o vous voulez en vous approchant le plus possible de la cible. Ajustez votre vis馥 en utilisant les Boutons C ou le Bouton R pour la vis馥.\n", + /*275*/ "La CamSpy n'est pas invisible - les ennemis peuvent la rep駻er : alors soyez prudent en entrant dans une zone d駸erte. Souvenez-vous que la CamSpy reste l o vous l'avez laiss馥 jusqu' ce que vous la ramassiez.\n", + /*276*/ " Utile en combat, mais peut vous causer des ennuis en cas de surcharge. Anticipez ces situations et r饌gissez avant l'ennemi.\n", + /*277*/ "Si vous avez des probl鑪es pour fixer le D馗odeur, rapprochez-vous de la cible en lui faisant face.\n", + /*278*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant la cible. Attention votre environnement et soyez pr黎 explorer.\n", + /*279*/ "Le viseur r馘uit votre vision p駻iph駻ique, ce qui peut 黎re un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*280*/ " Si vous utilisez cet appareil au mauvais moment, cela peut vous coter la vie, puisque cela vous emp鹹he de voir quoi que soit au del d'un certain point. A utiliser avec mod駻ation.\n", + /*281*/ " Un costume n'est pas seulement un v黎ement, c'est 馮alement la mani鑽e dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*282*/ " Economisez votre camouflage lorsqu'il n'y a personne pour vous voir. Evitez de tirer, sauf en cas d'absolue n馗essit et si vous 黎es sr du r駸ultat.\n", + /*283*/ "Le Falcon 2 est une arme de poing tr鑚 pr馗ise. Par cons駲uent, toute erreur dans ce test est de votre faute. Le mode secondaire est un coup de crosse et est donc inutile distance.\n", + /*284*/ "Pour rendre le Falcon 2 encore plus efficace, une lunette a 騁 ajout馥 l'arme. Tout comme pour le Falcon 2 de base, le mode coup de crosse est inutile distance.\n", + /*285*/ "La version du Falcon 2 avec silencieux est une excellente arme pour les op駻ations furtives, con輹e pour vous donner l'avantage de la surprise sur vos ennemis. Testez votre pr馗ision pour vous assurer de ne jamais g稍her votre chance.\n", + /*286*/ "Le Magsec 4 privil馮ie la puissance de feu au d騁riment de la pr馗ision, particuli鑽ement en mode rafale de trois. La seule contrainte importante est la taille du chargeur.\n", + /*287*/ "Voici une arme Skedar typique, brutale et puissante. En sacrifiant une partie des munitions, la puissance peut 黎re concentr馥 en un tir d騅astateur. La quantit importante de munitions est un avantage.\n", + /*288*/ "Ce pistolet tr鑚 versatile poss鐡e deux types de munitions: standard ou explosives. Les ing駭ieurs maians ont r騏ssi cette prouesse sans sacrifier la consommation d'駭ergie, bien que la cadence de tir soit r馘uite.\n", + /*289*/ "L'art du DY357 est de savoir quand recharger. Un chargeur de six balles influe donc sur l'issue d'un combat. Le poids de l'arme peut s'av駻er utile pour assommer quelqu'un.\n", + /*290*/ "Trent Easton est toujours la recherche du nec plus ultra et cette arme ne fait pas exception. Les balles sont aussi particuli鑽es que l'arme. Elles sont con輹es pour se fragmenter l'int駻ieur de la cible et l'駘iminer rapidement.\n", + /*291*/ "Un pistolet-mitrailleur fiable et efficace. On comprend pourquoi il reste la meilleure vente de la dataDyne depuis les deux derni鑽es ann馥s, et ceci gr稍e son mode secondaire. Le syst鑪e d'acquisition et de verrouillage de cible est en effet excellent: familiarisez-vous avec la manipulation compl鑼e de cette arme.\n", + /*292*/ "Le pistolet-mitrailleur Cyclone a 騁 con輹 pour ne PAS 黎re pr馗is, mais c'est une excellente distraction l'entranement. Sa cadence de tir est cependant extr麥ement 駘ev馥, faisant de cette arme un atout d騅astateur.\n", + /*293*/ "Cette mitraillette est issue de la flexibilit de conception maian. Son mode secondaire est int駻essant: un projectile haute v駘ocit qui peut p駭騁rer n'importe quoi. Pour 騅iter d'endommager le canon ou le m馗anisme de mise feu, la cadence de tir - tout comme pour le Phoenix - est r馘uite en mode secondaire.\n", + /*294*/ "Le RC-P120 tire un projectile min駻al sp馗ial qui, coupl une grande cadence de tir et un chargeur important, en fait une arme parfaite contre les Skedars. Les balles peuvent 黎re utilis馥s pour alimenter un prototype d'occulteur. L'entranement a 騁 modifi pour mettre en valeur cette caract駻istique particuli鑽e.\n", + /*295*/ "Non seulement cette arme peut 黎re pli馥 pour ressembler un PC portable, mais elle peut en plus 黎re transform馥 en arme sentinelle en mode secondaire. Cela vous sera utile pour couvrir une retraite ou prot馮er une zone.\n", + /*296*/ "C'est le mod鑞e que la dataDyne a r騏ssi vendre l'arm馥 am駻icaine, bien qu'elle ne soit pas encore largement r駱andue. Con輹e dans l'esprit de la dataDyne pour faire de mauvaises surprises, le mod鑞e de base est pourvu d'une mine de proximit sous le canon. Vous devez vous d饕arrasser de votre arme pour utiliser le mode secondaire.\n", + /*297*/ "Le mode secondaire de cette arme semble 黎re un 'd騁ecteur de danger' rep駻ant mines, appareils explosifs (tels que Dragon en mode secondaire) et armes sentinelles. Bien que puissante, cette arme dispose d'un chargeur trop petit.\n", + /*298*/ "Premier essai de l'Institut pour cr馥r une arme de soutien, l'AR34 est un fusil d'assaut de base. Le mode secondaire est un zoom permanent. Optez plutt pour le tir de pr馗ision.\n", + /*299*/ "La version lourde du Dragon. La mine a 騁 remplac馥 par un petit lance-grenades. Il a 騁 adopt par l'arm馥 am駻icaine comme arme de soutien d'escouade. Entranez-vous utiliser le lance-grenades.\n", + /*300*/ "La subtilit n'est pas de mise ici. Le premier mode est un tir simple et le second un tir double. Le chargeur est grand pour un fusil pompe, mais m馭iez-vous du long temps de rechargement et calculez vos mouvements en fonction de celui-ci.\n", + /*301*/ "Un fusil de sniper bien construit et pourvu d'un silencieux ainsi que d'un zoom fort grossissement. Seul le tireur peut influer sur la pr馗ision du fusil. Utilisez le mode secondaire pour vous accroupir et stabiliser votre vis馥.\n", + /*302*/ "Bien que la technologie employ馥 pour 駘aborer ce fusil soit au-del de notre compr馼ension, nous pouvons toujours appr馗ier les effets du FarSight. Le tir est presque impossible arr黎er et la lunette peut inspecter travers les murs sur une grande profondeur, verrouillant la cible si besoin est.\n", + /*303*/ "Le premier mode de l'arbal鑼e est un tir de projectile soporifique, le second un tir de poison mortel effet imm馘iat. C'est avant tout une arme pour les missions demandant une grande discr騁ion. Recharger cette arme prend du temps, attention donc son utilisation en combat.\n", + /*304*/ "Le pistolet tranquillisant est de conception banale. On le trouve dans de nombreux laboratoires et hpitaux travers le monde. Le second mode projette des doses mortelles consommant beaucoup plus de s馘atif.\n", + /*305*/ "Essayez de matriser cette arme du mieux que vous pouvez. Ce qui est certain, c'est qu'elle a 騁 con輹e pour un utilisateur beaucoup plus fort qu'un humain. Agenouillez-vous pour stabiliser votre vis馥. Si un ennemi r騏ssit passer travers le rideau de feu, utilisez les canons comme broyeur pour hacher votre adversaire.\n", + /*306*/ "Un nouveau produit dataDyne pourvu d'une technologie int駻essante. Le mode secondaire active un champ magn騁ique autour d'une grenade, lui permettant d'adh駻er une surface. Au bout d'un certain temps, le champ s'inverse et la grenade tombe de son point d'impact et explose.\n", + /*307*/ "Un lance-roquettes compact et r騏tilisable, qui se recharge apr鑚 chaque tir. Le mode secondaire utilise une variante limit馥 du syst鑪e de verrouillage de cible du CMP150, avec la possibilit de verrouiller une seule cible. Le missile se d駱lace plus lentement en traquant sa cible, un bon timing est donc essentiel.\n", + /*308*/ "Ce lance-roquettes skedar peut soit tirer des roquettes classiques soit des missiles guid駸 par l'utilisateur. Les Skedars 駱rouvent une satisfaction perverse lorsque la cam駻a situ馥 dans la t黎e du missile se rapproche de la cible. Le missile guid acc駘鑽e automatiquement mais peut 黎re ralenti pour plus de maniabilit. L'explosion se produit au contact ou lorsque la d騁ente est press馥.\n", + /*309*/ "Un couteau de combat bien tremp, 馮alement 駲uilibr pour le lancer. La pratique est essentielle pour s'habituer la port馥 et la trajectoire de la lame.\n", + /*310*/ "Le d駱artement des armes exp駻imentales a d騅elopp ce laser de poignet avec deux rayons diff駻ents. Le premier mode envoie une salve une distance consid駻able, tandis que le mode secondaire projette un rayon continu tant que le tir est maintenu.\n", + /*311*/ "La grenade anti-personnelle poss鐡e un d騁onateur r馮l sur 4 secondes. Pour votre plaisir est inclus un mode secondaire: une grenade de proximit effet de ricochet. La grenade rebondit partout et explose au bout d'un certain temps ou si une cible est d騁ect馥.\n", + /*312*/ "Cette grenade Maian s鑪e le chaos dans l'esprit des cr饌tures soumises son effet. Si vous vous trouvez dans l'aire d'effet votre vision deviendra floue et vous l稍herez ce que vous tenez. La grenade peut 黎re r馮l馥 pour exploser l'impact ou d馗lench馥 par d騁ecteur de proximit. Prenez garde la lancer assez loin.\n", + /*313*/ "L'utilisation des mines retardement n馗essite jugement et calcul. La cible peut d駱asser la zone d'effet et vous seriez en danger. Exercez-vous avant de commettre une erreur fatale en situation de combat. La seconde fonction est un d騁ecteur de danger identique celui du K7 Avenger.\n", + /*314*/ "Le secret de l'efficacit des mines de proximit est de savoir les placer l o votre adversaire les attend le moins. Si vous pensez vous trouver dans une zone truff馥 de mines, utilisez le d騁ecteur de danger pour les rep駻er. Cela vous fera peut-黎re perdre du temps, mais si ce n'est pas le cas, cela vous sauvera la vie.\n", + /*315*/ "La derni鑽e g駭駻ation de mines contrl馥s distance, identiques aux mod鑞es plus anciens. Le premier mode place une mine et le second la fait exploser. Si vous ne voyez pas la mine, utilisez les bonnes vieilles techniques du hasard et du timing. \n", + /*316*/ "Holo 1 - Inspecter\n", + /*317*/ "Holo 2 - Mouvement 1\n", + /*318*/ "Holo 3 - Mouvement 2\n", + /*319*/ "Holo 4 - Lutte 1\n", + /*320*/ "Holo 5 - Lutte 2\n", + /*321*/ "Holo 6 - Combat r馥l 1\n", + /*322*/ "Holo 7 - Combat r馥l 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_g.c b/src/files/lang/jap-final/dish_str_g.c new file mode 100644 index 000000000..cb9b761da --- /dev/null +++ b/src/files/lang/jap-final/dish_str_g.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Nehmen Sie das Nachtsicht-Ger舩 vom Tisch, um zu beginnen.\n", + /* 9*/ "Aktivieren Sie die Nachtsicht.\nFinden Sie den Lichtschalter.\nSchalten Sie das Licht wieder ein.\n", + /* 10*/ "Nehmen Sie das Data Uplink-Ger舩 vom Tisch, um zu beginnen.\n", + /* 11*/ "Stellen Sie sich neben das Terminal und setzen Sie den Uplink ein.\n", + /* 12*/ "Sie mssen das Ger舩 bereithalten.\n", + /* 13*/ "Verbindung wurde hergestellt...\n", + /* 14*/ "Das Terminal wurde erfolgreich infiltriert.\n", + /* 15*/ "Verbindung abgebrochen - Entfernung zum PC ist zu gro゚.\n", + /* 16*/ "Nehmen Sie die ECM-Mine vom Tisch, um zu beginnen.\n", + /* 17*/ "Finden Sie den Schaltblock und platzieren Sie die ECM-Mine.\n", + /* 18*/ "Die ECM-Mine wurde nicht korrekt platziert.\n", + /* 19*/ "Die ECM-Mine wurde korrekt platziert.\n", + /* 20*/ "Nehmen Sie den CamSpy vom Tisch, um zu beginnen.\n", + /* 21*/ "Finden Sie den PC im Info-Raum und holografieren Sie ihn.\n", + /* 22*/ "Der PC wurde erfolgreich holografiert.\n", + /* 23*/ "Das Licht wurde wieder eingeschaltet.\n", + /* 24*/ "Nehmen Sie den Tr-Decoder vom Tisch, um zu beginnen.\n", + /* 25*/ "Setzen Sie den Decoder an der Konsole ein, um die Tr zu entriegeln.\n", + /* 26*/ "Sie mssen den Tr-Decoder bereithalten.\n", + /* 27*/ "Decoder wurde angebracht. Crack-Routine wurde initiiert...\n", + /* 28*/ "Decodierung abgeschlossen - Tr wurde entriegelt.\n", + /* 29*/ "Nehmen Sie den Tracker vom Tisch, um zu beginnen.\n", + /* 30*/ "Orten Sie den IR-Scanner mit Hilfe des Trackers.\n", + /* 31*/ "Der IR-Scanner wurde geortet.\n", + /* 32*/ "Nehmen Sie den IR-Scanner vom Tisch, um zu beginnen.\n", + /* 33*/ "Orten Sie die geheime Tr mit Hilfe des IR-Scanners.\n", + /* 34*/ "Die geheime Tr wurde erfolgreich geortet.\n", + /* 35*/ "Nehmen Sie den Rntgen-Scanner vom Tisch, um zu beginnen.\n", + /* 36*/ "Finden Sie die versteckten Schalter, um das Laser-Netz abzuschalten.\n", + /* 37*/ "Das gesamte Laser-Netz wurde abgeschaltet.\n", + /* 38*/ "Nehmen Sie die Verkleidung vom Tisch, um zu beginnen.\n", + /* 39*/ "T舫schen Sie jemanden, um an die Tarnkappe zu gelangen.\n", + /* 40*/ "Die Tarnkappe wurde erlangt.\n", + /* 41*/ "Laser-Netz 1 wurde deaktiviert.\n", + /* 42*/ "Laser-Netz 2 wurde deaktiviert.\n", + /* 43*/ "Ich bin hier, um die Ausrstung abzuholen.\n", + /* 44*/ "Ach, Joanna. So t舫schen Sie niemanden!\n", + /* 45*/ "Da, nehmen Sie das. Lassen Sie es nicht fallen!\n", + /* 46*/ "Die Tarnkappe wurde erfolgreich gesichert.\n", + /* 47*/ "Es war vorgesehen, dass Sie eine Verkleidung tragen.\n", + /* 48*/ "Sie mssen sich ein wenig mehr anstrengen, Joanna.\n", + /* 49*/ "Joanna, wo sind Sie denn rausgekrochen?\n", + /* 50*/ "Sie wurden von einer Kamera erfasst.\n", + /* 51*/ "Nehmen Sie die Tarnkappe vom Tisch, um zu beginnen.\n", + /* 52*/ "Setzen Sie die Tarnkappe ein und orten Sie Carrington.\n", + /* 53*/ "Ich kann ruhigen Gewissens behaupten,\ndass Ihr Training abgeschlossen ist!\n", + /* 54*/ "Mission abgeschlossen - Ger舩e-Training bestanden!\n", + /* 55*/ "Mission fehlgeschlagen - Sie wurden entdeckt.\n", + /* 56*/ "W臧len Sie den Uplink aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 57*/ "W臧len Sie den CamSpy aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 58*/ "W臧len Sie das Nachtsicht-Ger舩 aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie das Ger舩 und lassen Sie den A-Knopf los.\n", + /* 59*/ "W臧len Sie den Tr-Decoder aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tr-Decoder und lassen Sie den A-Knopf los.\n", + /* 60*/ "W臧len Sie den Rntgen-Scanner aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Scanner und lassen Sie den A-Knopf los.\n", + /* 61*/ "W臧len Sie die Verkleidung aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Verkleidung und lassen Sie den A-Knopf los.\n", + /* 62*/ "W臧len Sie den IR-Scanner aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den IR-Scanner und lassen Sie den A-Knopf los.\n", + /* 63*/ "W臧len Sie den Tracker aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tracker und lassen Sie den A-Knopf los.\n", + /* 64*/ "W臧len Sie die Tarnkappe aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Tarnkappe und lassen Sie den A-Knopf los.\n", + /* 65*/ "W臧len Sie die ECM-Mine aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die ECM-Mine und lassen Sie den A-Knopf los.\n", + /* 66*/ "Joanna, schn, Sie zu sehen.\n", + /* 67*/ "Kommen Sie mit, Joanna.\nIch fhre Sie herum.\n", + /* 68*/ "Das Informations-Center befindet sich hinter dieser Tr.\n", + /* 69*/ "Hier haben wir das Entwicklungs-Labor.\n", + /* 70*/ "Hier geht es zum Simulations-Raum.\n", + /* 71*/ "Das ist der Schie゚stand, Jo.\n", + /* 72*/ "Dieser Korridor fhrt zum Hangar.\n", + /* 73*/ "HOVERCRATE \nStellen Sie sich neben die Hovercrate und drcken Sie den B-Knopf.\n", + /* 74*/ "Drcken Sie den B-Knopf erneut, um die Hovercrate loszulassen.\n", + /* 75*/ "HOVERBIKE \nDrcken Sie den B-Knopf zweimal, um das Bike zu fliegen.\n", + /* 76*/ "Drcken Sie den B-Knopf zweimal, um wieder abzusteigen.\n", + /* 77*/ "ヨFFEN VON TワREN \nDrcken Sie den B-Knopf, um eine Tr zu ffnen.\n", + /* 78*/ "Mit Hilfe des B-Knopfs knnen auch andere Objekte aktiviert werden.\n", + /* 79*/ "AUFZワGE \nDrcken Sie den B-Knopf, um den Aufzug zu rufen.\n", + /* 80*/ "W臧rend des Trainings knnen Sie nicht hinausgehen.\n", + /* 81*/ "Code 1 wurde erlangt.\n", + /* 82*/ "Code 2 wurde erlangt.\n", + /* 83*/ "Code 3 wurde erlangt.\n", + /* 84*/ "Code 4 wurde erlangt.\n", + /* 85*/ "BLICK NACH OBEN \n- Drcken Sie den C-Knopf unten, um nach oben zu schauen.\n", + /* 86*/ "BLICK NACH UNTEN \n- Drcken Sie den C-Knopf oben, um nach unten zu schauen.\n", + /* 87*/ "Holoprogramm 2 wurde erfolgreich abgeschlossen.\n", + /* 88*/ "Holoprogramm 4 wurde erfolgreich abgeschlossen.\n", + /* 89*/ "Holoprogramm 5 wurde erfolgreich abgeschlossen.\n", + /* 90*/ "Die Wache wurde erfolgreich entwaffnet.\n", + /* 91*/ "Die Wache wurde erfolgreich KO geschlagen.\n", + /* 92*/ "Entwaffnen Sie diese Person.\n", + /* 93*/ "Schlagen Sie diese Person KO. Tarnung ist der Schlssel.\n", + /* 94*/ "Und die letzte Wache...\n", + /* 95*/ "DUCKEN\n- Halten Sie die R-Taste gedrckt, und drcken Sie den C-Knopf unten.\n", + /* 96*/ "HOCKEN\n- Ducken Sie sich, und halten Sie den C-Knopf unten gedrckt.\n", + /* 97*/ "Holoprogramm 3 wurde erfolgreich abgeschlossen.\n", + /* 98*/ "Bet舩igen Sie alle Schalter.\n", + /* 99*/ "Bet舩igen Sie alle Schalter an der Wand.\n- Sie mssen schnell sein, da sie rasch zurckspringen.\n", + /*100*/ "Erlangen Sie die Codes, indem Sie die Terminals untersuchen.\n- Wenden Sie die Codes an den Wand-Terminals an.\n", + /*101*/ "Code 1 wurde erlangt.\n", + /*102*/ "Code 2 wurde erlangt.\n", + /*103*/ "Code 3 wurde erlangt.\n", + /*104*/ "Code 4 wurde erlangt.\n", + /*105*/ "Aufgabe nicht erfllt - Sie mssen nach vorne schauen.\n", + /*106*/ "Holoprogramm 1 wurde erfolgreich abgeschlossen.\n", + /*107*/ "Unbewaffneter Kampf - Schlagen Sie das Ziel KO.\n- Drcken Sie den Z-Trigger in rascher Abfolge.\n", + /*108*/ "Versuchen Sie sich jetzt gegen ein bewegliches Ziel.\n", + /*109*/ "Und abschlie゚end ein Ziel, das sich auch wehrt.\n", + /*110*/ "Besiegen Sie alle Gegner, ohne selbst getroffen zu werden.\n", + /*111*/ "Aufgabe nicht erfllt - Sie wurden getroffen.\n", + /*112*/ "Holoprogramm 6 wurde erfolgreich abgeschlossen.\n", + /*113*/ "Holoprogramm 7 wurde erfolgreich abgeschlossen.\n", + /*114*/ "TERMINALS\n- Drcken Sie den B-Knopf, um ein Terminal zu aktivieren.\n", + /*115*/ "Aktiveren Sie die roten Terminals an den W舅den.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, ich lasse Sie allein, damit Sie sich vorbereiten knnen.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Menschlich (weiblich)\n", + /*127*/ "23 Jahre 2 Monate\n", + /*128*/ "|CI File #027 -\n\nTrainings-Status: Komplettiert\nBewertung: A++\nAktiver Status: im Einsatz\n\n|Profil -\n\nBestens trainiert, aber unerfahren. Herausragende Reaktionen. Vertraut mit verschiedensten Waffen. Sehr kompetenter All-round-Agent. Durch die Erreichung der besten Trainingsergebnisse musste eine neue Bewertung erdacht werden. Die Verkrperung des idealen Agenten des Carrington Instituts, daher die Bezeichnung 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Menschlich (m舅nlich)\n", + /*131*/ "28 Jahre 5 Monate\n", + /*132*/ "|CI File #009 -\n\nTrainings-Status: Komplettiert\nBewertung: A+\nAktiver Status: Undercover\n\n|Profil -\n\nUnser erfahrenster Undercover-Agent. Hervorragend im Umgang mit der Waffe seiner Wahl (ein Magnum Revolver). Eignet sich perfekt fr Undercover- Missionen, weniger geeignet fr Kampfeins舩ze. Vor Joanna Dark hatte er die Ehre, das beste Trainingsergebnis erreicht zu haben.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Menschlich (m舅nlich)\n", + /*135*/ "62 Jahre 8 Monate\n", + /*136*/ "|CI File #000 -\n\nTrainings-Status: K/A\nBewertung: K/A\nAktiver Status: K/A\n\n|Profil -\n\nIntelligenter, patriarchischer Wissenschaftler/Unternehmer und Grnder des Carrington Instituts. Plant alle Missionen, in die seine Agenten entsandt werden, und betreut jede Operation selber von seinem Bro aus. Kleidet sich mitunter etwas eigenartig.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Menschlich (weiblich)\n", + /*139*/ "39 Jahre ? Monate\n", + /*140*/ "|Analytische Daten -\n\nDer Kopf von dataDyne. Schtig nach Macht; mchte niemandem untergeben sein. Sie hasst es, die Initiative zu verlieren. Ist in der Lage, 舫゚erst skrupellose Aktionen durchzufhren, um die Konkurrenz hinter sich zu lassen. Hat vor allem gegenber Daniel Carrington, den sie verabscheut, keine Skrupel.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Menschlich (m舅nlich)\n", + /*143*/ "46 Jahre ? Monate\n", + /*144*/ "|Analytische Daten -\n\nChef der Nationalen Sicherheit. Es besteht eine Verbindung zu Cassandra De Vries, obwohl es eher nach einer Interessensgemeinschaft aussieht. Er wird tun, was Cassandra ihm sagt, da selbst seine dominante Persnlichkeit durch die von De Vries in den Schatten gestellt wird. Die Graue Eminenz hinter einigen der subversiven Elemente innerhalb der NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Der Caroll-Sapient (AI)\n", + /*147*/ "6 Monate\n", + /*148*/ "|Profil -\n\n Eine von dataDyne entwickelte knstliche Intelligenz mit einer Vorliebe fr Fremdsprachen und Decodierung. Er war in der Lage, eigene Moral zu entwickeln, und konnte aufgrund seiner berragenden Intelligenz die Pl舅e von dataDyne erahnen. Seine Stimme ist 舫゚erst pr艘ise moduliert, und simuliert den Charakter eines Akademikers.\n", + /*149*/ "Elvis\n", + /*150*/ "Maianer (m舅nlich)\n", + /*151*/ "320 Jahre\n", + /*152*/ "|Profil -\n\nEin Alien aus der Rasse der Maianer. Er ist der 'Protektor' (Bodyguard) des Maianischen Botschafters, der auf die Bitte von Carrington zur Erde reist. Protektoren sind im Umgang mit verschiedenen Waffen trainiert. Elvis ist terraphil. Er findet die Erde und alles, was mit ihr in Zusammenhang steht, ausgesprochen faszinierend.\n", + /*153*/ "Mr. Blond\n", + /*154*/ "Menschlich (m舅nlich)\n", + /*155*/ "Endzwanziger\n", + /*156*/ "|Profil -\n\n Ein hellblonder, menschlicher Mann. Sehr gro゚, tr臠t wei゚e Kleidung, meistens einen Regenmantel. Scheint hinter der Verschwrung zu stecken, in die Cassandra und Trent verwickelt sind. Mehr ist nicht bekannt.\n", + /*157*/ "Mr. Blond\n", + /*158*/ "Skedar (verkleidet)\n", + /*159*/ "unbekannt\n", + /*160*/ "|Neuestes Profil -\n\nEs handelt sich um einen Skedar-Krieger, der durch eine holografische Projektion als hellblonder, junger Mann in den sp舩en Zwanzigern erscheint. Eine orale Modulationseinheit verleiht ihm eine pr艘ise, intelligente Stimme. Dieses Ger舩 ist brigens ein hervorragendes Manipulations-Werkzeug der Skedar.\n", + /*161*/ "Der US-Pr舖ident\n", + /*162*/ "Menschlich (m舅nlich)\n", + /*163*/ "50 Jahre\n", + /*164*/ "|Profil -\n\nEin gebildeter, scharfsinniger Afro-Amerikaner, der st舅dig versucht, die beste Entscheidung zu finden. Ist allerdings von Leuten wie Trent Easton umgeben, den er unter Kontrolle zu haben glaubt, nachdem er untersagt hat, die Pelagic II an dataDyne zu vergeben. Ihn als 'lenkbar' zu bezeichnen, wie es die Mehrheit der politischen Kommentatoren ist, w舐e allerdings nichts anderes als ein Akt der Unfairness.\n", + /*165*/ "Maianer\n", + /*166*/ "Die Maianer sind eine au゚erirdische Rasse, die auf der Erde unter dem Namen 'die Grauen' bekannt sind. Sie beobachten die Erde schon seit langer Zeit. Der Menschheit gegenber sind sie wohlgesonnen, und erkennen gro゚es Potential in der Erdbevlkerung. Ihre irdische Kontaktperson ist Daniel Carrington. Ein formeller politischer Kontakt muss aber erst eingeleitet werden.\n", + /*167*/ "Skedar-Krieger\n", + /*168*/ "Die Skedar sind eine kriegerische Rasse von Aliens, die schon seit Jahrhunderten gegen die Maianer k舂pfen. Erst krzlich haben sie einem Waffenstillstand zugestimmt. Da sie selbst sehr klein und schlangen臧nlich sind, benutzen sie zur Fortbewegung und im Kampf mechanische Armaturen. Sehr aggressiv! Sie haben Krieg zu einer Religion erhoben und sind extrem devot.\n", + /*169*/ "Hintergrund\n", + /*170*/ "Vor Millionen von Jahren wurde vom Volk der Cetaner ein gewaltiges au゚erirdisches Schlachtschiff auf dem Grunde des Pazifischen Ozeans versenkt. Auf dem Schiff befindet sich eine nicht erprobte Waffe, die theoretisch in der Lage ist, die nukleare Verbindung zwischen jeglichen Moleklen aufzuheben. Um etwaige Beobachter in dem Glauben zu lassen, das Schiff w舐e zerstrt worden, wurde ein Satellit in das Heimatsystem der Cetaner geschickt. Denn in Wirklichkeit handelt es sich bei dem Schiff um einen lebenden Organismus...\n\nEine andere Rasse, die Maianer, entdeckt im Jahr 2000 das Leben auf der Erde. Sie erkennen zwar ein gewisses Potential in der menschlichen Rasse, beschlie゚en aber, die fr sie primitiv wirkenden Menschen sich ohne ihre Einmischung entwickeln zu lassen.\nDie Maianer trafen im Jahr 1650 (Erdzeitrechnung) auf die Skedar. Es kommt zu einem Kampf, der sich zu einem langwierigen Krieg ausweitet. Nach Jahrhunderten des Kampfs entsteht ein unsicherer Frieden. Fanatische Skedar versuchen st舅dig, diesen Frieden durch terroristische Aktionen zu stren. Aber die Maianer lassen sich auf keine Kampfhandlungen ein.\n\nDie Maianer erkennen, dass aufgrund fortschreitender Technologien und gewissen '舫゚eren Einflssen' immer mehr Krisenherde auf der Erde entstehen. Sie befrchten, dass noch mehr Unruhe entstehen knnte, wenn sie ihre Existenz offenbaren wrden. Daher beschlie゚en sie, den Planeten weiter zu beobachten, bis die Menschen ein hheres Entwicklungsstadium erreicht haben.\n\n1985 greift Daniel Carrington dem Plan der Maianer vor, indem er eines ihrer Schiffe kontaktiert, das die Erde vom Orbit aus beobachtet. Er hat einen Plan, der beiden Parteien von Nutzen sein knnte. Das Resultat w舐e eine schnellere Ann臧erung zwischen Menschen und Maianern. Die Maianer haben Vertrauen in Carrington und erlauben ihm, ihre Technologien auf der Erde einzufhren.\n\n2006 entdecken die fanatischen Skedar den Satelliten der Cetaner. Daraufhin suchen sie die Erde nach dem Schlachtschiff ab. Dabei setzen sie ihre wenig subtilen Methoden ein, zu denen auch die Entfhrung von Menschen und die Verstmmelung von Tieren gehren. Ihre Untersuchungsergebnisse weisen auf einen Ort im Pazifischen Ozean hin, wo sie das Schiff auch finden. Allerdings sind sie nicht in der Lage, es ohne Hilfe zu bergen.\n\nNun beginnen die Skedar selbst damit, die Erde zu erforschen. Sie erstellen eine Liste mit Firmen, die ber die ntigen Ressourcen verfgen, um ihnen bei der Bergung behilflich zu sein. An der Spitze dieser Liste steht der Name dataDyne. Cassandra De Vries, der Vorstand der Firma, wird von den Skedar kontaktiert. Ihr wird ein Deal vorgeschlagen, der sich zu gut anhrt, um wahr zu sein - und genauso ist es auch. Als Dank fr die Bergungsarbeiten versprechen die Skedar, dass sie dataDyne mit gengend Technologien versorgen, um die Firma zum m臘htigsten Konzern des Planeten zu machen. Alles, was dataDyne tun muss, ist eine knstliche Intelligenz zu erschaffen. Sie sollte in der Lage sein, jeglichen Cetanischen Code knacken zu knnen. Keine leichte Aufgabe, aber durchaus im Bereich des Mglichen. Die Arbeiten beginnen.\n\nCassandra De Vries kontaktiert den Kopf der NSA, Trent Easton, und informiert ihn ber alle Details. Er soll versuchen, ein Tiefsee-Forschungsschiff der Regierung zu leihen. Aber der Pr舖ident verweigert seine Zusage. Es gibt keine Mglichkeit das Schiff zu stehlen, ohne dass die Aufmerksamkeit der US-Regierung auf dataDyne gelenkt wird. Daher wird ein Plan ausgeheckt, demzufolge der Pr舖ident durch einen Klon ersetzt werden soll. Auf diese Weise w舐e die Kontrolle in den H舅den von Easton und De Vries. Au゚erdem wrden dadurch noch einige Extra-Vergnstigungen fr die Verschwrer herausspringen, nachdem die Operation der Skedar erst durchgefhrt worden ist.\n\nAllerdings h舩ten die beiden nicht viel Zeit, sich mit ihrem Triumpf zu brsten, denn die Skedar beabsichtigen, die Cetanische Waffe an der Erde zu testen, bevor sie damit gegen die Maianer vorgehen. Cassandra ist durch ihre Machtgier zu sehr geblendet, als dass sie diese Taktik durchschauen knnte. Leider betrifft dieses Verhalten auch Trent Easton, der ebenso durch Visionen von Luxus und Macht hindurch die Tatsachen nicht mehr erkennen kann.\n\nAber dataDyne hat etwas produziert, das durchaus in der Lage ist, diese Gefahr zu erkennen: Der Sapient, die knstliche Intelligenz, die dafr vorgesehen war, die Zutrittscodes des Cetanischen Schiffs zu knacken. Als die Maschine wagt, ihre Bedenken zu 舫゚ern, veranlasst Cassandra De Vries, dass dem Sapienten seine Persnlichkeit entzogen werden soll. In einem Akt der Verzweiflung tritt die Maschine mit dem Carrington Institut in Kontakt. Unter dem Namen Dr. Caroll dringt ein Hilferuf an Daniel Carringtons Ohr...\n", + /*171*/ "Die Geschichte\n", + /*172*/ "Joanna Dark, eine frischgebackene Agentin, wird damit beauftragt, einen Wissenschaftler aus der Forschungsabteilung tief unter dem dataDyne-Geb舫de zu befreien. Ihr Erstaunen ist gro゚, als sie erkennt, dass es sich bei Dr. Caroll um eine KI handelt. Nichtsdestotrotz setzt sie ihre Mission fort, und bringt ihn/es in Sicherheit. W臧rend der Mission wird der Alarm ausgelst, und Joanna muss sich bis ins oberste Stockwerk vork舂pfen, um dort von einem Fluchtschiff abgeholt zu werden.\n\ndataDyne erkennt in Daniel Carrington den Drahtzieher dieser Aktion. Zwei Tage sp舩er wird er in seiner eigenen Villa als Geisel genommen. Verlangt wird die Aush舅digung der KI im Austausch fr Daniel Carringtons Leben. Was dataDyne nicht wei゚, ist die Tatsache, dass sich die KI bereits in der Villa befindet. Carrington wollte im Gespr臘h mit Dr. Caroll mehr ber die von dataDyne geplanten Aktivit舩en erfahren. Joanna rettet Daniel, kann aber nicht verhindern, dass Dr. Caroll in die H舅de des Konzerns f舁lt. Allerdings konnte Carrington genug Information in Erfahrung bringen, um ein Team Maianischer Spezialisten auf die Erde zu bestellen.\n\nJoanna wird nach Chicago geschickt, um bei einem Meeting der Verschwrer im G5-Building zu spionieren. Sie erf臧rt, dass Trent Easton, der Chef der NSA, ebenso in diese Konspiration verwickelt ist, wie ein seltsamer skandinavischer Mann, der offensichtlich der Kopf des ganzen Plots ist. Nachdem von Trent errtert worden ist, wie er gegen den Pr舖identen vorgehen mchte, sendet Jo einen Hilferuf an das Institut. Allerdings erf臧rt sie, dass noch eine dringendere Aufgabe auf sie wartet.\n\nDas Spezialisten-Team wurde von den Verschwrern abgefangen. Die ワberlebenden des Absturzes sowie die Trmmer der Maschine wurden in die Area 51 nach Nevada gebracht. Joanna wird dort abgesetzt, um mit einem anderen Agenten des Instituts Kontakt aufzunehmen. Zusammen sollen sie alle ワberlebenden und deren Ausrstung in Sicherheit bringen. Nachdem es Joanna gelingt, ins medizinische Labor einzudringen, lftet sie das gr゚te Geheimnis des Carrington Instituts: Bei den Verbndeten handelt es sich um Maianer. Aliens, die als Eie Grauen' bekannt sind. Der Au゚erirdische, den sie retten kann, wird Elvis genannt. Er war ein Bodyguard des Maianischen Botschafters, der das Spezialistenteam anfhren sollte.\n\nNachdem es Joanna gelungen ist, den einzigen ワberlebenden der Maianischen Delegation zu retten, wendet sie sich wieder dem Pr舖identen und seiner Bedrohung durch dataDyne zu. Sie gibt sich als Crew-Mitglied aus, um in die Basis zu gelangen, wo die Air Force One stationiert ist. Es gelingt ihr auch, an Bord zu gelangen. W臧rend des Flugs treten Trent und der getarnte Skedar in Aktion. Aber wiederum gelingt es Joanna, beide aufzuhalten. W臧rend Trents Leute das Flugzeug nach dem Pr舖identen absuchen, wird dieser von Joanna zu einer Fluchtkapsel gebracht. Trents Plan w舐e gewesen, den glcklosen Politiker an Bord eines Skedar-UFO zu bringen, das an der Air Force One angedockt hat. Jo gelingt es zwar, die Halterung zu besch臈igen, sie schafft es aber nicht, sie zu zerstren. Die Agentin verst舅digt Elvis, der einen Kamikaze-Angriff auf das UFO durchfhrt. Alle drei Vehikel strzen ber Alaska ab. Die Fluchtkapsel kann die AF1 aber noch verlassen.\n\nAls Jo erwacht und versucht, das Insitut zu erreichen, muss sie feststellen, dass ihre ワbertragung durch ein Strsignal der Skedar unterbrochen wird. Sie macht sich auf, um Elvis und den Pr舖identen zu finden. Dabei trifft sie auf getarnte Skedar-Trupps, die nach ihr suchen. Sie folgt einem dieser Trupps bis zu einem Skedar-Schiff, wo sie einen Klon des Pr舖identen findet. Joanna Dark zerstrt den Klon, deaktiviert das Strsignal und ruft die Kavallerie. Einmal mehr wurden die dunklen Machenschaften der Skedar vereitelt, der Pr舖ident wurde gerettet, und Trent wird von den Skedar fr seine Inkompetenz grausam bestraft.\n\ndataDyne und die Skedar geben nun nichts mehr auf verdeckte Operationen. Sie stehlen das Tiefsee-Forschungsschiff 'Pelagic II' und machen sich auf den Weg zur Absturzstelle des Cetanischen Raumschiffs. Joanna und Elvis unterbrechen die Aktion und finden heraus, worum es ihren Gegnern eigentlich geht. Anschlie゚end gelangen sie mit einem Tauchboot zum Grund des Meeres und sehen zum ersten Mal das au゚erirdische Schlachtschiff. Das Team betritt das Schiff durch den Eingang, der von den Skedar erschaffen wurde und treffen auf einen leblosen Skedar. Offenbar scheint au゚er ihnen noch jemand an Bord zu sein. Nach zahllosen K舂pfen gegen Skedar und Cetaner, erreichen Joanna und Elvis das Herz des Schiffs. Dort angekommen finden sie die KI, die einst Dr. Caroll war. Nachdem seine Persnlichkeit wieder hergestellt wurde, dr舅gt er Joanna und Elvis, das Schiff zu verlassen, da er es endgltig zerstren mchte.\n\nZurck im Carrington Institut bereitet sich Joanna fr einen Empfang im Wei゚en Haus vor, als sich die Ereignisse pltzlich berstrzen. Die berlebenden Skedar richten ihren Zorn nun gegen jene Personen, die sie fr das Scheitern ihrer Mission verantwortlich machen. Joanna durchk舂mt das Institut, um so viele Angestellte wie mglich zu retten. W臧renddessen attackieren die Skedar alle Teile des Geb舫des. Der Mehrheit der anwesenden Personen gelingt die Flucht. Joanna jedoch wird bewusstlos geschlagen, bevor sie sich in Sicherheit bringen kann.\n\nAls sie das Bewusstsein wiedererlangt, befindet sich Joanna in einer Zelle an Bord eines Skedar-Schlachtschiffs. Auch Cassandra De Vries hat das Schicksal ereilt. Allerdings stirbt der Kopf von dataDyne bei dem Versuch, ein Ablenkungsmanver zu starten, um Joanna die Flucht zu ermglichen. Jo gelingt es, die Schutzschilde zu deaktivieren. Elvis erscheint mit einigen Freunden, und eine fulminante 'Party' beginnt.\n\nDas gekaperte Schiff gelangt in den Orbit ber dem Kriegsschrein der Skedar. Elvis kann seinen Augen nicht trauen, da es den Maianern niemals gelungen ist, diesen heiligen Ort der Skedar zu finden. Wird der Schrein zerstrt, w舐e dies auch ein harter Schlag gegen die Moral der Skedar. Auf diese Weise knnte ein anhaltender Frieden, anstatt eines unsicheren Waffenstillstands erzielt werden. Jo macht sich auf die Suche nach dem Anfhrer der Skedar, w臧rend Elvis die Maianische Flotte zu Hilfe ruft.\n\nLetztendlich liegt der Schrein in Trmmern. Elvis bittet um eine Unterbrechung des Bombardements, um nach Joanna zu suchen. Glcklicherweise ist sie am Leben, begraben unter Schutt und Asche. Allerdings h舁t noch ein Skedar ihren Fu゚ umklammert. Elvis gibt ihr eine Waffe, um dieses letzte Hindernis zu beseitigen. Der Schrein wurde zerstrt, die Verschwrung wurde gestoppt, und beide knnen ruhigen Gewissens in den Orbit zurckkehren.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "Die monolithische Firma, zu der dataDyne geworden ist, begann als Systemprogrammierer fr knstliche Intelligenzen. Als klar wurde, dass die Firma ihr Haupteinkommen durch die Zusammenarbeit mit dem Milit舐 bezieht, begann eine junge, aufstrebende Managerin namens Cassandra De Vries Gesch臟te mit Waffenherstellern abzuwickeln. Angebote von Daniel Carrington bezglich einer Zusammenarbeit mit dem Institut im Bereich der Quantentechnik, lehnte sie stets ab. Nach der Fusion mehrerer Firmen schossen die Profite in astronomische Hhen. Nach einem Monat stand ein Vertrag mit der Regierung zur Entwicklung von Waffen. Ein hoher Prozentsatz des Ertrags wurde der Entwicklung von KI-Systemen zugefhrt. Wie sich zeigt, mit hervorragenden Resultaten.\n", + /*175*/ "Carrington Institut\n", + /*176*/ "Als Pfuscher verschrien, schaffte es Daniel Carrington, die erste Anti-Grav-Technologie zu entwickeln. Die dadurch erhaltenen Einknfte trugen dazu bei, das Carrington Institut aufzubauen, eine hochtechnisierte Denkfabrik mitten in den USA. Das Institut ist auch die Ausbildungsst舩te fr Agenten, die in alle L舅der der Welt entsandt werden, um die Fortschritte verschiedener Technologien zu verfolgen. Diese ワberwachungsfunktion hat, schon mehrfach Missbrauch verhindert.\n", + /*177*/ "Beschreibung\n- Eine kleine, ferngesteuerte Kamera fr verdeckte Untersuchungen. Ausgerstet fr spektroskopische Holografie. ヨffnet Tren durch Projektion von Krperw舐me.\n\nTraining\n- Holgrafieren Sie das Terminal des Hackers im Raum nebenan.\n\nBedienung\n- Drcken Sie den Z-Trigger um zu holografieren. Durch Drcken des B-Knopfs werden Tren geffnet. Drcken Sie die R-Taste, um sich umzusehen.\n", + /*178*/ "Beschreibung\n- Verst舐kt Licht, um die Umgebung besser wahrnehmen zu knnen. Lebensformen werden hervorgehoben. Unter normaler Beleuchtung ist die Wahrnehmung berlastet.\n\nTraining\n- Finden Sie den Lichtschalter im Dunkeln und bet舩igen Sie ihn.\n\nBedienung\n- W臧len Sie das Nachtsichtger舩 aus Ihrem Inventar. W臧len Sie es nochmals, um es zu deaktivieren.\n", + /*179*/ "Beschreibung\n\n- Vorrichtung um Codes zu knacken. Wird an den jeweiligen Kontrollen angebracht, und geht alle Varianten durch, bis das Schloss geffnet wird.\n\nTraining\n- Setzen Sie den Decoder an der Konsole neben der Tr ein, um sie zu ffnen.\n\nBedienung\n- Stellen Sie sich neben die Konsole und drcken Sie den B-Knopf, nachdem Sie den Decoder ausgew臧lt haben.\n", + /*180*/ "Beschreibung\n\n- Dient dazu, durch feste Objekte zu sehen. Macht Dinge sichtbar, die das Nachtsichtger舩 und die IR-Brillen nicht erfassen knnen.\n\nTraining\n- Suchen Sie mit dem Rntgen-Scanner die zwei versteckten Schalter, und schalten Sie mit ihnen die Laser ab.\n\nBedienung\n- W臧len Sie den Scanner aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*181*/ "Beschreibung\n\n- Verkleiden Sie sich, um nicht erkannt zu werden. Achten Sie aber darauf, nicht von einem scharfsinnigen Gegner demaskiert zu werden.\n\nTraining\n- Grimshaw hat eine Tarnkappe, die mal zum 'Service' msste. Gehen Sie zu ihm und 'erlangen' Sie sie.\n\nBedienung\n- Um die Verkleidung zu tragen, w臧len Sie sie aus Ihrem Inventar.\n", + /*182*/ "Beschreibung\n\n- Verwandelt thermische Daten in sichtbare Bilder. Kann auch in der Dunkelheit benutzt werden. Zeigt auch Anomalien, wie versteckte Tren und brchige W舅de.\n\nTraining\n- Aktivieren Sie den Scanner, finden Sie die Tr und ffnen Sie sie.\n\nBedienung\n- W臧len Sie den Scanner aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*183*/ "Beschreibung\n- Ortet ein bestimmtes Objekt auf einer Radar-Karte. Zeigt auch die relative Lage und Entfernung.\n\nTraining\n- Aktivieren Sie den Tracker und folgen Sie der Signatur, um den Gegenstand zu finden.\n\nBedienung\n- W臧len Sie den Tracker aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*184*/ "Beschreibung\n- Unterbricht das sichtbare Lichtspektrum rund um den Tr臠er. Erschafft einen cham舁eon臧nlichen Effekt. Das Feld bricht zusammen, wenn der Tr臠er eine Waffe abfeuert.\n\nTraining\n- Aktivieren Sie die Tarnkappe und gehen Sie zu Carrington, um ihn zu berraschen!\n\nBedienung\n- W臧len Sie die Tarnkappe aus Ihrem Inventar. W臧len Sie sie nochmals, um sie zu deaktivieren.\n", + /*185*/ "Beschreibung\n- Sendet ein st舅dig wechselndes Signal, um jegliche elektronische Kommunikation zu stren. Muss direkt am Objekt platziert werden.\n\nTraining\n- Werfen Sie die ECM-Mine an den Schaltblock hinter der versteckten Tr.\n\nBedienung\n- Drcken Sie den Z-Trigger, um die Mine zu werfen. Halten Sie den R-Knopf gedrckt und zielen Sie mit dem analogen 3D-Stick.\n", + /*186*/ "Beschreibung\n- Stellt eine Verbindung zwischen dem Agenten und den Hackern des Instituts her, die dann Daten kopieren oder elektronisch gesicherte Schlsser knacken knnen.\n\nTraining\n- Hacken Sie sich mit dem Data Uplink in das Terminal in der Ecke, um eine geheime Tr zu ffnen.\n\nBedienung\n- Stellen Sie sich neben das Terminal und drcken Sie den B-Knopf, nachdem Sie den Uplink ausgew臧lt haben.\n", + /*187*/ "SCHIESSEN\n Drcken Sie den Z-Trigger, um eine Waffe abzufeuern.\n", + /*188*/ "AUTO RELOAD\n Lassen Sie den Z-Trigger los, wenn Sie keine Munition mehr haben.\n", + /*189*/ "MANUELLER RELOAD\n Drcken Sie den B-Knopf, um manuell nachzuladen.\n", + /*190*/ "Zielen: Halten Sie die R-Taste gedrckt, um den Ziel-Modus zu aktivieren.\n", + /*191*/ "Justieren Sie Ihr Visier, indem Sie den analogen 3D-Stick bewegen.\n", + /*192*/ "AUTO FEUER\n Halten Sie den Z-Trigger gedrckt, um automatisch zu feuern.\n", + /*193*/ "ZIELHヨHE\n Drcken Sie die C-Knpfe oben oder unten, um die Sicht anzupassen.\n", + /*194*/ "ZOOM\n Halten sie die R-Taste gedrckt, um den Zoom-Modus zu aktivieren.\n", + /*195*/ "SCHNELLFEUER\n Drcken Sie den Z-Knopf in rascher Abfolge, um schneller zu feuern.\n", + /*196*/ "Carrington Institut\0|Basis der Operationen\n", + /*197*/ "Lucerne Tower\0|Globales Hauptquartier\n", + /*198*/ "Laboratorgeschoss\0|Unterirdisches Forschungslabor\n", + /*199*/ "Carrington Villa\0|Private Residenz\n", + /*200*/ "Chicago\0|Die dunklen Gassen der Stadt\n", + /*201*/ "G5-Building\0|Deckmantel der dataDyne Corporation\n", + /*202*/ "Area 51\0|Nahe dem Groom Dry Lake, Nevada\n", + /*203*/ "Sttzpunkt Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Das Flugzeug des Pr舖identen\n", + /*205*/ "Absturzstelle\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Tiefsee-Forschungsschiff\n", + /*207*/ "Cetanisches Schiff\0|Das gr゚te au゚erirdische Schiff\n", + /*208*/ "Skedar-Schiff\0|Raumfschiff fr Truppentransporte\n", + /*209*/ "Heimat der Skedar\0|Der Planet des Kriegs-Schreins\n", + /*210*/ "Jumpship\0|Agiler Truppentransporter\n", + /*211*/ "HoverCrate\0|Antigraviations-Vorrichtung\n", + /*212*/ "HoverBike\0|Niedrigfliegendes Vehikel\n", + /*213*/ "Reinigungs-Roboter\0|Dein hilfreicher kleiner Freund\n", + /*214*/ "Hovercopter\0|Urbanes Gunship\n", + /*215*/ "G5-Roboter\0|Urbaner Kampf-Droid\n", + /*216*/ "A51 Interceptor\0|Robotische Abfang-Einheit\n", + /*217*/ "Maianisches Schiff\0|Sp臧- und Patrouillen-Schiff\n", + /*218*/ "Skedar-Shuttle\0|Truppen-Landungsschiff\n", + /*219*/ "Das Instituts-Geb舫de beinhaltet viele verschiedene Bereiche: Bros und Laboratorien, Workshops und Hangars. Da es von der Au゚enwelt relativ isoliert ist, knnen die Operationen leichter verdeckt werden.\n", + /*220*/ "Mitten im Gesch臟tsviertel hebt sich der dataDyne-Wolkenkratzer durch seine enorme Gr゚e von der Umgebung ab.\n", + /*221*/ "Die schwer bewachten, gut versteckten Labors beinhalten den Schlssel zu dataDynes Zukunft. In ihnen arbeiten Techniker an streng geheimen Projekten, die dataDyne noch weiter nach oben bringen sollen.\n", + /*222*/ "Daniel Carringtons Residenz ist quasi sein Fluchtort vor dem Stress innerhalb des Instituts. Neben einem Observatorium verfgt die Villa ber einen Windkraft-Generator und einen gut ausgestatteten Weinkeller.\n", + /*223*/ "Ein schmutziger, verkommener Stadtteil Chicagos, abgeschnitten vom Bodenverkehr. Hier hat die G5-Corporation ihr Hauptquartier.\n", + /*224*/ "Im G5-Building befindet sich ein Meetingraum, der durch Anti-Aufnahme-Ger舩e geschtzt wird. Dies ist fr dataDyne der sicherste Ort, um vertrauliche Pl舅e zu besprechen.\n", + /*225*/ "Diese Sektion des als Area 51 bekannten Luftwaffensttzpunktes befindet sich nahe des Groom Dry Lake. Helipads und Kommunikationstrme lassen Rckschlsse auf die Gr゚e des unterirdischen Komplexes zu.\n", + /*226*/ "Eine von mehreren Luftbasen, die als Etappenziele der Air Force One dienen. Typischerweise befindet sich die Basis in einer sehr unwirtlichen Umgebung, geschtzt vor nicht autorisierten Augen.\n", + /*227*/ "Diese spezielle Air Force One wurde fr kalte Klimata optimiert. Sehr ntzlich, wenn sie in Nord-Alaska eingesetzt wird. Die Destination ist Oslo, Norwegen.\n", + /*228*/ "Das abgeschossene Flugzeug kam in einem felsigen, eisbedeckten Landstrich im Arktischen Kreis zu einem abrupten Stillstand.\n", + /*229*/ "Die Pelagic II befindet sich im Besitz der US-Regierung. Das Schiff ist in der Lage, Tiefsee-Operationen unter allen meteorologischen Bedingungen durchzufhren. Dies ist das einzige Schiff seiner Art.\n", + /*230*/ "Ein riesenhaftes Schiff extraterrestrischer Herkunft, das schon seit Millionen von Jahren auf dem Meeresgrund liegt.\n", + /*231*/ "Ein interplanetares Schiff, das Skedar-Krieger zu ihrem Einsatzort bringt. Teil der stark reduzierten Skedar-Kampfflotte.\n", + /*232*/ "Ein sehr trockener, von Erdbeben, Sandstrmen und Hurricanes zerfurchter Planet. Teil eines komplexen Sonnensystems, in dessen Zentrum sich drei Sonnen befinden.\n", + /*233*/ "Ein kleines, schnelles und gut manvrierbares Flugger舩. Geeignet, um Agenten in urbanen Gebieten abzusetzen. Kann sowohl computergesteuert, als auch ferngesteuert werden. Bietet Platz fr bis zu vier Agenten.\n", + /*234*/ "Ein Antigravitations-System zur Untersttzung bei Verladearbeiten. Wird an der Seite einer Kiste angebracht. Ein AG-Feld hebt die Kiste an, und hebt ein wenig der Tr臠heit auf.\n", + /*235*/ "Eine niedrigfliegende Patrouillen-Einheit. Setzt ein kleines AG-Ger舩 ein, um zu schweben. Der Antrieb erfolgt ber zwei starke Turbinen.\n", + /*236*/ "H舁t alles rein und sauber. Hat Zugang zu allen Bereichen eines Geb舫des. Es wird geraten, diese Roboter nicht zu besch臈igen, da sie teilweise einen alternativen Zugang zu stark bewachten R舫men ermglichen.\n", + /*237*/ "Ein urbanes Patrouillen-Vehikel. Die Besatzung besteht aus zwei Mann, bewaffnet mit einer Vulcan-Kanone und zwei Raketenwerfern. Kann durchaus durch MG-Feuer oder einer gut gezielten Rakete abgeschossen werden.\n", + /*238*/ "Ein Kampfroboter fr urbane Eins舩ze. Setzt AG-Technik ein, um zu schweben. Schwer bewaffnet und gepanzert. Wird meist eingesetzt, um unwillkommene G舖te fernzuhalten. Frei nach dem Motto: Zuerst schie゚en, dann fragen.\n", + /*239*/ "Eine robotische Variante des Hoverbike, verfgt ber st舐kere AG-Technik und Turbinen. Erreicht alle Geschwindigkeiten von Schrittgeschwindigkeit bis Mach 2. Obwohl gut bewaffnet, liegt sein Vorteil in der Manvrierbarkeit.\n", + /*240*/ "Designed fr einen Maianischen Piloten. Ein Passagier wrde sich sehr eingeengt fhlen - ein menschlicher Passagier noch mehr!\n", + /*241*/ "Kann bis zu zehn voll bewaffnete und ausgerstete Skedar transportieren. Unsichtbar fr konventionelles Radar. Sendet starke Strsignale ber eine weite Entfernung aus, um Kommunikation und Erfassung unmglich zu machen.\n", + /*242*/ "Beschreibung\n- Ein guter Agent bemerkt alles um ihn herum.\n\nTraining\n- Untersuchen Sie alle Objekte, indem Sie sie betrachten.\n\nBedienung\n-nach oben schauen - Drcken Sie den C-Knopf unten\n-nach unten schauen - Drcken Sie den C-Knopf oben.\n-Individuelle Sicht - Halten Sie die R-Taste gedrckt und ver舅dern sie die Sicht mit dem analogen 3D-Stick.\n", + /*243*/ "Beschreibung\n- Sidesteps und Strafing knnen Ihnen aus der Patsche helfen.\n\nTraining\n- Bet舩igen Sie alle Schalter. Sie mssen schnell sein, da sich die Schalter rasch zurcksetzen.\n\nBedienung\n- Sidestep links - Drcken Sie den C-Knopf links.\n- Sidestep rechts - Drcken Sie den C-Knopf rechts.\n\n", + /*244*/ "Beschreibung\n- Durch Ducken und Hocken knnen Sie neue Bereiche finden.\n\nTraining\n- Arbeiten Sie sich an den Hindernissen vorbei, und bet舩igen Sie die Schalter.\n\nBedienung\n- Ducken - Halten Sie die R-Taste gedrckt und drcken Sie den C-Knopf unten.\n- Hocken - Halten Sie beim Ducken den C-Knopf unten gedrckt.\n- Aufstehen - R-Taste\n\n", + /*245*/ "Beschreibung\n- Ein unbewaffneter Kampf gegen mehrere Gegner kann mitunter sehr schwierig sein.\n\nTraining\n- Schlagen Sie alle Gegner KO, ohne selbst getroffen zu werden.\n\nBedienung\n- Schlag - Drcken Sie den Z-Trigger in schneller Abfolge, um dem Gegner mehrere Schl臠e zu verpassen.\n\n", + /*246*/ "Beschreibung\n- Wenn Sie einen Gegner entwaffnen, bringt Ihnen das vielleicht eine neue Waffe.\n\nTraining\n- Entwaffen Sie alle Gegner, ohne selbst getroffen zu werden.\n\nBedienung\n- Entwaffnen - Halten sie den B-Knopf gedrckt und drcken Sie den Z-Trigger, um einen Gegner zu entwaffnen.\n- KO-Schlag - Schlagen Sie einen unachtsamen Gegner von hinten nieder.\n", + /*247*/ "Beschreibung\n- Unbewaffneter Kampf gegen mehrere Gegner.\n\nTraining\n- Besiegen Sie alle unbewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*248*/ "Beschreibung\n- Unbewaffneter Kampf gegen bewaffnete und unbewaffnete Gegner.\n\nTraining\n- Besiegen Sie alle bewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*249*/ "Nutzen Sie den Zielmodus, um gr゚ere Pr艘ision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*250*/ "ワberlegen Sie sich, wohin Sie gehen wollen, bevor sie loslegen. Stellen Sie sich so auf, dass Sie ein Minimum an Bewegung aufbringen mssen, wenn Sie sich zwischen den Zielen bewegen.\n", + /*251*/ "Wenn Sie sich ducken, erreichen Sie Orte, die fr Sie ansonsten unzug舅glich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen knnen. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*252*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie mssen. Halten Sie sich fr einen raschen Rckzug bereit, wenn der Gegner seinerseits zum Angriff bergeht.\n", + /*253*/ "Bleiben Sie nur solange in der N臧e des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschlie゚end au゚er Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*254*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen knnen, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*255*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschlie゚end ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*256*/ "Nutzen Sie den Zielmodus, um gr゚ere Pr艘ision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*257*/ "Sidesteps und Strafing knnen Ihnen aus der Patsche helfen.\n", + /*258*/ "Wenn Sie sich ducken, erreichen Sie Orte, die fr Sie ansonsten unzug舅glich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen knnen. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*259*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie mssen. Halten Sie sich fr einen raschen Rckzug bereit, wenn der Gegner seinerseits zum Angriff bergeht.\n", + /*260*/ "Bleiben Sie nur solange in der N臧e des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschlie゚end au゚er Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*261*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen knnen, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*262*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschlie゚end ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*263*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Ger舩 anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*264*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie mglich. Adjustieren Sie Ihr Ziel mit den C-Knpfen oder gehen Sie in den Ziel-Modus.\n", + /*265*/ "Der CamSpy kann schwierig zu steuern sein. Lassen Sie sich Zeit.\n", + /*266*/ "Ntzlich im Kampf, aber achten Sie auf ワberladung.\n", + /*267*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich n臧er ans Zielobjekt.\n", + /*268*/ "Der Tracker gibt nur die Richtung und relative Hhe an. Er verfgt ber keine Kartenfunktion, die Sie direkt zum Ziel fhrt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*269*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen fhren kann. Sch舩zen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*270*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschr舅kt, setzen Sie daher dieses Ger舩 nur im Bedarfsfall ein.\n", + /*271*/ "Eine berzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Tr臠ers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*272*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier 舫゚erst wichtig.\n", + /*273*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Ger舩 anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*274*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie mglich. Adjustieren Sie Ihr Ziel mit den C-Knpfen oder gehen Sie in den Ziel-Modus.\n", + /*275*/ "Der CamSpy ist nicht unsichtbar. Er knnte entdeckt werden, also Vorsicht, wenn Sie in belebtem Gebiet operieren. Vergessen Sie nicht, dass der CamSpy an dem Ort bleibt, an dem Sie ihn abgelegt haben.\n", + /*276*/ "Ntzlich im Kampf, aber achten Sie auf ワberladung. Versuchen Sie, die Situation abzusch舩zen, und reagieren Sie, bevor es der Gegner tut.\n", + /*277*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich n臧er ans Zielobjekt.\n", + /*278*/ "Der Tracker gibt nur die Richtung und relative Hhe an. Er verfgt ber keine Kartenfunktion, die Sie direkt zum Ziel fhrt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*279*/ "Der Visor verengt Ihre periphere Sicht, was in Kampfsituationen zu Problemen fhren kann. Sch舩zen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*280*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschr舅kt, daher setzen Sie dieses Ger舩 nur im Bedarfsfall ein.\n", + /*281*/ "Eine berzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Tr臠ers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*282*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier 舫゚erst wichtig. Vermeiden Sie es, eine Waffe abzufeuern, bevor Sie sich nicht 100 %ig sicher sind, einen Treffer zu landen.\n", + /*283*/ "Die Falcon 2 ist eine sehr genaue Handfeuerwaffe. Jeden Fehlschuss verantworten Sie daher selbst. Die Sekund舐-Funktion ist der Schlag mit der Waffe und somit am Schie゚stand nutzlos.\n", + /*284*/ "Zur Erhhung der Genauigkeit wurde ein Zielfernrohr an der Waffe montiert. Ebenso wie bei der nicht modifizierten Version, ist die Sekund舐-Funktion am Schie゚stand leider nutzlos.\n", + /*285*/ "Die schallged舂pfte Version der Falcon 2 eignet sich hervorragend dazu, gegenber Ihren Gegnern den ワberraschungsmoment zu nutzen. Testen Sie Ihre Genauigkeit, um sicherzugehen, keine Chance zu verpassen.\n", + /*286*/ "Die MagSec 4 stellt Feuerkraft in den Vordergrund. Dies zeigt sich speziell im Dreifach-Schu゚ Sekund舐-Modus. Der einzige Nachteil ist das kleine Magazin.\n", + /*287*/ "Eine typische Skedar-Waffe, brutal und kraftvoll. Wenn Sie bereit sind, ein wenig mehr Munition zu opfern, knnen Sie den Schu゚ um ein Vielfaches verst舐ken.\n", + /*288*/ "Diese vielseitige Pistole hat zwei verschiedene Feuer-Modi. Ein Standard-Schuss, oder ein Explosiv-Geschoss. Die Maianischen Ingenieure haben es geschafft, diese Funktion nicht auf Kosten der Munition, sondern der Feuerrate zu integrieren.\n", + /*289*/ "Der Schlssel zur DY357 ist das Wissen, wann nachzuladen ist. Ein sechs Schuss umfassendes Magazin erfordert Ihre Aufmerksamkeit. Das Gewicht der Waffe kann sich als ntzlich erweisen, wenn Sie jemanden damit niederschlagen.\n", + /*290*/ "Trent Easton sucht immer nach dem gewissen Etwas, und diese Waffe ist keine Ausnahme. Das gleiche gilt fr die Kugeln. Sind sie ins Ziel eingedrungen, zerbersten sie in tausend Stcke.\n", + /*291*/ "Ein verl舖sliches und effektives Maschinengewehr. Es steht wohl fest, warum diese Waffe der dataDyne-Bestseller der letzten zwei Jahre ist. Dabei ist die Sekund舐-Funktion noch gar nicht mit in Betracht gezogen. Das Zielauswahl-System ist ein exzellentes Feature, dass Ihnen viel トrger ersparen kann.\n", + /*292*/ "Das Cyclone-Maschinengewehr wurde speziell dafr designed, NICHT genau zu sein. Sie sollten trotzdem ausgiebig damit trainieren. Die weite Streuung der Kugeln eignet sich hervorragend, Feuerschutz zu geben.\n", + /*293*/ "Dieses Maschinengewehr entsprang Maianischer Flexibilit舩 und verfgt ber eine interessante Sekund舐-Funktion: ein Hochgeschwindigkeits-Schuss, der feste Objekte leicht durchdringt. In diesem Modus wird die Feuerrate natrlich reduziert, um den Mechanismus zu schonen.\n", + /*294*/ "Die RC-P120 verwendet spezielle Mineral-Kugeln, gepaart mit hoher Feuerrate und einem gro゚en Magazin. Die perfekte Waffe im Einsatz gegen die Skedar. Die Kugeln knnen auch als Energielieferant fr die integrierte Tarnfuktion eingesetzt werden. Das Training wurde diesem Umstand angepasst.\n", + /*295*/ "Die Waffe kann nicht nur als Laptop getarnt werden, als Sekund舐-Funktion kann sie auch als Selbstschussanlage an der entsprechenden Postion installiert werden.\n", + /*296*/ "Dieses Modell wurde von dataDyne erfolgreich im US-Milit舐 eingefhrt. In ワbereinstimmung mit dataDynes Tendenz, den Leuten bse ワberraschungen zu bereiten, wurde dem Basismodell eine Ann臧erungs-Mine eingebaut. Wird der Sekund舐-Modus aktiviert, bedeutet das, dass die Waffe fortgeworfen werden muss.\n", + /*297*/ "So weit wir es beurteilen knnen, verfgt die Waffe als Sekund舐-Funktion ber einen Sensor, der mgliche Gefahrenquellen ortet und anzeigt. Obwohl die Waffe sehr stark ist, verfgt das Magazin ber ein nur kleines Fassungsvermgen. \n", + /*298*/ "Der erste Versuch des Instituts, eine untersttzende Zweitwaffe zu kreieren, resultierte in diesem Modell. Der Sekund舐-Modus ist ein permanenter Zoom.\n", + /*299*/ "Die schwerere Variante des Dragon. Die Ann臧erungsmine wurde durch einen kleinen Granatwerfer ersetzt. Im US-Milit舐 hat diese Waffe klarerweise gro゚en Anklang gefunden. Gewhnen Sie sich im Training an die Flugbahn der Granaten.\n", + /*300*/ "Subtilit舩 z臧lt hier nicht. Zwei Modi stehen zur Verfgung: einfacher Schuss und Doppelschuss. Das Magazin ist relativ gro゚, die Ladezeiten jedoch eher lang.\n", + /*301*/ "Ein gut verarbeitetes, schallged舂pftes Sniper-Gewehr mit hervorragendem Zoom. Das Einzige, was die Genauigkeit mindern knnte, ist der Schtze. Gehen Sie in die Hocke, um Ihr Ziel besser fixieren zu knnen.\n", + /*302*/ "Obwohl die Technologie schon etwas berholt ist, sch舩zen wir noch immer die F臧igkeiten des Fernsicht-Gewehrs. Der Schuss ist nahezu unaufhaltbar, die Zielerfassung geht bis zu einem gewissen Grad sogar durch W舅de.\n", + /*303*/ "Die Prim舐-Funktion feuert einen vergifteten Bolzen ab, der allerdings nicht viel Schaden anrichtet. Sehrwohl aber der Sekund舐-Schuss. Es handelt sich um eine Tarn-Waffe mit langer Ladezeit. Daher eher unpraktisch im Feuergefecht.\n", + /*304*/ "Das Bet舫bungsgewehr findet in seinen Grundzgen in vielen medizinischen Labors und Krankenh舫sern Verwendung. Die Dosis des Bet舫bungsmittels kann, bei kurzen Distanzen, erhht werden, um die Wirkung zu vervielfachen.\n", + /*305*/ "Versuchen Sie, diese Waffe unter Kontrolle zu halten. Sie wurde definitiv nicht fr einen menschlichen Schtzen konzipiert. Wenn Sie in die Knie gehen, knnen Sie Ihr Ziel leichter erfassen. Es ist stark zu bezweifeln, dass auch nur ein Feind an den Feuerst゚en vorbeikommt.\n", + /*306*/ "Ein neueres dataDyne-Produkt mit einer sehr interessanten Technologie. Die Sekund舐-Funktion legt ein magnetisches Feld um die Bombe, wodurch eine Haftung an W舅den ermglicht wird. Nach einiger Zeit f舁lt die Bombe zu Boden und detoniert.\n", + /*307*/ "Ein kompakter, wiederverwendbarer Raketenwerfer. L臈t nach jedem Schuss selbst nach. Die Sekund舐-Funktion ermglicht die Aufschaltung auf ein Ziel. Die Rakete bewegt sich in diesem Modus langsamer. Planen Sie dies beim Timing Ihrer Schsse ein.\n", + /*308*/ "Der handliche Skedar-Raketenwerfer feuert entweder eine normale Rakete, oder eine ferngelenkte Rakete ab. Vermutlich verschafft diese Funktion den Skedar eine perverse Befriedigung, da sie das flchtende Ziel durch eine Kamera beobachten knnen. Ein Agent des Carrington Instituts findet dafr natrlich keine Verwendung. Die Detonation erfolgt bei Zielkontakt oder via Auslser.\n", + /*309*/ "Ein gut ausgewogenes Kampfmesser, das sich auch als Wurfmesser eignet. ワbung ist unumg舅glich, wenn Sie diese Waffe meistern wollen.\n", + /*310*/ "Die Experimentalwaffen-Abteilung hat einen kleinen, aber sehr effektiven Laser entwickelt. Zwei Feuermodi sind verfgbar. Einerseits kann ein Langstrecken-Laser abgefeuert werden, andererseits ist auch ein wesentlich st舐kerer Kurzstrecken-Laser verfgbar.\n", + /*311*/ "Diese Splitter-Granate detoniert vier Sekunden nach Aktivierung. Zu Ihrer Unterhaltung haben wir eine zweite Funktion integriert: Ann臧erungs-Pinball! Die Granate wird umherspringen, bis der Timer abgelaufen ist, oder der Sensor eine Bewegung erfasst und die Granate zur Detonation bringt.\n", + /*312*/ "Diese Maianische Granate vergreift sich an den Neuronen denkender Kreaturen. Sollten Sie sich im Detonationsradius befinden, verschwimmt Ihre Sicht und Sie lassen alles fallen, was sich in Ihren H舅den befindet. Die Detonation erfolgt bei Kontakt oder bei Ann臧erung.\n", + /*313*/ "Um Zeitznder-Minen effektiv einzusetzen, ist gutes Timing Voraussetzung. Andernfalls knnte das Ziel einfach an der Mine vorbeilaufen. Verbessern Sie Ihre F臧igkeiten im Training, bevor Sie im Einsatz einen kritischen Fehler begehen. Bei der Sekund舐-Funktion handelt es sich um den allseits beliebten Gefahren-Anzeiger.\n", + /*314*/ "Der Schlssel zur erfolgreichen Platzierung von Ann臧erungs-Minen ist, sie dort zu platzieren, wo sie der Gegner nicht erwartet. Sollten Sie selbst in so ein Minenfeld geraten, nutzen Sie den Sekund舐-Modus, der einen Gefahren-Anzeiger beinhaltet. Etwas zeitaufwendig, aber mitunter berlebensnotwendig.\n", + /*315*/ "Wiederum eine neue Variante ferngezndeter Minen, die aber auf dem blichen Prinzip aufbaut. Die Prim舐-Funktion platziert die Mine, die Sekund舐-Funktion l舖st sie detonieren. Knnen Sie die Mine nicht sehen, mssen Sie sich auf Ihr Gefhl verlassen. \n", + /*316*/ "Holo 1 - Umschauen\n", + /*317*/ "Holo 2 - Bewegung 1\n", + /*318*/ "Holo 3 - Bewegung 2\n", + /*319*/ "Holo 4 - Unbewaffnet 1\n", + /*320*/ "Holo 5 - Unbewaffnet 2\n", + /*321*/ "Holo 6 - Live-Kampf 1\n", + /*322*/ "Holo 7 - Live-Kampf 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_i.c b/src/files/lang/jap-final/dish_str_i.c new file mode 100644 index 000000000..537d0b08f --- /dev/null +++ b/src/files/lang/jap-final/dish_str_i.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Innanzitutto prendi la Vista Notturna dal tavolo.\n", + /* 9*/ "Attiva la Vista Notturna.\nTrova interruttore.\nRiaccendi le luci.\n", + /* 10*/ "Prendi il Connettore Dati dal tavolo.\n", + /* 11*/ "Avvicinati al terminale e usa il Connettore Dati.\n", + /* 12*/ "Devi tenere in mano il Connettore Dati.\n", + /* 13*/ "Stabilito collegamento...\n", + /* 14*/ "Il codice del terminale stato decifrato.\n", + /* 15*/ "Collegamento interrotto: sei troppo lontano dal PC.\n", + /* 16*/ "Prendi la mina ECM dal tavolo.\n", + /* 17*/ "Trova la centralina e piazzale sopra una mina ECM.\n", + /* 18*/ "Mina ECM in posizione errata.\n", + /* 19*/ "Mina ECM piazzata correttamente.\n", + /* 20*/ "Prendi la TeleSpia dal tavolo.\n", + /* 21*/ "Trova il PC sala informazioni per l'olografia.\n", + /* 22*/ "Olografia riuscita.\n", + /* 23*/ "Riattivate le luci.\n", + /* 24*/ "Prendi il decodificatore porta dal tavolo.\n", + /* 25*/ "Usa il decodificatore per sbloccare la porta.\n", + /* 26*/ "Devi tenere in mano il decodificatore porta.\n", + /* 27*/ "Applicato decodificatore. Decodifica in corso...\n", + /* 28*/ "Decodifica completata. La porta stata sbloccata.\n", + /* 29*/ "Prendi il puntatore dal tavolo.\n", + /* 30*/ "Trova lo scanner a infrarossi con il puntatore.\n", + /* 31*/ "Trovato lo scanner a infrarossi.\n", + /* 32*/ "Prendi lo scanner a infrarossi dal tavolo.\n", + /* 33*/ "Trova la porta segreta con lo scanner a infrarossi.\n", + /* 34*/ "Trovata la porta segreta.\n", + /* 35*/ "Prendi lo scanner a raggi X dal tavolo.\n", + /* 36*/ "Trova gli interruttori e disattiva le griglie laser.\n", + /* 37*/ "Disattivate tutte le griglie laser.\n", + /* 38*/ "Prendi il travestimento dal tavolo.\n", + /* 39*/ "Convinci qualcuno a darti il dispositivo mimetico.\n", + /* 40*/ "Trovato il dispositivo mimetico.\n", + /* 41*/ "Disattivata la griglia laser 1.\n", + /* 42*/ "Disattivata la griglia laser 2.\n", + /* 43*/ "Sono qui per prendere l'attrezzatura.\n", + /* 44*/ "Vattene, Joanna. Non mi far fregare da te!\n", + /* 45*/ "Ecco a te! E adesso non perderlo!\n", + /* 46*/ "Ricevuto il dispositivo mimetico.\n", + /* 47*/ "Devi usare il travestimento, ricordi?\n", + /* 48*/ "Puoi fare di meglio, Joanna.\n", + /* 49*/ "Joanna, da dove te ne sei sbucata?\n", + /* 50*/ "Sei stata scoperta dalle telecamere!\n", + /* 51*/ "Prendi il dispositivo mimetico dal tavolo.\n", + /* 52*/ "Usa il dispositivo mimetico e trova Carrington.\n", + /* 53*/ "Credo proprio che il tuo addestramento\nsia completo!\n", + /* 54*/ "Missione compiuta - Addestramento superato!\n", + /* 55*/ "Missione fallita - Sei stata scoperta!\n", + /* 56*/ "Seleziona il Connettore Dati.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il Connettore Dati e rilascia A.\n", + /* 57*/ "Seleziona la TeleSpia.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la TeleSpia e rilascia A.\n", + /* 58*/ "Seleziona la Vista Notturna.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la Vista Notturna e rilascia A.\n", + /* 59*/ "Seleziona il decodificatore porta.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il decodificatore porta e rilascia A.\n", + /* 60*/ "Seleziona lo scanner a raggi X.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli lo scanner a raggi X e rilascia A.\n", + /* 61*/ "Seleziona il travestimento.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il travestimento e rilascia A.\n", + /* 62*/ "Seleziona lo scanner a infrarossi.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli scanner a infrarossi e rilascia A.\n", + /* 63*/ "Seleziona il puntatore.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il puntatore e rilascia A.\n", + /* 64*/ "Seleziona il dispositivo mimetico.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il dispositivo mimetico e rilascia A.\n", + /* 65*/ "Seleziona la mina ECM.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la mina ECM e rilascia A.\n", + /* 66*/ "Joanna, vedo che stai bene!\n", + /* 67*/ "Seguimi!\nTi condurr al reparto addestramento.\n", + /* 68*/ "Il centro informazioni oltre questa porta.\n", + /* 69*/ "Qui abbiamo il laboratorio strumentazioni.\n", + /* 70*/ "Questo porta al reparto addestramento replicanti.\n", + /* 71*/ "Questo il poligono di tiro.\n", + /* 72*/ "Questo corridoio porta all'hangar.\n", + /* 73*/ "ANTIGRAVITタ\nPremi B vicino all'Antigravit per prenderlo...\n", + /* 74*/ "Premi B di nuovo per lasciarlo.\n", + /* 75*/ "AEROMOTO\nPremi B due volte vicino all'Aeromoto per salire...\n", + /* 76*/ "Premi B due volte per scendere dall'aeromoto.\n", + /* 77*/ "PORTE\nPremi B vicino ad una porta per aprirla.\n", + /* 78*/ "Il pulsante B attiver anche qualsiasi strumento l vicino.\n", + /* 79*/ "ASCENSORI\nPremi B vicino all'ascensore per chiamarlo.\n", + /* 80*/ "Impossibile uscire durante l'addestramento.\n", + /* 81*/ "Ottenuto codice di accesso 1.\n", + /* 82*/ "Ottenuto codice di accesso 2.\n", + /* 83*/ "Ottenuto codice di accesso 3.\n", + /* 84*/ "Ottenuto codice di accesso 4.\n", + /* 85*/ "GUARDA IN SU\n- Premi C verso il basso per guardare in alto.\n", + /* 86*/ "GUARDA IN GIル\n- Premi C verso l'alto per guardare in basso.\n", + /* 87*/ "Completato l'oloprogramma 2.\n", + /* 88*/ "Completato l'oloprogramma 4.\n", + /* 89*/ "Completato l'oloprogramma 5.\n", + /* 90*/ "La guardia stata disarmata.\n", + /* 91*/ "La guardia stata messa KO.\n", + /* 92*/ "Disarma quest'avversario in movimento se ci riesci.\n", + /* 93*/ "Metti KO quest'avversario... ci vuole agilit!\n", + /* 94*/ "Ecco l'ultima guardia...\n", + /* 95*/ "SCHIVA\n- Tieni premuto R, poi premi C verso il basso.\n", + /* 96*/ "ACCUCCIATI\n- Tieni premuto R, poi premi e tieni premuto C verso il basso.\n", + /* 97*/ "Completato l'oloprogramma 3.\n", + /* 98*/ "Attiva tutti gli interruttori.\n", + /* 99*/ "Attiva tutti gli interruttori a parete.\n Fai presto o saranno resettati.\n", + /*100*/ "Scopri i codici d'accesso esaminando i terminali.\n Usa i codici per i terminali a parete.\n", + /*101*/ "Scoperto codice 1.\n", + /*102*/ "Scoperto codice 2.\n", + /*103*/ "Scoperto codice 3.\n", + /*104*/ "Scoperto codice 4.\n", + /*105*/ "Addestramento fallito - Devi guardare avanti.\n", + /*106*/ "Completato l'oloprogramma 1.\n", + /*107*/ "Combattimento a amni nude: stendi l'avversario.\n Premi Z ripetutamente per sferrare i colpi.\n", + /*108*/ "Ora prova contro un avversario in movimento...\n", + /*109*/ "E infine contro un avversario che contrattacca.\n", + /*110*/ "Sconfiggi tutti i nemici senza essere colpita.\n", + /*111*/ "Addestramento fallito: sei stata colpita!\n", + /*112*/ "Completato l'oloprogramma 6.\n", + /*113*/ "Completato l'oloprogramma 7.\n", + /*114*/ "TERMINALI\n- Premi B vicino al terminale per usarlo.\n", + /*115*/ "Ora attiva il terminale rosso alla parete.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bene, Jo, ora preparati per la missione!\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Umano (femmina)\n", + /*127*/ "23 anni 2 mesi\n", + /*128*/ "|File CI nー027 -\n\nStadio addestramento: Completo\nGrado addestramento: A++\nStato attivo: Assegnato\n\n|Profilo -\n\nAddestramento avanzato ma inesperta. Reazione eccellente. Abilissima con svariate armi. Agente molto competente e versatile. Massimo punteggio di addestramento registrato nella creazione di un nuovo grado di formazione. Incarna l'agente ideale del Carrington Institute, da cui il nome 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Umano (maschio)\n", + /*131*/ "28 anni 5 mesi\n", + /*132*/ "|File CI nー009 -\n\nStadio addestramento: Completo\nGrado addestramento: A+\nStato attivo: Segreto\n\n|Profilo -\n\nIl nostro agente segreto pi capace. Molto preciso con la sua arma preferita (Magnum Revolver). Perfetto per le missioni in incognito. Meno adatto alla lotta aperta. Prima di Joanna Dark, deteneva il punteggio pi alto nell'addestramento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Umano (maschio)\n", + /*135*/ "62 anni 8 mesi\n", + /*136*/ "|File CI nー000 -\n\nStadio addestramento: N/D\nGrado addestramento: N/D\nStato attivo: N/D\n\n|Profilo -\n\nIntelligente scienziato/imprenditore e fondatore del Carrington Institute. Pianifica tutte le missioni che affida ai suoi agenti e esegue ogni operazione dal computer del suo ufficio. Strano gusto in fatto di abbigliamento.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Umano (femmina)\n", + /*139*/ "39 anni ? mesi\n", + /*140*/ "|Scheda psicanalitica -\n\nLa mente della dataDyne Corp. Assetata di potere, detesta non essere il capo. Odia perdere il comando. ネ senza scrupoli e pronta a tutto pur di vincere la sua battaglia contro Daniel Carrington, che disprezza con tutte le sue forze.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Umano (maschio)\n", + /*143*/ "46 anni ? mesi\n", + /*144*/ "|Scheda psicanalitica -\n\nCapo del National Security Agency, legato a Cassandra De Vries da una strana amicizia, che sembra pi che altro un'alleanza d'interesse. Tende a fare tutto ci che dice Cassandra, forse perch, pur avendo una forte personalit, non basta a sovrastarla. Riferimento per molte teste calde dell'NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Il Sapiente Caroll (AI)\n", + /*147*/ "6 mesi\n", + /*148*/ "|Profilo -\n\nUn'intelligenza artificiale creata dalla dataDyne Corp. con spiccate abilit linguistiche e di lettura codici. Fortunatamente ha principi morali e, grazie al suo formidabile livello di intelligenza, ha fiutato alcuni piani futuri della dataDyne. Dispone di propriet di linguaggio e di stile, tanto da sembrare un docente universitario.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (maschio)\n", + /*151*/ "320 anni\n", + /*152*/ "|Profilo -\n\nUn alieno della razza Maian. ネ il 'difensore' (guardia del corpo) dell'ambasciatore Maian invitato sulla Terra da Daniel Carrington. I difensori sono addestrati per l'uso preciso di una vasta gamma di armi. Elvis un terrafilo: per lui il mondo terrestre incredibilmente affascinante.\n", + /*153*/ "Mr Blonde\n", + /*154*/ "Umano (maschio)\n", + /*155*/ "Va per i 30\n", + /*156*/ "|Profilo -\n\nUn umano maschio con capelli biondissimi. Molto alto, sempre vestito di bianco, porta spesso un impermeabile. Sembra che orchestri il complotto in cui sono coinvolti Cassandra e Trent. Di lui non si sa altro.\n", + /*157*/ "Mr Blonde\n", + /*158*/ "Skedar (in incognito)\n", + /*159*/ "Sconosciuta\n", + /*160*/ "|Profilo Aggiornato -\n\nSi tratta di un guerriero Skedar che si aggira entro la proiezione olografica di un uomo biondissimo sui 30 anni. Il dispositivo di modulazione orale gli conferisce un tono di voce chiaro, piacevole e convincente. ネ un subdolo mezzo di propaganda per gli Skedar.\n", + /*161*/ "Il Presidente degli USA\n", + /*162*/ "Umano (maschio)\n", + /*163*/ "50 anni\n", + /*164*/ "|Profilo -\n\nUn afro-americano istruito e astuto che cerca di fare la cosa giusta ma attorniato da gente come Trent Easton. Dopo aver respinto la richiesta di prestito del Pelagic II avanzata dalla dataDyne, crede di avere Trent sotto controllo. La maggioranza dei commentatori politici lo ritiene facilmente influenzabile, giudizio forse azzardato.\n", + /*165*/ "I Maian\n", + /*166*/ "I Maian sono la razza di alieni noti sulla Terra come i 'Grigi'. Hanno studiato la Terra molto a lungo, per svariati secoli, e sono bendisposti verso gli umani, comprendendone il grande potenziale. Il loro contatto sulla Terra Daniel Carrington, per manca ancora un contatto politico formale.\n", + /*167*/ "Guerriero Skedar\n", + /*168*/ "Gli Skedar sono una razza aliena bellicosa, da sempre in lotta contro i Maian. Solo di recente hanno firmato un armistizio. Lottano e si muovono in enormi armature meccanizzate, poich non sono altro che piccole creature simili ai rettili. Sono molto aggressivi: hanno fatto della guerra la loro religione... e sono molto devoti.\n", + /*169*/ "Situazione\n", + /*170*/ "Milioni di anni fa un'enorme e potente nave aliena si inabiss nell'Oceano Pacifico. Era dotata di un'arma molto pericolosa, ma ancora sconosciuta, in grado di rompere i legami nucleari che tengono assieme le molecole. Affinch possibili occhi indiscreti credessero che la nave fosse andata distrutta, fu diffuso nella galassia da cui era partita un apposito messaggio e vari componenti del sistema di propulsione furono distrutti proprio nel sistema solare che era stato scelto come nascondiglio. In realt questa astronave era un Cetan, una creatura possente, vigile e aliena.\n\nUn'altra razza extraterrestre, i Maian, scoprirono la vita sulla terra nel 2000 a.C. Ne videro un enorme potenziale, ma decisero di lasciare che la primitiva razza umana si sviluppasse senza la loro intrusione.\n\nI Maian incontrarono gli Skedar vicino al Delta Eridano nel 1650 d.C. (data terrestre) e le schermaglie iniziali si trasformarono presto in una guerra sanguinosa. Solo dopo centinaia di anni di lotta si arriv ad una pace molto delicata che frange di Skedar continuavano a ledere con attacchi terroristici, a cui i Maian non capitolarono mai.\n\nMa anche l'umanit continuava ad essere una preoccupazione per i Maian che guardavano delusi come la Terra subisse continue crisi causate dall'avvento della tecnologia e da 'agenti estranei'. Temevano che annunciare la loro presenza potesse solo scatenare altre guerre sul pianeta e cos decisero di continuare pazientemente le loro osservazioni finch gli umani non si fossero dimostrati pi 'maturi'.\n\nDaniel Carrington fu sicuramente 'precoce' e nel 1985 d.C. contatt una nave Maian in orbita sopra la terra, proponendo un piano vantaggioso per tutti che avrebbe accelerato i contatti tra gli umani e i Maian. Ritenendo Carrington un uomo onesto, i Maian approvarono il suo piano e acconsentirono a che egli diffondesse la loro tecnologia tramite il suo rinomato Istituto di Ricerca e Sviluppo.\n\nMa nel 2006 d.C. alcuni estremisti Skedar rintracciarono l'antico messaggio Cetan. Cominciarono subito a perlustrare la Terra con minuzia e con ogni mezzo, rapendo persone e mutilando animali per arrivare a scoprire il luogo in cui era dispersa la nave da guerra. Col tempo riuscirono inevitabilmente a scovare il punto esatto in cui l'incrociatore riposava sul fondo del Pacifico, ma per raggiungerlo avrebbero avuto bisogno dell'aiuto degli umani.\n\nConducendo i loro studi sulla Terra, gli Skedar compilarono una lista di aziende con le risorse necessarie per il recupero della nave. Capolista era la dataDyne Corporation. Ne contattarono il presidente, Cassandra De Vries e le proposero un accordo troppo bello per essere vero, ed ovviamente non lo era. In cambio dell'aiuto per recuperare la 'loro' nave dal fondo dell'Oceano, gli Skedar promisero di cedere alla dataDyne tutta la tecnologia aliena necessaria per diventare la pi grande azienda sul pianeta. La dataDyne doveva solo costruire un automa con abilit linguistiche e di decodifica... compito sospetto, ma di sicuro alla loro altezza. I lavori cominciarono immediatamente.\n\nCassandra De Vries rifer i dettagli del piano a Trent Easton, direttore dell'NSA, che cerc invano di ottenere l'approvazione del Presidente al prestito di un sottomarino per ricerche sul fondo oceanico. N gli Skedar n la dataDyne avrebbero potuto rubare il sommergibile senza scatenare la furia del governo USA, quindi elaborarono un piano ben pi sinistro per la sostituzione del Presidente con un clone che solo loro potessero controllare. Una volta consegnata alla storia l'operazione Skedar, Trent e Cassandra sarebbero stati ovviamente ricompensati di tanto rischio.\n\nMa non avrebbero avuto molto tempo per esultare. Il piano finale degli estremisti Skedar era di sperimentare il separatore molecolare sulla Terra prima di eliminare i Maian, e n Cassandra n Trent si accorsero della trappola, accecati com'erano dalla brama di potere e successo.\n\nMa la dataDyne aveva creato inconsapevolmente qualcosa che poteva ben capire il pericolo di questa intricata cospirazione: l'automa Sapiente costruito per infrangere il codice di accesso alla nave Cetan. Quando questo rivel le sue preoccupazioni sulla missione per cui era progettato, Cassandra ordin di manipolargli il cervello togliendogli cos la personalit. Pensava decisamente troppo... Disperato, il Sapiente decise di reagire ai complotti della dataDyne e degli Skedar, e con una mossa coraggiosa adott lo pseudomino di Dr. Caroll e contatt il Carrington Institute chiedendo aiuto...\n", + /*171*/ "La storia\n", + /*172*/ "L'inesperta agente Joanna Dark incaricata di una missione consistente nel prelevare uno scienziato dall'area ad alta sicurezza nei sotterranei della dataDyne. Quando trova il Dr. Caroll rimane sorpresa nello scoprire che si tratta di un automa creato dalla dataDyne, tuttavia resta fedele al suo incarico di portarlo al sicuro. Durante l'operazione scatta l'allarme e Joanna deve farsi strada per raggiungere sul tetto l'eliporto e la navetta di salvataggio, le uniche vie di scampo.\n\nIn risposta a questa incursione, due giorni dopo la dataDyne prende in ostaggio Daniel Carrington nella sua villa; in cambio della sua vita vogliono la restituzione dell'automa di loro 'propriet'. A loro insaputa l'automa si trova gi nella villa dove Carrington lo stava interrogando sui piani futuri della dataDyne. Joanna riesce a salvare il capo dell'istituto, ma non pu impedire che la dataDyne si riprenda il Dr. Caroll. Tuttavia, Carrington ha scoperto abbastanza da decidere di richiedere l'intervento di una squadra di specialisti Maian sulla Terra.\n\nJoanna inviata a Chicago per spiare una riunione di cospiratori nell'edificio G5, una copertura della dataDyne Corporation. Qui scopre che anche Trent Easton, direttore dell'NSA, coinvolto nella faccenda, assieme ad alcuni Scandinavi che sembrano avere il controllo della losca situazione. Quando Trent rivela il piano per il rapimento del Presidente, Joanna comunica la notizia alla base, ma scopre che un altro compito pi urgente richiede il suo intervento, prima dell'affare Trent.\n\nGli specialisti Maian sono stati intercettati e abbattuti dai cospiratori, che hanno trasportato rottami e sopravvissuti presso l'Area 51 in Nevada. Dopo essere stata istruita su come recuperare i superstiti e le loro attrezzature, a Joanna viene affiancato un altro agente del Carrington Institute. Quando irrompe nel laboratorio, Joanna riesce a scoprire il segreto dell'istituto: i loro alleati sono i Maian, la razza aliena nota come i Grigi. Il Maian che riesce a salvare si chiama Elvis, era la guardia del corpo dell'ambasciatore Maian che era stato inviato sulla Terra come capo della squadra di specialisti.\n\nDopo aver aiutato i superstiti della delegazione Maian, Joanna pu tornare a occuparsi del Presidente e dei piani della dataDyne contro di lui. Fingendo di essere un membro dell'entourage del Presidente, riesce ad accedere alla base aerea dove staziona l'Air Force One e addirittura ad imbarcarsi. Dopo il decollo, Trent e uno Skedar in incognito entrano in azione, ma Joanna l per fermarli. Porta il Presidente su una capsula di sicurezza, mentre una squadra degli uomini di Trent saccheggia l'aereo e trasborda i politici sull'UFO Skedar che si era agganciato all'Air Force One tramite un cordone ombelicale. Joanna danneggia il cordone ma non riesce a romperlo, allora Elvis fa un ultimo tentativo per distruggerlo lanciadovisi contro ad alta velocit. I tre velivoli precipitano in una regione sperduta dell'Alaska e dall'Air Force One viene lanciata la capsula di salvataggio.\n\nIn seguito Joanna cerca di ristabilire i contatti con l'istituto, ma gli Skedar riescono ad impedire le comunicazioni. Cos si incammina tra la neve alla ricerca del Presidente e di Elvis, e incontra squadre di Skedar in incognito in cerca di lei, di Elvis e del Presidente. Decide di seguire un gruppo di Skedar fino alla navicella Skedar affondata e qui scopre il clone del Presidente: riesce a distruggerlo velocemente e a disattivare il dispositivo di disturbo delle comunicazioni, infine chiama i rinforzi. Il Presidente salvo, gli Skedar hanno fallito e ora Trent dovr pagare cara la sua incompetenza.\n\nMa non finita. Ignorando qualsiasi cautela, la dataDyne e gli Skedar rubano il 'Pelagic II', il sottomarino di ricerca del Governo, e si dirigono nel punto in cui affond la nave Cetan. Joanna e Elvis devono intralciare l'attivit a bordo e cos scoprono il vero senso del piano Skedar. Dopo aver paralizzato le operazioni di immersione e fatto rientrare i sommergibili, raggiungono il fondo dell'oceano dove scoprono l'incrociatore Cetan affondato. Un varco realizzato dagli Skedar li fa entrare nella nave dove inciampano nel cadavere di un guerriero Skedar... la squadra d'assalto non deve averla passata liscia. Eliminando gli aggressivi Skedar superstiti e sfuggendo ai Cetan, Joanna e Elvis arrivano al centro della nave, dove trovano l'automa una volta noto come Dr. Caroll. Dopo che sono riusciti a ristabilire la sua personalit, l'automa li convince ad abbandonare la nave in modo che lui possa distruggerla una volta per tutte.\n\nRientrati al Carrington Institute, Joanna si appresta ad andare alla Casa Bianca per il ricevimento presidenziale quando scoppia l'inferno. I superstiti dello squadrone d'assalto Skedar si vogliono vendicare dando la caccia ai responsabili del loro fallimento nel recupero della nave Cetan. Joanna aiuta i dipendenti dell'istituto a mettersi in salvo negli hangar, mentre gli Skedar sferrano attacchi in vari punti dell'istituto: la maggioranza dei dipendenti riesce a salvarsi, ma alla fine Joanna viene stordita e fatta prigioniera.\n\nSi ritrova in una cella a bordo della nave Skedar assieme a Cassandra De Vries. In un momento drammatico, il presidente della dataDyne offre volontariamente la sua vita per creare lo scompiglio che sar necessario a Joanna per fuggire. Facendosi strada nella nave, Joanna riesce a trovare e disattivare gli scudi anti-attracco consentendo a Elvis di portare alcuni amici per la tanto attesa sparatoria.\n\nLa nave d'assalto catturata entra nell'orbita sopra il Tempio di Guerra Skedar, con grande sorpresa di Elvis poich i Maian non sono mai riusciti a trovare questo 'luogo sacro' in tutti gli anni di guerra interraziale. Distruggere il Tempio significherebbe infliggere un duro colpo agli Skedar e la pace duratura sostituirebbe l'instabile tregua. Cos Joanna si concentra sul leader Skedar, il sacerdote a capo del Tempio, mentre Elvis torna alla nave d'assalto per organizzare le flotte Maian.\n\nDopo la furiosa battaglia, del Tempio non rimane che una rovina e Elvis interrompe il bombardamento per cercare Joanna. ネ viva ma tenuta in trappola sotto le macerie dagli ultimi tenaci Skedar comparsi all'ultimo momento, proprio mentre stava scappando. Elvis le passa un'arma per convincere gli Skedar a lasciarla andare e, a lavoro completato, con il Tempio Skedar raso al suolo, i due eroi possono finalmente rientrare in orbita. La razza Skedar giunta al capolinea: il morale sotto i piedi e il complotto mandato in fumo per sempre.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "L'azienda monolitica che oggi la dataDyne era stata originariamente creata come impresa di programmazione di sistemi di intelligenza artificiale. Tuttavia, quando emerse che la maggior parte dei profitti scaturiva dalla sua opera di difesa per conto della macchina militare statunitense, un manager giovane e intraprendente di nome Cassandra De Vries inizi a stringere accordi con produttori di armi, ignorando le offerte di collaborazione di Daniel Carrington e del suo istituto per condurre una ricerca congiunta relativa al computo dei quanti e all'intelligenza artificiale. Dopo la fusione con la terza azienda produttrice di armi, i profitti del gruppo andarono alle stelle. Nel giro di un mese la dataDyne ottenne un appalto governativo per lo sviluppo di nuove armi sotto la guida di Cassandra De Vries. Una buona parte dei profitti del gruppo furono reinvestiti nella ricerca relativa all'intelligenza artificiale con risultati sorprendenti.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Deriso e considerato un inventore bizzarro, Daniel Carrington fu il primo a divulgare le tecnologia antigravitazionale. Con i proventi ottenuti da questa invenzione e altri sviluppi fond il Carrington Institute, una fucina tecnologica situata in una sperduta localit degli USA. L'istituto anche il campo di addestramento per la formazione di agenti la cui missione girare il mondo per tenere sotto controllo lo sviluppo tecnologico, per ragioni ben note a Daniel Carrington.\n", + /*177*/ "Description\n- Una minuscola telecamera per esplorazioni clandestine e l'olografia spettroscopica. Apre le porte emettendo impulsi di calore.\n\nIstruzioni di addestramento\n- Olografa il terminale hacker nella sala informatica a fianco.\n\nFunzionamento\n- Premi Z per l'olografia. Premi B per aprire le porte. Tieni premuto R per guardarti intorno.\n", + /*178*/ "Descrizione\n- Migliora la qualit della luce presente per visualizzare l'area circostante. Rileva le fonti di vita. Sovraccarica in condizioni di luce normale, 'annebbiando' il display.\n\nIstruzioni di addestramento\n- - Procedi al buio, trova l'interruttore e attivalo per riaccendere la luce.\n\nFunzionamento\n- Seleziona Vista Notturna dall'inventario per attivarla. Riselezionala per disattivarla.\n", + /*179*/ "Descrizione\n\n- Sistema indipendente di decodifica. Si applica al quadro comandi e esegue tutte le combinazioni finch non trova quella esatta.\n\nIstruzioni di addestramento\n- Trova la porta chiusa e usa il decodificatore per aprirla.\n\nFunzionamento\n- Stai vicino alla porta e premi B mentre tieni il decodificatore.\n", + /*180*/ "Descrizione\n\n- Usato per guardare attraverso le pareti e gli oggetti. ネ pi potente della Vista Notturna e dello scanner a infrarossi.\n\nIstruzioni di addestramento\n- Con lo scanner a raggi X cerca i due interruttori nascosti e attivali per disattivare le griglie laser.\n\nFunzionamento\n- Seleziona lo scanner a raggi X dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*181*/ "Descrizione\n\n- Il travestimento serve per non destare sospetti, ma fa comunque attenzione a non farti scoprire da qualche nemico perspicace.\n\nIstruzioni di addestramento\n- Grimshaw ha un dispositivo mimetico pronto per essere usato. Vai alla porta accanto e 'compralo' da lui.\n\nFunzionamento\n- Per indossare il travestimento, selezionalo dall'inventario.\n", + /*182*/ "Descrizione\n\n- Trasforma i dati termici in immagini visibili. Pu essere usato al buio e rileva anomalie come porte nascoste e pareti sottili.\n\nIstruzioni di addestramento\n- Accendi lo scanner a infrarossi, trova la porta nascosta e aprila.\n\nFunzionamento\n- Seleziona lo scanner a infrarossi dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*183*/ "Descrizione\n- Localizza un oggetto specifico su una mappa radar HUD, mostrandone le dimensioni e la distanza.\n\nIstruzioni di addestramento\n- Attiva il Puntatore e segui il segno del radar per trovare l'oggetto.\n\nFunzionamento\n- Seleziona il Puntatore dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*184*/ "Descrizione\n- Distorce lo spettro visibile della luce attorno a chi lo indossa, creando un effetto camaleontico. Il campo si infrange quando chi lo indossa spara.\n\nIstruzioni di addestramento\n- Attiva il dispositivo mimetico e entra nell'ufficio di Carrington per sorprenderlo!\n\nFunzionamento\n- Seleziona il dispositivo mimetico dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*185*/ "Descrizione\n- Emette un segnale in continuo movimento studiato per mandare in tilt i dispositivi elettronici di comunicazione. Funziona solo se posto sull'oggetto.\n\nIstruzioni di addestramento\n- Lancia la mina ECM sulla centralina luce dalla porta segreta.\n\nFunzionamento\n- Premi Z per lanciare la mina. Tieni premuto R e muovi il Control Stick per mirare bene prima del lancio.\n", + /*186*/ "Descrizione\n- Crea un collegamento tra l'agente in missione e gli hacker dell'Istituto in sede,che possono cos scaricare i dati o decodificare codici elettronici a distanza.\n\nIstruzioni di addestramento\n- Usa il Connettore Dati per accedere al terminale nell'angolo e aprire una porta segreta.\n\nFunzionamento\n- Vai vicino al terminale e premi B tenendo il Connettore Dati.\n", + /*187*/ "SPARO\n Premi Z per far fuoco.\n", + /*188*/ "AUTORICARICA\n Rilascia Z quando non hai pi munizioni.\n", + /*189*/ "RICARICA MANUALE\n Premi B per ricaricare prima di rimanere a secco.\n", + /*190*/ "MIRA: Tieni premuto R per accedere alla modalit Mira.\n", + /*191*/ "Usa il Control Stick per spostare la visuale di mira.\n", + /*192*/ "AUTOFUOCO\n Premi Z per fuoco continuo automatico.\n", + /*193*/ "CAMBIA MIRA\n Premi C in alto o in basso per spostare la visuale in alto o in basso.\n", + /*194*/ "ZOOM\n Tieni premuto R per avviare la modalit Zoom.\n", + /*195*/ "FUOCO RAPIDO\n Premi Z velocemente per spari rapidi.\n", + /*196*/ "Carrington Institute\0|Base operativa\n", + /*197*/ "Lucerne Tower\0|Quartier Generale Globale\n", + /*198*/ "Laboratorio sotterraneo\0|Centri di ricerca sotterranei\n", + /*199*/ "Villa Carrington\0|Residenza privata sulla costa\n", + /*200*/ "Chicago\0|Sobborghi delle citt濬n", + /*201*/ "Edificio G5\0|Sede della dataDyne\n", + /*202*/ "Area 51\0|Vicino al Groom Dry Lake, Nevada\n", + /*203*/ "Base aerea in Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'aereo presidenziale\n", + /*205*/ "Luogo del disastro\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Sottomarino per ricerche oceaniche\n", + /*207*/ "Astronave Cetan\0|Segno degli alieni sulla Terra\n", + /*208*/ "Nave d'assalto Skedar\0|Astronave per trasporto truppe\n", + /*209*/ "Patria Skedar\0|Il pianeta del Tempio di Guerra\n", + /*210*/ "Navetta\0|Agile navicella per il trasporto truppe\n", + /*211*/ "Antigravit濬0|Dispositivo antigravit濬n", + /*212*/ "Aeromoto\0|Veicolo per spostamenti a bassa quota\n", + /*213*/ "PuliRobot\0|Il tuo fedele amico\n", + /*214*/ "Cannoniera\0|Cannoniera urbana AG\n", + /*215*/ "Robot G5\0|Droide da combattimento urbano\n", + /*216*/ "Intercettatore A51\0|Robot intercettatore aereo\n", + /*217*/ "Vascello Maian\0|Vascello di esplorazione e perlustrazione\n", + /*218*/ "Navetta Skedar\0|Navicella aliena per trasporto truppe\n", + /*219*/ "L'edificio dell'istituto comprende svariate aree: uffici e laboratori, aule e hangar. ネ piuttosto isolato dall'ambiente esterno per garantire il massimo della segretezza.\n", + /*220*/ "Nel bel mezzo del quartiere finanziario si erge il cupo grattacielo della dataDyne Corporation.\n", + /*221*/ "Questi laboratori ben protetti e nascosti conservano la chiave del futuro della dataDyne. Qui dentro alcuni ingegneri lavorano a progetti segreti mirati a garantire la supremazia della dataDyne.\n", + /*222*/ "Di propriet dell'istituto, questa residenza appartata usata da Daniel Carrington per sfuggire dallo stress del lavoro. Oltre ad un osservatorio dispone di generatore elettrico e di una cantina ben fornita.\n", + /*223*/ "Un quartiere piuttosto fatiscente di Chicago, immerso nel traffico. Qui si trova la sede della G5 Corporation.\n", + /*224*/ "L'edificio G5 dispone di una sala riunioni segreta protetta contro registrazioni illecite. Questo il luogo ideale per le cospirazioni e i piani segreti della dataDyne.\n", + /*225*/ "Questa parte del grande complesso noto come Area 51 si trova ai piedi dei colli attorno al lago Groom Dry. Eliscali e torri di comunicazione esterni danno un'idea dell'estensione del complesso sottoterra.\n", + /*226*/ "Una delle tante basi aeree disponibili per lo stazionamento dell'Air Force One. Solitamente la base aerea si trova sperduta in una regione inospitale, al sicuro da sguardi indiscreti.\n", + /*227*/ "Quest'Air Force One particolarmente adatto ai climi freddi, come quelli dell'Alaska del Nord. La destinazione di volo Oslo, Norvegia.\n", + /*228*/ "I rottami dell'aereo colpito sono finiti nel paesaggio roccioso innevato del Circolo Polare Artico.\n", + /*229*/ "Di propriet del governo USA, il Pelagic II pu condurre operazioni subacquee in alto mare in ogni condizione climatica. ネ l'unico sommergibile al mondo per la ricerca sul fondo oceanico.\n", + /*230*/ "Un'enorme nave di costruzione aliena che riposa da milioni di anni sul fondo oceanico.\n", + /*231*/ "Una nave d'assalto interplanetaria che trasporta guerrieri Skedar verso le zone di guerra. Fa parte dell'ormai ridotta flotta Skedar.\n", + /*232*/ "Un pianeta molto arido, sconvolto da terremoti, tempeste di sabbia e uragani. Fa parte di un sistema solare complesso comprendente tre soli.\n", + /*233*/ "Una navetta da trasporto piccola, veloce e facile da manovrare, progettata per l'uso in aree urbane. Pu essere comandata dal computer o pilotata a distanza. Pu trasportare tre o quattro agenti con l'attrezzatura.\n", + /*234*/ "Un dispositivo antigravit usato dai magazzinieri. ネ applicato al lato della cassa da imballaggio. Quando attivo, il campo AG innalza la cassa ed elimina parte dell'inerzia.\n", + /*235*/ "Una moto da perlustrazione a bassa quota. Si libra grazie alla piccola unit antigrevit, ma ha un potente motore per gli spostamenti rapidi direzionali.\n", + /*236*/ "Mette in ordine e pulisce. Ha accesso a tutte le aree di un edificio: gli agenti possono avvalersi dell'aiuto di questi robot perch possono facilitare involontariamente l'ingresso a zone riservate.\n", + /*237*/ "Un veicolo di soppressione e perlustrazione urbana: con equipaggio di due persone, armato di cannone sulla punta e di due missili sulle ali. Pu essere eliminato con raffiche di spari o un missile ben mirato.\n", + /*238*/ "Un robot da combattimento urbano. Utilizza un'unit antigravit per librarsi; ben armato e schermato. Spesso usato per tenere alla larga i curiosi grazie alla programmazione 'zitto e spara'.\n", + /*239*/ "Versione motorizzata dell'Aeromoto, con dispositivi AG e turbina pi potenti; pu facilmente raggiungere Mach 2 e ha un'autonomia di molte ore se procede a velocit ridotta. Anche se ben armato il suo punto forte la manovrablit.\n", + /*240*/ "Progettato per il trasporto del solo pilota Maian. Un passeggero ci starebbe stretto, soprattutto se fosse umano.\n", + /*241*/ "Pu portare al campo di battaglia dieci guerrieri Skedar armati fino ai denti. Sfugge ai radar tradizionali. Pu trasmettere potenti onde di disturbo su una vasta area mandando in tilt comunicazioni e apparecchi radar.\n", + /*242*/ "Descrizione\n- Un buon agente nota tutto ci che lo circonda.\n\nIstruzioni di addestramento\n- Esamina tutti gli oggetti guardandoli direttamente.\n\nFunzionamento\n- Guardare su: pulsante C in basso\n- Guardare gi: pulsante C in alto\n- Guardare attorno: pulsante R per attivare la mira e Control Stick.\n", + /*243*/ "Descrizione\n- Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n\nIstruzioni di addestramento\n- Attiva tutti gli interruttori anteriori ma fai presto perch si disattivano a tempo.\n\nFunzionamento\n- Passo a sinistra: pulsante C a sinistra\n- Passo a destra: pulsante C a destra\n\n", + /*244*/ "Descrizione\n- Accucciandoti e strisciando potrai rilevare nuove aree da esplorare.\n\nIstruzioni di addestramento\n- Fatti strada tra gli ostacoli usando le mosse disponibili. Attiva gli interruttori.\n\nFunzionamento\n- Accucciarsi: pulsante R e poi pulsante C verso il basso.\n- Strisciare: quando sei accucciato, pulsante R e poi C verso il basso.\n- Alzarsi: pulsante R.\n\n", + /*245*/ "Descrizione\n- Lottare a mani nude contro pi avversari pu essere difficile.\n\nIstruzioni di addestramento\n- Metti KO tutti i nemici senza farti colpire.\n\nFunzionamento\n- Pugno: premi Z pi volte da disarmato per lanciare una scarica di pugni.\n\n", + /*246*/ "Descrizione\n- Disarmando un nemico potrai impossessarti della sua arma.\n\nIstruzioni di addestramento\n- Metti KO/disarma tutti i nemici senza essere colpito.\n\nFunzionamento\n- Disarmare: tieni premuto B e poi premi Z per disarmare il nemico.\nPugno KO: colpisci il nemico alle spalle.\n", + /*247*/ "Descrizione\n- Lottare a mani nude contro pi nemici.\n\nIstruzioni di addestramento\n- Batti tutti i nemici disarmati senza essere colpito.\n\n", + /*248*/ "Descrizione\n- Lottare contro pi nemici, sia armati che disarmati.\n\nIstruzioni di addestramento\n- Batti tutti i nemici armati senza essere colpito.\n\n", + /*249*/ "Per una maggiore precisione e libert quando ti guardi attorno, usa la modalit Mira.\n", + /*250*/ "Pensa a dove vuoi andare prima di effettuare la prova. Poniti in un punto dove dovrai spostarti il meno possibile tra gli obiettivi.\n", + /*251*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai pi veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando necessario.\n", + /*252*/ "Attaccare gli avversari alle spalle pu essere scorretto, ma cos sar pi facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*253*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*254*/ "Non stare l a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*255*/ "Quando sei sicuro delle tue abilit di lotta a mani nude, va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*256*/ "Per una maggiore precisione e libert quando ti guardi attorno, usa la modalit Mira.\n", + /*257*/ "Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n", + /*258*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai pi veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando necessario.\n", + /*259*/ "Attaccare gli avversari alle spalle pu essere scorretto, ma cos sar pi facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*260*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*261*/ "Non stare l a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*262*/ "Quando sei sicuro delle tue abilit di lotta a amni nude va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*263*/ "Tieni sempre d'occhio l'obiettivo quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*264*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il pi possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalit Mira.\n", + /*265*/ "La TeleSpia pu essere difficile da controllare, abbi pazienza.\n", + /*266*/ "Utile nel combattimento, ma pu causare problemi per sovraccarico.\n", + /*267*/ "Se hai problemi ad attaccare il decodificatore, prova a stare pi vicino all'obiettivo.\n", + /*268*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ci che ti circonda e preparati ad esplorare.\n", + /*269*/ "La visiera riduce il campo visivo e ci pu essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*270*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perch pu impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*271*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*272*/ "Usa i dispositivi mimetici quando non c' nessuno che possa vederti.\n", + /*273*/ "Tieni sempre d'occhio il target quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*274*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il pi possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalit Mira.\n", + /*275*/ "La TeleSpia non invisibile, i nemici potrebbero scoprirla: attento quando entri in un'area abitata. Ricorda che la TeleSpia rimarr nel punto dove l'hai lasciata a meno che tu la riprenda.\n", + /*276*/ "Utile nel combattiemto, ma pu causare problemi per sovraccarico. Evita questo inconveniente e reagisci prima del nemico.\n", + /*277*/ "Se hai problemi ad attaccare il decodificatore, prova a stare pi vicino all'obiettivo.\n", + /*278*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ci che ti circonda e preparati ad esplorare.\n", + /*279*/ "La visiera riduce il campo visivo e ci pu essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*280*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perch pu impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*281*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*282*/ "Usa i dispositivi mimetici quando non c' nessuno che possa vederti. Evita di sparare se non strettamente necessario finch non sei sicuro della riuscita del tuo attacco.\n", + /*283*/ "La Falcon 2 una pistola molto precisa: qualsiasi errore dipende da te. La modalit secondaria la botta col calcio, inutile nel poligono.\n", + /*284*/ "Per sfruttare al meglio la precisione della Falcon 2, essa dotata di un cannocchiale. Come per la Falcon 2 non modificata, la modalit secondaria inutile durante la prova al poligono.\n", + /*285*/ "La versione della Falcon 2 con silenziatore eccezionale per azioni in incognito e per cogliere l'avversario di sorpresa. Assicurati della tua precisione per non rischiare di sprecare l'occasione.\n", + /*286*/ "La Magsec 4 dotata di un'eccezionale potenza di sparo ma non troppo precisa, soprattuto se usata nella modalit secondaria a tre esplosioni. Il vero svantaggio dell'arma il caricatore ridotto.\n", + /*287*/ "ネ una tipica arma Skedar, potente e brutale. Sacrificando parte del caricatore, il colpo pu essere caricato in modo da essere devastante. La carica di munizioni superiore un bonus.\n", + /*288*/ "Questa versatile pistola ha due sistemi di sparo: uno standard e uno esplosivo. Gli ingegneri Maian sono riusciti a realizzarla contenendo il consumo di energia dell'arma, sebbene la gittata sia ridotta.\n", + /*289*/ "Con la DY357 bisogna sapere quando ricaricare: un caricatore a sei colpi ti fa stare sempre all'erta quando fai fuoco. Il peso della pistola pu essere un vantaggio se si deve stendere qualcuno.\n", + /*290*/ "Trent Easton cerca sempre quel qualcosa in pi e questa pistola non fa eccezione. Persino le pallottole sono speciali; sono progettate per frammentarsi nell'avversario ed eliminarlo velocemente.\n", + /*291*/ "Un fucile mitragliatore affidabile e efficace: facile capire perch sia il modello pi venduto della dataDyne, anche se non prevista la modalit secondaria. Il sistema di designazione e puntamento eccellente e vale la pena di imparare il funzionamento completo dell'arma.\n", + /*292*/ "Il fucile mitragliatore Ciclone non stato progettato come arma di precisione, anche se vale la pena fare pratica. Pu sparare molte pallottole in poco tempo ed quindi un'eccellente arma di soppressione.\n", + /*293*/ "La flessibilit Maian nel design ha prodotto questo fucile mitragliatore con un'interessante modalit secondaria: una pallottola superveloce ad alta penetrazione. Come per la Phoenix, la velocit di fuoco ridotta nella modalit secondaria, per evitare danni al meccanismo di sparo e alla canna.\n", + /*294*/ "La RC-P120 spara una speciale pallottola minerale che, assieme all'alta velocit e al notevole caricatore, ne fa uno strumento perfetto da usare contro gli Skedar, se necessario. Le pallottole possono essere usate per alimentare un prototipo di dispositivo mimetico: l'addestramento stato adeguarsi a tale caratteristica.\n", + /*295*/ "La pistola si chiude in modo da sembrare un laptop e pu essere usata come sentinella in modalit secondaria per coprire una via d'uscita o proteggere un luogo.\n", + /*296*/ "Questo il modello che la dataDyne ha fornito all'esercito USA, anche se non ancora stato adottato ufficialmente. Poich la dataDyne riserva sempre brutte sorprese, il fucile d'assalto di base dispone di una mina di prossimit sotto la canna. Usare la modalit secondaria significa dover poi buttar via l'arma.\n", + /*297*/ "Per quanto se ne sa, la modalit secondaria dell'arma sembra essere un rilevatore di minacce, mine guidate, esplosivi nascosti (tipo la Dragon nella modalit secondaria)e pistole automatiche. Anche se potente, il caricatore del fucile d'assalto troppo piccolo.\n", + /*298*/ "Il primo tentativo dell'istituto di creare un'arma di supporto l'AR34, un semplice fucile d'assalto. La modalit secondaria uno zoom costante. Richiede un addestramento preciso.\n", + /*299*/ "La versione pi pesante della Dragon, con un piccolo lanciagranate al posto della mina di prossimit. Adottato dall'esercito USA come arma pesante di supporto e a ragione! Esercitati con la traiettoria delle granate.\n", + /*300*/ "La precisione d'uopo! Ci sono due modalit: esplosione singola o doppia. Il caricatore piuttosto capiente per un fucile a pompa, ma si devono considerare i lunghi tempi di ricarica.\n", + /*301*/ "Un fucile cecchino sofisticato, con silenziatore e zoom. L'unico elemento funzionale che riduce la precisione il cecchino. Usa la modalit secondaria per accucciarti e prendere la mira.\n", + /*302*/ "Pur essendo tecnologicamente molto avanzato le caratteristiche del fucile TeleVista sono lampanti. Il colpo inarrestabile e penetra nelle pareti in grande profondit, puntando e seguendo gli obiettivi se necessario.\n", + /*303*/ "La prima funzione della balestra un colpo narcotico non letale, mentre la seconda annienta all'istante. ネ un'arma per missioni in incognito e il caricamento richiede molto tempo, quindi non adatta in caso di fuoco serrato.\n", + /*304*/ "La pistola sedativo la stessa usata in molti ospedali e laboratori. Pu essere caricata sia con piccole quantit di sedativo sia con dosaggi letali. Il contenuto nel serbatoio cala a seconda del dosaggio.\n", + /*305*/ "Cerca di controllare quest'arma al meglio. ネ pensata per esseri pi forti degli umani, questo chiaro. Inginocchiarsi aiuta a prendere la mira, ma non ad aggiustarla. Se l'avversario si trova nella linea del fuoco, le canne possono essere usate come un macinatore.\n", + /*306*/ "Un prodotto recente della dataDyne dall'interessante tecnologia. La modalit secondaria attiva un campo magnetico attorno alla bomba, conferendo aderenza per un breve periodo, dopo di che il campo svanisce e la bomba cade dal punto d'impatto esplodendo.\n", + /*307*/ "Un lanciamissili compatto riutilizzabile, si ricarica dopo ogni lancio. La modalit secondaria usa una variante del sistema di puntamento del fucile mitragliatore CMP150,con un solo bersaglio designato. Il missile viaggia a velocit ridotta mentre segue l'obiettivo: calcola bene i tempi!\n", + /*308*/ "Questo lanciamissili Skedar pu lanciare un missile non guidato o uno telecomandato. Forse gli Skedar hanno la loro soddisfazione quando la telecamera zooma sul bersaglio, ma un agente del Carrington Institute superiore a certe cose. Il missile guidato accelera automaticamente, ma pu essere rallentato per manovrarlo meglio. L'esplosione avviene a contatto o a comando.\n", + /*309*/ "Un pugnale da lotta temprato, bilanciato anche per il lancio. ネ necessario fare molta pratica per ottenere una traiettoria precisa della lama lanciata.\n", + /*310*/ "Il reparto sperimentazione armi ha realizzato questo laser da polso, a due raggi, piccolo ma efficace. La modalit primaria ha una gittata considerevole, la secondaria spara un raggio continuo, finch il grilletto premuto.\n", + /*311*/ "La granata antiuomo a frammentazione esplode dopo quattro secondi dall'attivazione. Per perfezionare l'ordigno stata aggiunta una modalit secondaria ping-pong. La granata salta da una parte all'altra fino ad esaurimento della carica o attivazione del rilevatore di prossimit.\n", + /*312*/ "Questa granata Maian crea il caos nei neuroni delle creature coscienti. Trovandoti nel raggio di esplosione ti si annebbier la vista e gli oggetti ti cadranno di mano. Pu essere fatta esplodere a impatto o per prossimit. Lanciala abbastanza lontano da te.\n", + /*313*/ "Ci vuole prudenza nell'uso di mine a orologeria, altrimenti il bersaglio pu sfuggire dal raggio di esplosione e inseguirti. Fai molta pratica prima di rischiare di compiere gravi errori sul campo. La modalit secondaria un rilevatore di minaccia come quello del fucile d'assalto K7 Vendetta.\n", + /*314*/ "Il segreto per un buon piazzamento della mina di prossimit metterla dove l'avversario non se l'aspetta. Se ti trovi all'estremit di destinazione della mina di prossimit, usa il rilevatore di minaccia della modalit secondaria per proteggerti. Pu sembrare una perdita di tempo, ma pu salvarti la vita.\n", + /*315*/ "L'ultimo modello delle mine a esplosione a distanza, sostanzialmente come le precedenti. La modalit primaria piazza la mina, mentre la secondaria d il comando di esplosione. Se non vedi la mina, dovrai cercare di calcolare a mente il tempo. \n", + /*316*/ "Olog. 1 - Guardati attorno\n", + /*317*/ "Olog. 2 - Movimento 1\n", + /*318*/ "Olog. 3 - Movimento 2\n", + /*319*/ "Olog. 4 - A mani nude 1\n", + /*320*/ "Olog. 5 - A mani nude 2\n", + /*321*/ "Olog. 6 - Lotta aperta 1\n", + /*322*/ "Olog. 7 - Lotta aperta 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_s.c b/src/files/lang/jap-final/dish_str_s.c new file mode 100644 index 000000000..f3721a697 --- /dev/null +++ b/src/files/lang/jap-final/dish_str_s.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Recoge la Visin Nocturna de la mesa para empezar.\n", + /* 9*/ "Activa la Visin Nocturna.\nLocaliza el interruptor de la luz.\nEnciende las luces.\n", + /* 10*/ "Recoge el Conector de Datos de la mesa para empezar.\n", + /* 11*/ "Sitate cerca de la terminal y usa el Conector.\n", + /* 12*/ "Necesitas sostener el Conector de Datos.\n", + /* 13*/ "Conexin establecida...\n", + /* 14*/ "La Terminal ha sido intervenida con 騙ito.\n", + /* 15*/ "Conexin perdida: demasiado lejos del PC.\n", + /* 16*/ "Recoge la Mina ECM de la mesa para empezar.\n", + /* 17*/ "Localiza el Puerto y con馗tale una Mina ECM.\n", + /* 18*/ "La Mina ECM ha sido colocada incorrectamente.\n", + /* 19*/ "La Mina ECM ha sido colocada correctamente.\n", + /* 20*/ "Recoge la C疥ara Espa de la mesa para empezar.\n", + /* 21*/ "Localiza la Sala del PC de Informacin y holografala.\n", + /* 22*/ "Sala del PC de Informacin holografada correctamente.\n", + /* 23*/ "Las luces han sido reactivadas.\n", + /* 24*/ "Recoge el Decodificador de Puertas de la mesa para empezar.\n", + /* 25*/ "Usa el Decodificador en la puerta para desbloquearla.\n", + /* 26*/ "Necesitas estar sujetando el Decodificador de Puertas.\n", + /* 27*/ "Decodificador colocado. Iniciando rutinas de 'crackeo'...\n", + /* 28*/ "Decodificacin completada. La puerta ha sido desbloqueada.\n", + /* 29*/ "Recoge el Rastreador de la mesa para empezar.\n", + /* 30*/ "Localiza el Esc疣er de Infrarrojos con el Rastreador.\n", + /* 31*/ "El Esc疣er de Infrarrojos ha sido localizado con 騙ito.\n", + /* 32*/ "Recoge el Esc疣er de Infrarrojos de la mesa para empezar.\n", + /* 33*/ "Localiza la puerta secreta usando el Esc疣er de Infrarrojos.\n", + /* 34*/ "La puerta secreta ha sido localizada con 騙ito.\n", + /* 35*/ "Recoge el Esc疣er de Rayos-X de la mesa para empezar.\n", + /* 36*/ "Encuentra los interruptores ocultos para apagar la rejilla l疽er.\n", + /* 37*/ "Todas las rejillas l疽er han sido desactivadas.\n", + /* 38*/ "Recoge el Disfraz de la mesa para empezar.\n", + /* 39*/ "Engaa a alguien para que te d el Dispositivo de Ocultacin.\n", + /* 40*/ "Dispositivo de Ocultacin recuperado con 騙ito.\n", + /* 41*/ "Rejilla L疽er 1 desactivada.\n", + /* 42*/ "Rejilla L疽er 2 desactivada.\n", + /* 43*/ "Estoy aqu para recoger el equipo.\n", + /* 44*/ "Vete, Joanna. 。No engaas a nadie!\n", + /* 45*/ "Aqu lo tienes. No lo dejes caer.\n", + /* 46*/ "El Dispositivo de Ocultacin ha sido asegurado con 騙ito.\n", + /* 47*/ "Se supone que debes usar el Disfraz, ソrecuerdas?\n", + /* 48*/ "Lo tienes que hacer bastante mejor, Joanna.\n", + /* 49*/ "Joanna, ソde dnde has salido?\n", + /* 50*/ "Has sido detectado por la c疥ara.\n", + /* 51*/ "Recoge el Dispositivo de Ocultacin de la mesa para empezar.\n", + /* 52*/ "Usa el Dispositivo de Ocultacin y localiza a Carrington.\n", + /* 53*/ "。Creo que podemos asegurar que tu entrenamiento\nha sido completado!\n", + /* 54*/ "Misin completada - 。Entrenamiento de Dispositivos pasado!\n", + /* 55*/ "Misin fallada: Has sido detectada.\n", + /* 56*/ "Elegir el Conector.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Conector de Datos y suelta el Botn A.\n", + /* 57*/ "Elegir la C疥ara Espa.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la C疥ara Espa y suelta el Botn A.\n", + /* 58*/ "Elegir la Visin Nocturna.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Visin Nocturna y suelta el Botn A.\n", + /* 59*/ "Elegir el Decodificador de Puertas.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Decodificador y suelta el Botn A.\n", + /* 60*/ "Elegir el Esc疣er de Rayos-X.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Esc疣er de Rayos-X y suelta el Botn A.\n", + /* 61*/ "Elegir el Disfraz.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Disfraz y suelta el Botn A.\n", + /* 62*/ "Elegir el Esc疣er de Infrarrojos.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Esc疣er de IR y suelta el Botn A.\n", + /* 63*/ "Elegir el Rastreador.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Rastreador y suelta el Botn A.\n", + /* 64*/ "Elegir el Dispositivo de Ocultacin.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Dispositivo y suelta el Botn A.\n", + /* 65*/ "Elegir la Mina ECM.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Mina ECM y suelta el Botn A.\n", + /* 66*/ "Joanna, por fin te encuentro.\n", + /* 67*/ "Ven conmigo.\nTe conducir a las salas de entrenamiento.\n", + /* 68*/ "El centro de informacin est tras esta puerta.\n", + /* 69*/ "Aqu tenemos el laboratorio de dispositivos.\n", + /* 70*/ "Esto conduce a la sala de entrenamiento de simulantes.\n", + /* 71*/ "ノste es el campo de tiro, Joanna.\n", + /* 72*/ "Este corredor conduce al hangar.\n", + /* 73*/ "ANTIGRAV\nPulsa el Botn B cerca del Antigrav para cogerlo...\n", + /* 74*/ "Cogiendo la caja, pulsa el Botn B para soltarla.\n", + /* 75*/ "AEROMOTO \nPulsa dos veces B cerca de una Aeromoto para subir.\n", + /* 76*/ "Pulsa dos veces B en la Aeromoto para bajar.\n", + /* 77*/ "ABRIENDO PUERTAS\nPulsa el Botn B cerca de una puerta para abrirla.\n", + /* 78*/ "El Botn B tambi駭 activar cualquier objeto cercano.\n", + /* 79*/ "ASCENSORES\nPulsa el Botn B cerca de la puerta\npara llamar al ascensor.\n", + /* 80*/ "No se puede salir cuando el entrenamiento est en marcha.\n", + /* 81*/ "Has obtenido el Cdigo Interruptor 1.\n", + /* 82*/ "Has obtenido el Cdigo Interruptor 2.\n", + /* 83*/ "Has obtenido el Cdigo Interruptor 3.\n", + /* 84*/ "Has obtenido el Cdigo Interruptor 4.\n", + /* 85*/ "MIRAR ARRIBA\n- Pulsa el Botn C Abajo para mirar hacia arriba.\n", + /* 86*/ "MIRAR ABAJO\n- Pulsa el Botn C Arriba para mirar hacia abajo.\n", + /* 87*/ "El Holoprograma 2 ha sido completado con 騙ito.\n", + /* 88*/ "El Holoprograma 4 ha sido completado con 騙ito.\n", + /* 89*/ "El Holoprograma 5 ha sido completado con 騙ito.\n", + /* 90*/ "El guarda ha sido desarmado con 騙ito.\n", + /* 91*/ "El guarda ha sido derribado con 騙ito.\n", + /* 92*/ "Desarma a este objetivo vivo si puedes.\n", + /* 93*/ "Derriba a este objetivo: ocultarse es la clave.\n", + /* 94*/ "Y el guarda final...\n", + /* 95*/ "AGACHARSE\n- Mant駭 el Botn R, entonces pulsa el Botn C Abajo para agacharte.\n", + /* 96*/ "ARRASTRARSE\n- Una vez agachado, mant駭 el Botn R, entonces pulsa el Botn C abajo para arrastrarte.\n", + /* 97*/ "El Holoprograma 3 ha sido completado con 騙ito.\n", + /* 98*/ "Activa todos los interruptores.\n", + /* 99*/ "Activa todos los interruptores del muro.\n- Date prisa, ya que se reinician r疳idamente.\n", + /*100*/ "Obt駭 los cdigos de acceso examinando los terminales. \n- Usa los cdigos en los terminales del muro.\n", + /*101*/ "El Cdigo 1 ha sido obtenido.\n", + /*102*/ "El Cdigo 2 ha sido obtenido.\n", + /*103*/ "El Cdigo 3 ha sido obtenido.\n", + /*104*/ "El Cdigo 4 ha sido obtenido.\n", + /*105*/ "Entrenamiento fallado: debes mirar al frente.\n", + /*106*/ "El Holoprograma 1 ha sido completado con 騙ito.\n", + /*107*/ "Combate sin armas: derriba al objetivo.\n- Pulsa el Botn Z repetidamente para golpear.\n", + /*108*/ "Ahora int駭talo contra un objetivo en movimiento...\n", + /*109*/ "Y por ltimo contra un objetivo que contraataca.\n", + /*110*/ "Derrota a todos los enemigos sin ser alcanzado.\n", + /*111*/ "Entrenamiento fallado: te han acertado.\n", + /*112*/ "El Holoprograma 6 ha sido completado con 騙ito.\n", + /*113*/ "El Holoprograma 7 ha sido completado con 騙ito.\n", + /*114*/ "TERMINALES\n- Pulsa el Botn B cerca de la terminal\npara usarla.\n", + /*115*/ "Ahora activa las terminales rojas del muro.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bien, Joanna, te dejo. Prep疵ate para la misin.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humano (Mujer)\n", + /*127*/ "23 aos 2 meses\n", + /*128*/ "|Fichero IC #027 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A++\nEstatus Actual: Asignado\n\n|Perfil -\n\nAltamente entrenada pero sin experiencia. Reaccin excelente. Experta en gran variedad de armas. Agente muy competente en todo momento. La m疽 alta puntuacin en entrenamiento, lo que llev a la creacin de un nuevo nivel. Es la encarnacin del agente ideal del Instituto Carrington, de ah su nombre clave: 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Humano (Hombre)\n", + /*131*/ "28 aos 5 meses\n", + /*132*/ "|Fichero IC #009 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A+\nEstatus Actual: Secreto\n\n|Perfil -\n\nNuestro agente secreto con mayor experiencia. Muy preciso con su arma favorita (un Revlver Magnum). Perfectamente preparado para misiones secretas. Menos preparado en combate normal. Tras Joanna Dark, tiene el honor de tener la puntuacin m疽 alta en entrenamiento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humano (Hombre)\n", + /*135*/ "62 aos 8 meses\n", + /*136*/ "|Fichero IC #000 -\n\nEstatus Entrenamiento: N/D\nGrado de Entrenamiento: N/D\nEstatus Actual: N/D\n\n|Perfil -\n\nInteligente y patriarcal cientfico/empresario, fundador del Instituto Carrington. Planifica todas las misiones de sus agentes y controla cada operacin desde su oficina. Con un gusto un tanto personal en la ropa.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humano (Mujer)\n", + /*139*/ "39 aos ? meses\n", + /*140*/ "|An疝isis -\n\nDirectora de la Corporacin dataDyne. Adicta al poder; detesta ser subordinada de nadie. Odia perder la iniciativa. No muestra ninguna clase de escrpulos si con ello consigue superarse en su competicin con Daniel Carrington, al cual aborrece.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humano (Hombre)\n", + /*143*/ "46 aos ? meses\n", + /*144*/ "|An疝isis -\n\nDirector de la Agencia Nacional de Seguridad. Tiene una cierta amistad con Cassandra De Vries, aunque parece m疽 una unin de inter駸. Tiende a hacer lo que dice Cassandra, ya que aunque tiene una personalidad dominante, no lo es tanto como la de ella. Cabeza visible de los elementos m疽 granujas de la ANS.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "La Inteligencia Caroll (IA)\n", + /*147*/ "6 meses\n", + /*148*/ "|Perfil -\n\nInteligencia artificial creada por la Corporacin dataDyne con habilidades de lenguaje y apertura de cdigos. Afortunadamente, tiene moral, y debido a su formidable nivel de inteligencia, ha adivinado algunos de los planes futuros de dataDyne. Su voz es muy precisa y educada y simula la personalidad de un acad駑ico.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Macho)\n", + /*151*/ "320 aos\n", + /*152*/ "|Perfil -\n\nAliengena de la raza Maian. Es un 'Protector' (guardaespaldas) del embajador Maian que viaja a la Tierra a peticin de Daniel Carrington. Los Protectores est疣 entrenados para dominar una gran variedad de armamento. Elvis es un terrfilo, es decir, est fascinado por el planeta Tierra y todo lo que contiene.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humano (Hombre)\n", + /*155*/ "Unos 30 aos\n", + /*156*/ "|Perfil -\n\nEs un sorprendente hombre rubio. Muy alto, viste ropa blanca, habitualmente una gabardina. Parece ser la cabeza pensante de la conspiracin en la que Cassandra y Trent est疣 involucrados. Poco m疽 se sabe.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disfrazado)\n", + /*159*/ "desconocida\n", + /*160*/ "|Perfil Actualizado -\n\nSe trata de un guerrero Skedar disfrazado con la proyeccin hologr畴ica de un impresionante humano rubio de unos 30 aos. Su unidad de modulacin oral da al Skedar una precisa, persuasiva, e inteligente voz. Es un instrumento de propaganda y manipulacin de los Skedar, inusualmente sutil.\n", + /*161*/ "Presidente de EE.UU.\n", + /*162*/ "Humano (Hombre)\n", + /*163*/ "50 aos\n", + /*164*/ "|Perfil -\n\nAltamente educado, es un perspicaz afroamericano que intenta hacer lo correcto, pero que est rodeado de gente como Trent Easton. Cree que tiene a Trent bajo control tras rechazar la peticin de pr駸tamo del Pelagic II a la Corporacin dataDyne. La mayora de comentaristas polticos piensa que es f當il de controlar, lo cual quiz疽 sea injusto.\n", + /*165*/ "Maian\n", + /*166*/ "Los Maian son la raza de aliengenas conocida en la Tierra como los 'Grises'. Han vigilado la Tierra durante largo tiempo, bastantes siglos, y han sido benevolentes con la humanidad, siendo conscientes del potencial de la raza humana. Su contacto en la Tierra es Daniel Carrington. Todava debe hacerse un contacto poltico formal.\n", + /*167*/ "Guerreros Skedar\n", + /*168*/ "Los Skedar son una raza aliengena guerrera que luch con los Maian durante siglos y slo ahora han aceptado un alto el fuego. Suelen usar armaduras para caminar y luchar, ya que son criaturas bastante pequeas y con forma de serpiente. Son muy agresivos y extremadamente devotos; han hecho de la Guerra una religin.\n", + /*169*/ "Antecedentes\n", + /*170*/ "Hace millones de aos, una gigantesca nave aliengena de inmenso poder, creada por una raza aliengena llamada Cetan, se hundi en el Oc饌no Pacfico. Estaba equipada con una nueva arma devastadoramente peligrosa: la 'fuerza nuclear de acople d饕il', que en teora puede causar que las cadenas que unen las mol馗ulas fallen. Aunque algunos hubieran credo en la innegable destruccin de la nave, un mensaje-c疳sula fue enviado a casa, y partes vitales de los sistemas de navegacin fueron destruidas en el sistema estelar que eligieron como escondite.\n\n Esta nave era un Cetan, una gigantesca, criatura aliengena centinela.\n\nOtra raza extraterrestre, los Maian, encontr vida en la Tierra en el 2000 AC. Detectaron un gran potencial, pero decidieron dejar a la primitiva raza humana desarrollarse sin intromisiones.\n\nLos Maian encontraron a los Skedar cerca de Delta Eridanus en el 1650 DC (fecha terr痃uea), y la escaramuza resultante pronto floreci en una guerra total. Slo tras cientos de aos de lucha se logr un tratado de paz, aunque los fan疸icos Skedar se saltaban continuamente los acuerdos de esta paz con actividades terroristas. Afortunadamente, los Maian rehusaron abandonar.\n\nLa humanidad, tambi駭, continu siendo una causa que concerna a los Maian, los cuales vean con decepcin cmo la Tierra sufra m疽 y m疽 crisis debido al crecimiento de la tecnologa y a 'situaciones fuera de contexto'. Sintieron que anunciar su presencia slo precipitara guerras futuras en el planeta, y tranquilamente decidieron continuar en observacin hasta que la raza madurara m疽.\n\nDaniel Carrington se adelant a todos en el 1985 DC al contactar con una nave Maian en rbita sobre la Tierra. Propuso un plan que poda ayudar a ambas partes, resultando as un contacto acelerado entre Humanos y Maian. Viendo que su plan era sensato, y que se trataba de una persona ntegra, los Maian permitieron a Carrington lanzar su tecnologa al dominio pblico a trav駸 de sus grandes empresas de Investigacin y Desarrollo.\n\nEntonces, en el 2006 DC, los fan疸icos Skedar dieron con la c疳sula-mensaje Cetan. Inmediatamente comenzaron a rastrear la Tierra de un modo particularmente duro, abduciendo gente y mutilando animales en un intento de determinar la localizacin del crucero de batalla perdido. Con el tiempo, sus pruebas les condujeron inevitablemente al lecho marino del Oc饌no Pacfico; de todos modos, para alcanzarla, necesitaran ayuda de los nativos.\n\nLlevando a cabo su propio estudio de la Tierra, los Skedar confeccionaron una corta lista de compaas que posean los recursos para ayudarles a recuperar la nave hundida. En lo m疽 alto de esa lista estaba la Corporacin dataDyne. Contactaron con su directora, Cassandra De Vries, y se presentaron con un trato que sonaba demasiado bien para ser cierto: el cual, por cierto, lo era. A cambio de su ayuda para levantar 'su' nave del lecho marino, los Skedar prometieron dotar a dataDyne con suficiente tecnologa aliengena para convertirse en la mayor corporacin sobre la faz del planeta. Todo lo que dataDyne tena que hacer era construir una unidad de IA con habilidades de lenguaje y 'rotura' de cdigos, que era justo lo que necesitaban. Se comenz a trabajar en el proyecto inmediatamente.\n\nCassandra De Vries le mostr al director de la ANS, Trent Easton, los detalles del plan, pero sus intentos de conseguir la aprobacin Presidencial para el pr駸tamo de una nave de investigacin a profundidad, fueron repetidamente rechazados. No exista la posibilidad de que los Skedar o dataDyne pudieran robar la nave sin desatar la ira del Gobierno de los EE.UU., as que decidieron trazar un plan bastante m疽 siniestro para reemplazar al Presidente con un clon que ellos pudieran controlar. Por supuesto, esto prometa recompensas extra para Trent y Cassandra cuando la operacin Skedar pasara a la historia.\n\nDe todas formas, no tuvieron mucho tiempo para regodearse. El plan ltimo de los fan疸icos Skedar era probar la 'fuerza nuclear de acople-d饕il' en la Tierra antes de eliminar a los Maian, y tanto Cassandra como Trent permanecieron ciegos ante la posibilidad de ser traicionados, as que enamorados de las visiones de poder y lujo, continuaron adelante.\n\nPero dataDyne haba creado inconscientemente algo que poda ver demasiado claro el peligro que implicaba una conspiracin de tal magnitud: la sabia IA construida para abrir los cdigos de acceso de la nave Cetan. Cuando se mostr disconforme con la misin para la que haba sido diseada, la respuesta de Cassandra fue ordenar que su personalidad fuera eliminada. Claramente, pensaba demasiado. En su desesperacin, y en un movimiento que podra sellar o romper un mejor trato que el 'pacto' entre dataDyne y los Skedar, la IA adopt el seudnimo de Dr. Caroll y contact con el Instituto Carrington con una splica de ayuda...\n", + /*171*/ "La Historia\n", + /*172*/ "A la inexperta agente Joanna Dark se le asign una misin relacionada con la 'extraccin' de un cientfico de un 疵ea de desarrollo de alta seguridad sita bajo el rascacielos de dataDyne. Despu駸 del encuentro, se sorprende al descubrir que el 'Dr. Caroll' es una IA creada por la propia dataDyne, pero ella contina con su tarea de escoltarle/lo a un lugar seguro. Cuando salta la alarma, Joanna tiene que abrirse camino hacia lo alto del edificio para alcanzar el helipuerto y la lanzadera que supone su nica va de escape.\n\nEn respuesta a esta incursin, dataDyne marca a Daniel Carrington como un objetivo personal y lo toma como reh駭 dos das despu駸 en su villa privada. Demandan la devolucin de la IA, su 'propiedad', a cambio de su vida. No lo saben, pero la IA ya est en la villa, donde fue interrogada por Carrington sobre los planes de futuro de dataDyne. Finalmente, Joanna rescata al director del Instituto pero es incapaz de evitar que dataDyne se apodere de nuevo del Dr. Caroll. De todas formas, Carrington conoce lo suficiente como para dar el paso dr疽tico de reclamar en la Tierra un equipo de especialistas Maian.\n\nJoanna es enviada para espiar la reunin de los conspiradores en el Edificio G5, una tapadera de la Corporacin dataDyne. Es aqu donde averigua que Trent Easton, director de la ANS, y aquellos hombres nrdicos, que parecen tener el control del mortal plan, est疣 involucrados. Cuando Trent revela el plan de usurpar la posicin Presidencial, Joanna comunica por radio las novedades a la base, slo para descubrir que otra tarea todava m疽 urgente requiere de ella, antes incluso de llevar a cabo cualquier accin contra Trent.\n\nLos especialistas Maian han sido interceptados y derribados por los conspiradores, y los supervivientes y los restos del accidente son transportados al チrea 51, en Nevada. Con la misin de rescatar supervivientes y recuperar sus equipos, Joanna es 'introducida' para enlazar con otro agente del Instituto Carrington. Cuando irrumpe en el laboratorio m馘ico, Joanna descubre finalmente el secreto del Instituto, sus aliados son los Maian, la raza aliengena comnmente conocida como los 'Grises'. El Maian en particular que ella rescata responde al nombre de Elvis. Fue un guardaespaldas del Embajador que viajaba a la cabeza del equipo de especialistas.\n\nHabiendo asistido al resto de la delegacin Maian, Joanna puede volver al asunto del Presidente y a los planes de dataDyne en su contra. Se hace pasar por miembro del s駲uito Presidencial para acceder a la base a駻ea donde el Air Force One est ubicado, y consigue colarse con 騙ito en el avin. Nada m疽 despegar, Trent y el Skedar disfrazado mueven pieza, pero Joanna est all para detenerles. Apresura al Presidente a la c疳sula de escape mientras un equipo de hombres de Trent registran detenidamente el avin, en un intento de arrastrar al desgraciado poltico a bordo del OVNI Skedar, unido al AF1 por un tubo. Joanna debilita el tubo pero es incapaz de romperlo, y en ltima instancia Elvis intenta romper el tubo estrell疣dose contra 駘 a gran velocidad. Las tres naves caen en picado sobre la 'inexplorada' Alaska, y la c疳sula de escape del AF1 se eyecta.\n\nUna vez consciente, Joanna intenta informar por radio pero las comunicaciones est疣 bloqueadas debido a interferencias provenientes de la nave Skedar. Vagando por la nieve en busca del Presidente y de Elvis, se encuentra con grupos de Skedar ocultos que la buscan a ella, al Presidente, a Elvis y las pertenencias del Presidente. Localiza un grupo de vuelta a la nave Skedar derribada, donde descubre un clon del Presidente: r疳idamente lo destruye, apaga el origen de las interferencias y pide ayuda a la 'caballera'. Los planes Skedar han vuelto a ser frustrados, el Presidente est seguro y la incompetencia de Trent le ha llevado a un sucio destino a manos de sus 'aliados'.\n\nPero aqu no acaba la cosa. Descuidando toda precaucin, dataDyne y los Skedar roban el navo de investigacin del Gobierno, el 'Pelagic II', y se ponen en marcha hacia el lugar del siniestro en el Pacfico. Joanna y Elvis acuden para desbaratar la actividad a bordo y averiguar qu se esconde tras el gran plan Skedar. Despu駸 de paralizar las operaciones de inmersin del navo y replegar el sumergible, bajan al fondo oce疣ico, donde hacen el primer avistamiento del crucero de batalla Cetan derribado. Un portal hecho por los Skedar les permite el acceso a la nave, donde se encuentran con el cad疱er de un guerrero Skedar... Parece que el equipo de asalto no las tena todas consigo. Venciendo a los restantes vengativos Skedar y evitando a los Cetan, Joanna y Elvis se abren camino hasta el corazn de la nave, donde encuentran la IA que una vez fue Dr. Caroll. Se las apaan para restaurarle la personalidad, despu駸 de lo cual les ayuda a abandonar la nave para poder destruirla por el bien de todos.\n\nM疽 tarde, de vuelta en el Instituto Carrington, Joanna est a punto de salir hacia una recepcin Presidencial en la Casa Blanca cuando se arma un gran revuelo. Los supervivientes del equipo de asalto Skedar est疣 descargando su ira en aquellos en los que piensan recae la responsabilidad de su error al perder la nave Cetan. Joanna corre por el Instituto, ayudando a los empleados del IC a alcanzar la seguridad de los hangares, mientras los Skedar lanzan ataques en varias partes del edificio: la mayora de los empleados pudieron ponerse a salvo mientras Joanna mantena la resistencia, pero finalmente es golpeada e inconsciente es tomada como prisionera.\n\nJoanna despierta en una celda a bordo de la nave de asalto Skedar, con Cassandra De Vries como nica compaa. Por sorpresa, la directora de dataDyne, de buena gana da su vida para crear la distraccin necesaria para que Joanna escape. Luchando a trav駸 de la nave, logra localizar y desactivar los escudos de la baha de carga, permitiendo a Elvis llevar a unos cuantos amigos a la tan esperada 'fiesta' de la nave.\n\nLa ya capturada nave de asalto entra en rbita sobre el Templo de Batalla Skedar, lo que sorprende a Elvis ya que los Maian nunca antes haban encontrado 'el m疽 sagrado' lugar Skedar en todos los aos de Guerra interracial. Si el Templo es destruido, la moral Skedar ser abatida, y se lograr una paz verdadera en vez de un intil 'alto el fuego'. Joanna busca al lder Skedar, el m疽 alto sacerdote del Templo de Batalla, mientras Elvis regresa a la nave de asalto para traer a la flota Maian.\n\nAl despertar de tan culminante batalla, el templo est devastado. Elvis pide que se pare el bombardeo para encontrar a Joanna. Est viva pero retenida bajo una pila de escombros donde un tenaz Skedar la atrapa durante los ltimos segundos de su intento de escapar. Elvis le entrega r疳idamente un arma para convencer al Skedar de que la deje irse, y con el trabajo ya hecho, el Templo y la moral Skedar en ruinas y la conspiracin desbaratada, los dos parten a la rbita m疽 cercana.\n", + /*173*/ "Corporacin dataDyne\n", + /*174*/ "La monoltica corporacin que dataDyne ha llegado a ser comenz su negocio como programadora de sistemas de IA. Cuando de verdad comenz a crecer, fue cuando consigui trabajos como contratista de los militares norteamericanos, y su joven y din疥ica gerente Cassandra De Vries empez a cerrar tratos con fabricantes de armas, mientras ignoraba las ofertas de Daniel Carrington y el Instituto para colaborar en el desarrollo de ordenadores cu疣ticos e IAs. Cuando la tercera compaa armamentstica fue comprada por dataDyne, los beneficos se tornaron astronmicos. Tras recibir un contrato del gobierno para el desarrollo de armas, Cassandra De Vries fue promocionada a Directora. Una significativa parte de los beneficios de la corporacin fueron redirigidos a desarrollo de IAs, con resultados excelentes.\n", + /*175*/ "Instituto Carrington\n", + /*176*/ "Brevemente considerado como inventor chiflado, Daniel Carrington fue el primero en crear la tecnologa anti-gravedad. Las ganancias obtenidas, as como su desarrollo, le permitieron crear el Instituto Carrington, un remanso de creadores de tecnologa situado en un remoto lugar de los EE.UU. De hecho, el Instituto es un campo de entrenamiento para agentes que son enviados por todo el planeta para seguir el desarrollo tecnolgico actual, por razones que slo conoce el propio Daniel Carrington.\n", + /*177*/ "Descripcin\n- Una pequea c疥ara remota para exploracin sigilosa. Realiza holografas espectroscpicas. Abre puertas proyectando un impulso de calor del tamao de un humano.\n\nInstrucciones de Entrenamiento\n- Crea un holograma del terminal hacker de al lado de la Sala de Informacin.\n\nOperativa\n- El Botn Z toma una holografa. El Botn B abrir cualquier puerta en el camino. Mant駭 el Botn R para mirar.\n", + /*178*/ "Descripcin\n- Mejora la luz visible para producir una imagen del 疵ea circundante. Tambi駭 refleja formas de vida. En niveles normales de luz se produce una sobrecarga que 'blanquea' el visor.\n\nInstrucciones de Entrenamiento\n- Busca el interruptor de la luz en la oscuridad y actvalo.\n\nOperativa\n- Selecciona la Visin Nocturna de tu inventario para activarla. Hazlo de nuevo para desactivarla.\n", + /*179*/ "Descripcin\n- Dispositivo para apertura de cdigos. Se aplica sobre el panel de control y busca la combinacin hasta que la puerta se abra.\n\nInstrucciones de Entrenamiento\n- Encuentra el panel de la puerta cerrada y usa el Descodificador de Puertas en 駘 hasta que la abras.\n\nOperativa\n- Sitate cerca del panel de la puerta y pulsa el Botn B mientras sujetas el Descodificador para usarlo.\n", + /*180*/ "Descripcin\n- Se usa para ver a trav駸 de muros slidos y objetos. Puede ver cosas que la Visin Nocturna y el Esc疣er de Infrarrojos no pueden.\n\nInstrucciones de Entrenamiento\n- Con el Esc疣er de Rayos-X, busca los dos interruptores ocultos y actvalos para apagar la cuadrcula l疽er.\n\nOperativa\n- Elige el Esc疣er de Rayos-X de tu inventario para activarlo. Seleccinalo otra vez para desactivarlo.\n", + /*181*/ "Descripcin\n- Evita problemas al usar un disfraz. Pero, siempre debes estar alerta ante la posibilidad de ser desenmascarado por un enemigo espabilado.\n\nInstrucciones de Entrenamiento\n- Grimshaw tiene un Dispositivo de Ocultacin esper疣dote. Ve a la puerta de al lado para 'hacerte' con uno.\n\nOperativa\n- Para llevar el disfraz, simplemente elgelo en tu inventario.\n", + /*182*/ "Descripcin\n- Traslada datos termales en im疊enes visibles. Puede ser usado en la oscuridad y tambi駭 revela anomalas como puertas ocultas o muros debilitados.\n\nInstrucciones de Entrenamiento\n- Enciende el Esc疣er de Infrarrojos, encuentra la puerta oculta y 畸rela.\n\nOperativa\n- Elige el Esc疣er de Infrarrojos en tu inventario para activarlo. Reelgelo para desactivarlo.\n", + /*183*/ "Descripcin\n- Localiza un objeto en el mapa radar del visor. Muestra la posicin relativa y la distancia.\n\nInstrucciones de Entrenamiento\n- Activa el Rastreador y sigue la seal de radar hasta obtener el objeto.\n\nOperativa\n- Selecciona el Rastreador en tu inventario para activarlo. Reelgelo para desactivarlo.\n", + /*184*/ "Descripcin\n- Trastorna el espectro visible de luz alrededor del portador, creando un efecto camalenico. Este campo desaparece cuando el portador dispara.\n\nInstrucciones de Entrenamiento\n- Activa el Dispositivo de Ocultacin y dirgete a la oficina de Carrington para sorprenderle.\n\nOperativa\n- Selecciona el Dispositivo de Ocultacin para activarlo. Reelgelo para desactivarlo.\n", + /*185*/ "Descripcin\n- Emite una seal constante que sirve para bloquear cualquier dispositivo de comunicacin electrnica. Debe ser colocado en el objeto para ser efectivo.\n\nInstrucciones de Entrenamiento\n- Lanza la Mina ECM en el Puerto tras la puerta secreta.\n\nOperativa\n- Pulsa el Botn Z para lanzar la mina. Mant駭 el Botn R y mueve el Stick de Control para afinar tu puntera antes de lanzar.\n", + /*186*/ "Descripcin\n- Comunica al agente de campo con los hackers del Instituto sitos en el CG, quienes pueden romper cerraduras electrnicas a distancia.\n\nInstrucciones de Entrenamiento\n- Usa el Conector de Datos para 'hackear' la terminal de la esquina, abriendo as una puerta secreta.\n\nOperativa\n- Sitate en la terminal y pulsa el Botn B mientras sujetas el Conector de Datos.\n", + /*187*/ "DISPARAR\n Pulsa el Botn Z para disparar el arma.\n", + /*188*/ "RECARGA AUTOMチTICA\n Suelta el Botn Z cuando no tengas municin.\n", + /*189*/ "RECARGA MANUAL\n Pulsa el Botn B para recargar en cualquier momento.\n", + /*190*/ "Apuntar: Mant駭 el Botn R para entrar en el modo Apuntar.\n", + /*191*/ "Usa el Stick de Control para mover la mirilla.\n", + /*192*/ "AUTODISPARO\n Mant駭 el Botn Z para disparar autom疸icamente.\n", + /*193*/ "ALTERAR VISTA\n Pulsa el Botn C Arriba o el Botn C Abajo para mover la vista arriba/abajo.\n", + /*194*/ "ZOOM\n Mant駭 el Botn R para entrar en el modo Zoom.\n", + /*195*/ "FUEGO RチPIDO\n Pulsa el Botn Z r疳ido para disparar m疽 velozmente.\n", + /*196*/ "Instituto Carrington\0|Base de operaciones\n", + /*197*/ "Edificio Lucerne\0|Cuartel General Global\n", + /*198*/ "Stano Laboratorio\0|Laboratorios subterr疣eos\n", + /*199*/ "Villa Carrington\0|Propiedad privada en la costa\n", + /*200*/ "Chicago\0|Barrios Bajos de la ciudad\n", + /*201*/ "Edificio G5\0|Edificio de la Corporacin dataDyne\n", + /*202*/ "チrea 51\0|Cerca de Lago Seco, Nevada\n", + /*203*/ "Base A駻ea Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Avin del Presidente\n", + /*205*/ "Lugar del Impacto\0|Isla Victoria 71 N 118 O\n", + /*206*/ "Pelagic II\0|Navo especializado de profundidad\n", + /*207*/ "Nave Cetan\0|Nave aliengena en la Tierra\n", + /*208*/ "Nave de Asalto Skedar\0|Nave espacial de transporte\n", + /*209*/ "Mundo Skedar\0|El planeta del Templo de Batalla\n", + /*210*/ "Lanzadera\0|チgil transporte de tropas\n", + /*211*/ "AntiGrav\0|Dispositivo de Anti-gravedad\n", + /*212*/ "Aeromoto\0|Vehculo a駻eo de baja altitud\n", + /*213*/ "Bot de Limpieza\0|Tu ayudante especial\n", + /*214*/ "Hovercptero\0|Nave de asalto urbana\n", + /*215*/ "Robot G5\0|Droide urbano de combate\n", + /*216*/ "Interceptor A51\0|Interceptor a駻eo robtico\n", + /*217*/ "Nave Maian\0|Nave de reconocimiento y patrulla\n", + /*218*/ "Lanzadera Skedar\0|Nave aliengena de tropas\n", + /*219*/ "El edificio del Instituto comprende diferentes 疵eas: oficinas y laboratorios, talleres y hangares. Est bastante aislado del mundo exterior, lo que ayuda a mantener las operaciones en secreto.\n", + /*220*/ "En el centro del distrito financiero, el austero rascacielos de la Corporacin dataDyne destaca sobre sus vecinos.\n", + /*221*/ "Fuertemente guardados, estos bien escondidos laboratorios son la clave del futuro de dataDyne. En ellos, los t馗nicos trabajan secretamente para situar a dataDyne en lo m疽 alto.\n", + /*222*/ "Perteneciente al Instituto, esta apartada residencia es utilizada por Daniel Carrington como retiro de su trabajo en el Instituto. Tambi駭 tiene un observatorio, su propio generador el馗trico y una amplia bodega.\n", + /*223*/ "Es una srdida y mugrienta parte de Chicago, ahora cerrada al tr畴ico. Es aqu donde la Corporacin G5 tiene su cuartel general.\n", + /*224*/ "Dentro del Edificio G5 hay una sala de reuniones protegida por sistemas antigrabacin. Para dataDyne es el lugar m疽 seguro para formular sus planes confidenciales.\n", + /*225*/ "Esta seccin de la gigantesca instalacin conocida como チrea 51 est situada al pie de las colinas de Lago Seco. Helipuertos exteriores y torres de comunicacin indican el posible tamao del complejo subterr疣eo.\n", + /*226*/ "Una de las muchas bases a駻eas reforzadas para acoger al Air Force One cuando reposta. Normalmente, estas bases a駻eas est疣 en lugares remotos en regiones inhspitas, lejos de ojos entrometidos.\n", + /*227*/ "Este Air Force One en particular est optimizado para climas fros, siendo muy til cuando se usa en el norte de Alaska. El destino del vuelo es Oslo, Noruega.\n", + /*228*/ "En este rocoso paisaje cubierto de nieve en pleno Crculo チrtico, descansan los restos de un avin destrozado.\n", + /*229*/ "Propiedad del gobierno norteamericano, el Pelagic II es capaz de consumar operaciones a muy baja profundidad en cualquier condicin. Es el nico navo de desarrollo a baja profundidad del mundo.\n", + /*230*/ "Se trata de una nave gigantesca de construccin aliengena que reposa en el fondo oce疣ico desde hace millones de aos.\n", + /*231*/ "Es una nave de asalto interplanetaria que transporta guerreros Skedar a zonas de guerra. Pertenece a la muy reducida flota de batalla Skedar.\n", + /*232*/ "Se trata de un planeta extremadamente 疵ido, asolado por terremotos, tormentas de arena y huracanes. Es parte de un complejo sistema solar que incluye tres soles.\n", + /*233*/ "Este pequeo, r疳ido, y altamente manejable transporte de agentes ha sido diseado para uso en 疵eas urbanas. Puede ser controlado por ordenador o remotamente. Tiene espacio suficiente en su interior para tres o cuatro agentes, m疽 su equipamiento.\n", + /*234*/ "Este dispositivo anti-gravedad fue diseado para ayudar en los almacenes. Se aplica en el lateral de una caja. Cuando se activa, el campo antigravitatorio levanta el cajn y le quita algo de inercia.\n", + /*235*/ "Es una moto de patrulla de baja altitud. Usa una pequea unidad antigravedad para elevarse, y una poderosa turbina para moverse y proveer de control direccional.\n", + /*236*/ "Mantiene el lugar limpio y ordenado. Suele tener acceso a todas las 疵eas de un edificio. Los agentes han sido adiestrados en mantener estos robots intactos, ya que pueden conseguir acceso a zonas sensibles.\n", + /*237*/ "Vehculo de patrulla urbana y eliminacin, con tripulacin de dos hombres, y armado con un can en el morro, y dos sistemas de misiles en las alas. Puede ser eliminado con fuego sostenido, o preferentemente, un cohete bien dirigido.\n", + /*238*/ "Es un robot de combate diseado para guerrilla urbana. Usa una unidad anti-gravedad. Est fuertemente armado. Se suele usar para mantener lejos a visitantes no deseados, gracias a su programacin de '1ー dispara, despu駸 pregunta'.\n", + /*239*/ "Variacin robtica de la Aeromoto, con mayor poder gravitatorio y de turbina; puede alcanzar velocidad Mach 2 f當ilmente y avanzar durante horas a velocidad de crucero. Aunque bien armada, se basa en su manejabilidad m疽 que en el escudo.\n", + /*240*/ "Est diseada para llevar a un nico piloto Maian. Un pasajero se puede sentir atorado: si 駸te es humano, puede ser an peor.\n", + /*241*/ "Es capaz de llevar a la batalla a diez guerreros Skedar completamente armados. Es indetectable por el radar convencional. Puede emitir seales de bloqueo sobre 疵eas considerables: 駸tas interrumpen las comunicaciones as como los equipos de deteccin.\n", + /*242*/ "Descripcin\n- Un buen agente siempre observa lo que hay a su alrededor.\n\nInstrucciones de Entrenamiento\n- Examina todos los objetos mir疣dolos directamente.\n\nOperativa\n-Mirar arriba: Pulsa el Botn C Abajo\n-Mirar abajo: Pulsa el Botn C Arriba\n-Vista Libre: Mant駭 pulsado el Botn R para entrar en el modo Apuntar, y usa el Stick de Control para mirar.\n", + /*243*/ "Descripcin\n- Esquivar y eludir te puede sacar de muchos problemas.\n\nInstrucciones de Entrenamiento\n- Activa todos los interruptores. S r疳ida, ya que cada botn se reiniciar en un tiempo lmite.\n\nOperativa\n- Esquivar Izquierda: Botn C Izquierda\n- Esquivar Derecha: Botn C Derecha\n\n", + /*244*/ "Descripcin\n- Agacharse puede abrir nuevas 疵eas de exploracin.\n\nInstrucciones de Entrenamiento\n- Avanza evitando los obst當ulos utilizando los movimientos disponibles. Activa los interruptores.\n\nOperativa\n- Agacharse: Mant駭 el Botn R, y pulsa el Botn C Abajo.\n- Arrastrarse: Una vez agachado, mant駭 el Botn R, y pulsa el Botn C Abajo.\n- Levantarse: Presiona el Botn R.\n\n", + /*245*/ "Descripcin\n- Luchar contra mltiples oponentes en combates mano a mano puede ser difcil.\n\nInstrucciones de Entrenamiento\n- Derriba a todos los enemigos sin ser golpeado.\n\nOperativa\n- Puetazo: Pulsa el Botn Z repetidamente cuando est駸 desarmado para lanzar una r畴aga de puetazos.\n\n", + /*246*/ "Descripcin\n- Desarmar a un enemigo te puede proporcionar una nueva arma.\n\nInstrucciones de Entrenamiento\n- Derriba/desarma a todos los enemigos sin ser golpeado.\n\nOperativa\n- Desarmar: Mant駭 el Botn B, entonces pulsa el Botn Z para desarmar al enemigo.\n- Puetazo KO: Golpea a un enemigo desprevenido por detr疽.\n", + /*247*/ "Descripcin\n- Lucha contra mltiples oponentes en combate mano a mano.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*248*/ "Descripcin\n- Lucha contra mltiples oponentes, unos armados y otros no.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*249*/ "Para mayor precisin y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*250*/ "Piensa dnde quieres ir antes de intentar la prueba. Establece tu posicin en un lugar que requiera la menor cantidad de movimiento posible entre objetivos.\n", + /*251*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves m疽 r疳ido cuando est疽 en pie. Para avanzar lo m疽 r疳ido posible, intenta agacharte slo cuando lo necesites.\n", + /*252*/ "Atacar a los enemigos por detr疽 no es muy honorable, pero har bastante m疽 f當il derribarlos. Slo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*253*/ "Slo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nueva arma.\n", + /*254*/ "No esperes a ser alcanzada, 。mu騅ete! No te centres en un solo oponente; intenta situar dnde se encuentran todos. Si no puedes ver a todos, mu騅ete hasta que sea posible.\n", + /*255*/ "Ve a por los oponentes armados slo si est疽 segura de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*256*/ "Para mayor precisin y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*257*/ "Esquivar y eludir te puede sacar de muchos problemas.\n", + /*258*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves m疽 r疳ido cuando est疽 en pie. Para avanzar lo m疽 r疳ido posible, intenta agacharte slo cuando lo necesites.\n", + /*259*/ "Atacar a los enemigos por detr疽 no es muy honorable, pero har bastante m疽 f當il derribarlos. Slo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*260*/ "Slo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nuevo arma.\n", + /*261*/ "No esperes a ser alcanzada; 。mu騅ete! No te centres en un solo oponente; intenta situar dnde se encuentran todos. Si no puedes ver a todos, mu騅ete hasta que sea posible.\n", + /*262*/ "Ve a por los oponentes armados slo si est疽 seguro de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*263*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexin.\n", + /*264*/ "Asegrate de que la mina aterriza en el sitio correcto acerc疣dote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botn R.\n", + /*265*/ "La C疥ara Espa puede ser difcil de controlar, as que tmate tu tiempo.\n", + /*266*/ "Es til en combate, pero puede causar problemas cuando se sobrecarga.\n", + /*267*/ "Si tienes problemas para usar el Decodificador, intenta acercarte m疽 al objetivo poni駭dote cara a cara.\n", + /*268*/ "El Rastreador slo indica la direccin y altura relativa; no muestra un mapa que te gue al blanco. Presta atencin a tus alrededores, y prep疵ate a explorar.\n", + /*269*/ "El visor estrecha tu visin perif駻ica, lo cual puede causar problemas en combate. Asegrate de tu situacin antes de usarlo.\n", + /*270*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podr疽 ver nada a cierta distancia. レsalo con moderacin.\n", + /*271*/ "Un disfraz no es slo la ropa, es la manera en que una persona lo lleva. No actes de manera diferente a la de la persona que est疽 intentando ser.\n", + /*272*/ "Preserva tu Dispositivo de Ocultacin cuando no hay nadie alrededor que pueda observarte.\n", + /*273*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexin.\n", + /*274*/ "Asegrate de que la mina aterriza en el sitio correcto acerc疣dote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botn R.\n", + /*275*/ "La C疥ara Espa no es invisible: los enemigos la pueden descubrir, as que ten cuidado cuando entres en un 疵ea habitada. Recuerda que la C疥ara Espa se quedar donde la dejes hasta que la recojas.\n", + /*276*/ "Es til en combate, pero puede causar problemas cuando se sobrecarga. Intenta anticiparte a las situaciones y reacciona antes que el enemigo.\n", + /*277*/ "Si tienes problemas para usar el Decodificador, intenta acercarte m疽 al objetivo poni駭dote cara a cara.\n", + /*278*/ "El Rastreador slo indica la direccin y altura relativa; no muestra un mapa que te gue al objetivo. Presta atencin a tus alrededores, y prep疵ate a explorar.\n", + /*279*/ "El visor estrecha tu visin perif駻ica, lo cual puede causar problemas en combate. Asegrate de tu situacin antes de usarlo.\n", + /*280*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podr疽 ver nada a cierta distancia. レsalo con moderacin.\n", + /*281*/ "Un disfraz no es slo la ropa, es la manera en que una persona lo lleva. No actes de manera diferente a la de la persona que est疽 intentando ser.\n", + /*282*/ "Preserva tu Dispositivo de Ocultacin cuando no hay nadie alrededor que pueda observarte. Evita disparar a menos que sea absolutamente necesario, y slo si est疽 seguro del 騙ito de tu ataque.\n", + /*283*/ "La Falcon 2 es una pistola muy precisa, as que cualquier error ser tuyo. El modo secundario es golpear con su culata y es, por lo tanto, intil en una prueba de tiro.\n", + /*284*/ "Para hacer un mejor uso de la precisin de la Falcon 2, una mira ha sido puesta en la pistola. Como en la Falcon 2 sin modificar, el modo secundario de golpear con la culata es intil durante la prueba de tiro.\n", + /*285*/ "La versin con silenciador de la Falcon 2 es una excelente arma, diseada para darte la ventaja de la sorpresa sobre tus oponentes. Prueba tu precisin para asegurarte que nunca derrochar疽 tus oportunidades.\n", + /*286*/ "La Magsec 4 tiene un excelente poder de disparo a costa de la precisin, especialmente cuando se usa el modo secundario de r畴aga de 3 tiros. La nica desventaja seria es el tamao limitado de su cargador.\n", + /*287*/ "Esta tpica arma Skedar es brutal y poderosa. Sacrificando algo del cartucho, el disparo puede ser cargado para crear una explosin devastadora. Su capacidad de recarga es alta.\n", + /*288*/ "Esta vers疸il pistola ofrece dos diferentes sistemas de disparo para su municin: un disparo est疣dar o una descarga explosiva. Los ingenieros Maian lo han conseguido sin comprometer el uso de energa del arma, aunque el ritmo de disparo es reducido.\n", + /*289*/ "La clave del uso del DY357 es saber cu疣do recargar. Un cartucho de seis balas implica estar siempre alerta en un tiroteo. El peso del arma puede ser muy til si tienes que golpear a alguien con ella.\n", + /*290*/ "Trent Easton siempre busca facilidades extra, y este arma no es una excepcin. Las balas son tan especiales como el resto del arma; han sido diseadas para hacerse aicos en el interior del oponente y as tumbarle r疳idamente.\n", + /*291*/ "Esta fiable y efectiva metralleta no es difcil de encontrar ya que es el arma m疽 vendida de dataDyne en los ltimos dos aos, incluso si su modo secundario no se tiene en cuenta. Su sistema de adquisicin de objetivos es excelente, y deber疽 familiarizarte con todas las posibilidades de este arma.\n", + /*292*/ "La metralleta Cicln fue diseada especficamente para NO ser precisa, aunque vale la pena practicar. Puede disparar una gran cantidad de balas en poco tiempo, por ello, es una excelente arma de supresin.\n", + /*293*/ "La flexibilidad Maian respecto al diseo ha creado esta metralleta con un interesante modo secundario: una bala de alta velocidad que puede atravesar objetos f當ilmente. El ritmo de disparo, como en la Phoenix, se reduce durante el modo secundario; esto se debe a que se intenta prevenir dao en el mecanismo de disparo y en el can.\n", + /*294*/ "La RC-P120 dispara una bala mineral especial que, acompaada de un ritmo de disparo r疳ido y un amplio cargador, hace de este arma una herramienta perfecta para ser usada contra los Skedar. Las balas pueden ser usadas para recargar un prototipo de Dispositivo de Ocultacin: el entrenamiento ha sido alterado para reflejar esta caracterstica en particular.\n", + /*295*/ "Este arma no slo se parece a un ordenador PC port疸il, sino que puede ser utilizada como arma centinela en el modo secundario para cubrir una ruta de escape o proteger un lugar.\n", + /*296*/ "ノste es el modelo que dataDyne present con 騙ito a los militares de EE.UU., aunque todava tiene que ser aprobado. Siguiendo la tendencia de dataDyne de dar a la gente desagradables sorpresas, el modelo b疽ico del rifle de asalto lleva una mina de proximidad debajo del can. Usar el modo secundario obviamente implica que debes lanzar tu arma.\n", + /*297*/ "Tan lejos como podemos establecer, el modo secundario del arma parece ser que identifica trampas, minas dirigidas, dispositivos explosivos ocultos (como el Dragn en modo secundario), y armas autom疸icas. Aunque poderoso, el cartucho de este rifle de asalto es pequeo. \n", + /*298*/ "Como primera arma con apoyo del Instituto, el AR34 es un rifle de asalto bastante b疽ico. El modo secundario es un zoom permamente. Probar a sujetarlo vale como entrenamiento de precisin.\n", + /*299*/ "Se trata de la variante pesada del Dragn sin mina de proximidad, la cual ha sido reemplazada por un lanzagranadas. Adoptada por los militares norteamericanos como arma de apoyo de brigada pesada: se nota el porqu... Practica para hacerte con la trayectoria de las granadas.\n", + /*300*/ "La delicadeza no es una opcin aqu. Hay dos modos, explosin simple o doble. El cartucho es amplio para una escopeta, pero ten cuidado con el largo tiempo de recarga, y planea tus movimientos en consonancia.\n", + /*301*/ "Esta fina pieza de ingeniera es un rifle de francotirador con silenciador con un zoom de alta tecnologa. Lo nico que puede interferir en la precisin de este arma es el zoom de francotirador. Asegrate de agacharte y mantener tu mirilla en el modo secundario.\n", + /*302*/ "Aunque las t馗nicas actuales de ingeniera nos superan, todava podemos apreciar los efectos del rifle FarSight. Su disparo es imparable, y puede penetrar muros a bastante profundidad, alcanzando objetivos si se necesita.\n", + /*303*/ "La funcin primaria de la ballesta es un disparo de sedante no letal, mientras que el secundario es la muerte instant疣ea. Es un arma principalmente sigilosa, pero su largo tiempo de recarga puede ser un inconveniente durante un tiroteo.\n", + /*304*/ "La pistola tranquilizante es muy comn, pudiendo ser encontrada en laboratorios m馘icos y hospitales de todo el mundo. Puede ser usada con perdigones tranquilizantes, o con dosis letales, que usan bastante m疽 cantidad de la reserva de sedantes.\n", + /*305*/ "Intenta controlar este arma lo mejor que puedas. Fue diseada para usuarios bastante m疽 fuertes que los humanos. Arrodillarse puede ayudar a apuntar el arma, pero no a perfeccionar el tiro. Si algn oponente logra esquivar la lluvia de balas, sus caones pueden usarse como trituradoras para infringir dao.\n", + /*306*/ "Este reciente producto de dataDyne, cuenta con tecnologa muy interesante en su interior. El modo secundario activa un campo magn騁ico alrededor de la bomba, lo que le permite adherirse durante un limitado periodo de tiempo. Cuando ese tiempo pasa, la bomba cae, impacta y explota.\n", + /*307*/ "Es un compacto lanzamisiles reutilizable: recarga tras cada tiro. El modo secundario usa una variante del sistema de blancos de la metralleta CMP150. El misil viaja lentamente lo que le permite seguir al objetivo, as que tenlo en cuenta y planea tus disparos cuidadosamente.\n", + /*308*/ "Este lanzador port疸il de msiles Skedar puede disparar tanto cohetes sin gua, como por control remoto. A los Skedar les produce una perversa satisfaccin cuando la c疥ara se acerca al objetivo, pero un agente del IC est m疽 all de esas cosas. Los cohetes guiados aceleran autom疸icamente, pero pueden ser decelerados para m疽 maniobrabilidad. La detonacin ocurre por contacto o cuando se aprieta el gatillo.\n", + /*309*/ "Este cuchillo finamente pulido, est equilibrado para ser lanzado. La pr當tica es esencial para acostumbrarse al alcance y trayectoria de la hoja lanzada.\n", + /*310*/ "El departamento de armas experimentales ha creado este pequeo pero efectivo l疽er de mueca con dos diferentes rayos. El modo primario genera una explosin a gran distancia, mientras que el secundario provee de un rayo continuo hasta que el gatillo es soltado.\n", + /*311*/ "Cuatro segundos pasan desde la activacin a la detonacin de la granada de fragmentacin antipersonal en el modo b疽ico. Para tu deleite y entretenimiento, se ha incluido un modo secundario: pinball de proximidad. La granada rebotar hasta que la carga explote cuando su detector de proximidad se active.\n", + /*312*/ "Esta granada Maian hace estragos con las neuronas de las criaturas. Si caes en su radio de explosin, tu visin se volver borrosa y no podr疽 agarrar lo que lleves. La granada puede ser activada por lanzamiento o por proximidad. Asegrate de lanzarla cuando est駸 lo suficientemente lejos.\n", + /*313*/ "Se necesita bastante criterio para un uso efectivo de las minas de tiempo, de otro modo, la explosin no afectar al objetivo, y 駸te ir detr疽 tuyo. Mejorar tu habilidad en las pruebas evitar errores crticos. La funcin secundaria es un detector de trampas id駭tico al encontrado en el rifle de asalto Vengador K7.\n", + /*314*/ "La clave de la colocacin correcta de las minas de proximidad es situarlas donde tus oponentes no se esperen encontrarlas. Si t mismo no quieres tener problemas, usa el modo secundario de deteccin de trampas para asegurar tus alrededores. Puede que te haga perder el tiempo, pero si no es as, podr salvar tu vida.\n", + /*315*/ "La ltima variedad de minas remotas detonables, es esencialmente igual a las que ya tenas. El modo primario es poner las minas, mientras que el secundario es dar las rdenes de explosin. Si no puedes ver la mina, deber疽 confiar en el viejo m騁odo de prueba y error. \n", + /*316*/ "Holo 1 - Mirar alrededor\n", + /*317*/ "Holo 2 - Movimiento 1\n", + /*318*/ "Holo 3 - Movimiento 2\n", + /*319*/ "Holo 4 - Comb. sin armas 1\n", + /*320*/ "Holo 5 - Comb. sin armas 2\n", + /*321*/ "Holo 6 - Comb. Directo 1\n", + /*322*/ "Holo 7 - Comb. Directo 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/earE.c b/src/files/lang/jap-final/earE.c similarity index 100% rename from src/files/lang/earE.c rename to src/files/lang/jap-final/earE.c diff --git a/src/files/lang/jap-final/earJ.c b/src/files/lang/jap-final/earJ.c new file mode 100644 index 000000000..25bb029b8 --- /dev/null +++ b/src/files/lang/jap-final/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\n♂d゚≧ムマ刀メ♀ラ゚dヨヒ∀シぢ≫∩≒≠艪ヨヒマ縲マぅうマ繞怐諱コ≪÷ヵス♂d゚≧ムマ┨刀ソ≒おぁナ⇔セナ⊇∀メャソ∵⊆エ∨ツくぞぽモ謔モ£≠ネラ縺メマタ└∈チ≠、刀マツテナ∨∧⊂Åツニ≫∀刀モぽ∈トΡナ=テメ£≠ネラ縺ク翌ネτマゐツ√≒√≫≡⊂マ≠ロ∈ムマ♀ルマ縲dナ≡⊂∀ナ⇔⊇≫≒ナ⊇メÅツ\n\n|ヨヒマ縲マセ\n\n♀ラ゚dヨヒメ=諱コ≫ンラ゚dヨメ♀ミ∈ρェニ≫マモ=奄о゚マユ∈⊂ョャ∵⊆≫ツモミ∩≒モコ⊇λナμ∵ツぁト√⇔∪≪=ネ√モゆeメρΖ∈≠ア驕フナリ⊂♭⊆∽⊂ツ∧テメ∨¬マぽ≒メсァ∈mΠトヌ≫メÅツ⊇⊇∩≠ロ≒モクqrsÅツも♭べエ∨≪ニ≫テ∀メ∃⊇≡⊂ニΨ∈⇒ツ⇔チ√ツ♂d゚マユ∈り√≫∃≡=タエ∀⇒モÅツ\n\n|しじ操セヌキ゚Σレメ∈рщヌ≡\n\n♀ラ゚dヨヒマ≡√†=奄о゚≧ムマメxフ♭ヌキ゚Σレ∈ヨ⊇∨ルナ⊇ロd♀メ∵∃ト√⇔⊇≫∧⊂Åツヌキい℃∵゙⊇メ♭÷ユワ$ム∈エ⇔рщナ>メmф∀∃≫⌒メメ怎「∈腐磨ヌ≡ツ∃∪=テメロd♀メ艫ロ┰モメ=マ⊆≫≡⊂Åツ\n\n|しじ逐セラd蛟マ¥ハ縺クづて\n\nレd′ワモミメラd蛟マ¥ハ縺メ£∈ノハナ⇔÷ンヨフ窶ニロワ窶そぞ∈ヒトヌ≫メÅツテ√マ⇒⊇⇔⊇ツ†÷d=d♭吹ト√∨≦フメョчチヨ∀す∠テ∀∵♭タ≫♭⊆∽⊂ツ\n\n|しじ凍セ∨¬メсァ∈mΠヌ≡\n\nンラ゚d秩ぼ∝√⇔⊇≫сァ∵♂d゚マユメδい∈めナチこごナ⇔∪≪ゆeメ騾ハユd∵iヮハラメルd♀∈f栫タ∃⊇♭⊇≫ツ∧テマ⊇≫∨¬マсァ∈mΠナ⇔⌒≒⊂メÅツぉ∵浴煥сァ∈mΠニ≫テ∀⌒ぃいÅ∵÷ミdロワ窶∵ロてニ≫∵⊆≫死ツチ√∬√⌒∈べ∨∃⊇≡⊂マツ\n\n|しじ楳セсァmメミム窶∈みヌ≡\n\n♀ラ゚dヨヒメマ≡√†÷刀ヒメсァ£≠ネラ縺謔Τぞ∀∃エ⇔⊇≫∧⊂Åツ∧メ刀ヒメ£縲゚ム£∈みナ⇔÷ヨヒマ縲マぅうリ♭ぷ¬ヘエ⇔⌒≒⊇∨⊇ツ\n\n|しじ斧セ♀ラ゚dヨヒ∈νツ≡\n\nxフモ煤ヒメンヨフ窶ニ≦dママ∩√⇔∪≪=橿ラ゚dヨヒモテ√≒メ曹ニョメンラ゚d煤マ⊇≫ツンラ゚dマモ≠ァメ≡⊂マゥぃシチムニ≫∈閧ニ≫∨⊥メロワ窶∵tヮト√⇔⊇≫ツヒみマ∩∝ナ⇔くΒメンラ゚dマ⊇≫ぽ∈νツぁニメÅツ\n\nEND\n", + /* 1*/ "xフ―n", + /* 2*/ "|ワ竄пbhセ\n\n♂d゚≧ムマ刀メ♀ラ゚dヨヒ∀シぢ≫∩≒≠艪ヨヒマ縲マぅうマ繞怐諱コ≪÷ヵス♂d゚≧ムマ┨刀ソ≒おぁナ⇔セナ⊇∀メャソ∵⊆エ∨ツくぞぽモ謔モ£≠ネラ縺メマタ└∈チ≠、刀マツテナ∨∧⊂Åツニ≫∀刀モぽ∈トΡナ=テメ£≠ネラ縺ク翌ネτマゐツ√≒√≫≡⊂マ≠ロ∈ムマ♀ルマ縲dナ≡⊂∀ナ⇔⊇≫≒ナ⊇メÅツ\n\n|ヨヒマ縲マセ\n\n♀ラ゚dヨヒメ=諱コ≫ンラ゚dヨメ♀ミ∈ρェニ≫マモ=奄о゚マユ∈⊂ョャ∵⊆≫ツモミ∩≒モコ⊇λナμ∵ツぁト√⇔∪≪=ネ√モゆeメρΖ∈≠ア驕フナリ⊂♭⊆∽⊂ツ∧テメ∨¬マぽ≒メсァ∈mΠトヌ≫メÅツ⊇⊇∩≠ロ≒モクqrsÅツも♭べエ∨≪ニ≫テ∀メ∃⊇≡⊂ニΨ∈⇒ツ⇔チ√ツ♂d゚マユ∈り√≫∃≡=タエ∀⇒モÅツ\n\n|しじ操セヌキ゚Σレメ∈рщヌ≡\n\n♀ラ゚dヨヒマ≡√†=奄о゚≧ムマメxフ♭ヌキ゚Σレ∈ヨ⊇∨ルナ⊇ロd♀メ∵∃ト√⇔⊇≫∧⊂Åツヌキい℃∵゙⊇メ♭÷ユワ$ム∈エ⇔рщナ>メmф∀∃≫⌒メメ怎「∈腐磨ヌ≡ツ∃∪=テメロd♀メ艫ロ┰モメ=マ⊆≫≡⊂Åツ\n\n|しじ逐セラd蛟マ¥ハ縺クづて\n\nレd′ワモミメラd蛟マ¥ハ縺メ£∈ノハナ⇔÷ンヨフ窶ニロワ窶そぞ∈ヒトヌ≫メÅツテ√マ⇒⊇⇔⊇ツ†÷d=d♭吹ト√∨≦フメョчチヨ∀す∠テ∀∵♭タ≫♭⊆∽⊂ツ\n\n|しじ凍セ∨¬メсァ∈mΠヌ≡\n\nンラ゚d秩ぼ∝√⇔⊇≫сァ∵♂d゚マユメδい∈めナチこごナ⇔∪≪ゆeメ騾ハユd∵iヮハラメルd♀∈f栫タ∃⊇♭⊇≫ツ∧テマ⊇≫∨¬マсァ∈mΠナ⇔⌒≒⊂メÅツぉ∵浴煥сァ∈mΠニ≫テ∀⌒ぃいÅ∵÷ミdロワ窶∵ロてニ≫∵⊆≫死ツチ√∬√⌒∈べ∨∃⊇≡⊂マツ\n\n|しじ楳セ♀ラ゚dヨヒ∈νツ≡\n\nxフモ煤ヒメンヨフ窶ニ≦dママ∩√⇔∪≪=橿ラ゚dヨヒモテ√≒メ曹ニョメンラ゚d煤マ⊇≫ツンラ゚dマモ≠ァメ≡⊂マゥぃシチムニ≫∈閧ニ≫∨⊥メロワ窶∵tヮト√⇔⊇≫ツヒみマ∩∝ナ⇔くΒメンラ゚dマ⊇≫ぽ∈νツぁニメÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\n♂d゚≧ムマ刀メ♀ラ゚dヨヒ∀シぢ≫∩≒≠艪ヨヒマ縲マぅうマ繞怐諱コ≪÷ヵス♂d゚≧ムマ┨刀ソ≒おぁナ⇔セナ⊇∀メャソ∵⊆エ∨ツくぞぽモ謔モ£≠ネラ縺メマタ└∈チ≠、刀マツテナ∨∧⊂Åツニ≫∀刀モぽ∈トΡナ=テメ£≠ネラ縺ク翌ネτマゐツ√≒√≫≡⊂マ≠ロ∈ムマ♀ルマ縲dナ≡⊂∀ナ⇔⊇≫≒ナ⊇メÅツ\n\n|ヨヒマ縲マセ\n\n♀ラ゚dヨヒメ=諱コ≫ンラ゚dヨメ♀ミ∈ρェニ≫マモ=奄о゚マユ∈⊂ョャ∵⊆≫ツでmメモミ♭モ∨¬∵が∩сァ∈ナ⇔⊇≫≡⊂Å∵≠ロ≒モクqrsÅツも♭べエ∨≪ニ≫テ∀メ∃⊇≡⊂ニΨ∈⇒ツ⇔チ√ツ♂d゚マユ∈り√≫∃≡=タエ∀⇒モÅツ\n\n|しじ操セヌキ゚Σレメ∈рщヌ≡\n\n♀ラ゚dヨヒマ≡√†=奄о゚≧ムマメxフ♭ヌキ゚Σレ∈ヨ⊇∨ルナ⊇ロd♀メ∵∃ト√⇔⊇≫∧⊂Åツヌキい℃∵゙⊇メ♭÷ユワ$ム∈エ⇔рщナ>メmф∀∃≫⌒メメ怎「∈腐磨ヌ≡ツ∃∪=テメロd♀メ艫ロ┰モメ=マ⊆≫≡⊂Åツ\n\n|しじ逐セ♀ラ゚dヨヒ∈νツ≡\n\nxフモ煤ヒメンヨフ窶ニ≦dママ∩√⇔∪≪=橿ラ゚dヨヒモテ√≒メ曹ニョメンラ゚d煤マ⊇≫ツンラ゚dマモ≠ァメ≡⊂マゥぃシチムニ≫∈閧ニ≫∨⊥メロワ窶∵tヮト√⇔⊇≫ツヒみマ∩∝ナ⇔くΒメンラ゚dマ⊇≫ぽ∈νツぁニメÅツ\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "♀ラ゚dヨヒ∈νツ≡\n", + /* 10*/ "∨¬メсァ∈mΠヌ≡\n", + /* 11*/ "ラd蛟マ¥ハ縺クづて\n", + /* 12*/ "сァmメミム窶∈みヌ≡\n", + /* 13*/ "ヌキ゚Σレメ∈рщヌ≡\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "ラd蛟マ¥ハ縺クづてナ∨\n", + /* 16*/ "ラd蛟マ¥ハ縺メ£ノハ\n", + /* 17*/ "ンヨフ窶ニ♀ミメハラ∵fト√∨\n", + /* 18*/ "マ窶艢マワレムラ∈づてナ∨\n", + /* 19*/ "ラd蛟マレムラ∈づてナ∨\n", + /* 20*/ "てロあい準¥ハ縺メリル∵′≠d♭ニ\n", + /* 21*/ "ラd蛟マ¥ハ縺諢┏ナ∨\n", + /* 22*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 23*/ "ラd蛟マ¥ハ縺諢┏ナ∨\n", + /* 24*/ "しじん\n盾オじ∈♭タリヌ∋\n", + /* 25*/ "∪掾モ<栫タ\n", + /* 26*/ "クのはメマご∵ぁ∨\n", + /* 27*/ "ミβ∵δいナ⇔⊇リヌ∋\n", + /* 28*/ "ロワ窶∈ロヒハ縺メマナ∨\n", + /* 29*/ "сァ∵mΠト√∨\n", + /* 30*/ "ミdづて\n", + /* 31*/ "ミd┏\n", + /* 32*/ "べ∨∃⊇♭盾ゥ⊂テ∀モチ∩≒蚕n", + /* 33*/ "∪掾モ<煤メ=ckが∈∂エ⇔⊇≫∋Åタ\n", + /* 34*/ "≡∩∽⊂=セみ艨サナ≡⊂蚕n", + /* 35*/ "ニ∬マム゚ム浴マ⊆⊂エ\n", + /* 36*/ "ミランワレロ準ンヨフ窶ニルd♀∵ョャ\n", + /* 37*/ "$ワd♀∈レd烽項蚕n", + /* 38*/ "", + /* 39*/ "$ワd♀せどセハラ∈fナリニ\n", + /* 40*/ "ル轢ラロヘマモdセつ‡マラ∵ョャ\n", + /* 41*/ "ンヨフ窶ニ♀ミメハラモ\nよマfト√⇔⊇リニ\n", + /* 42*/ "сァモニ♭マmΠト√⇔⊇リニ\n", + /* 43*/ "∪∩ナ⊇∃タ遵сァ∵mΠト√⇔⊇≫\n", + /* 44*/ "栫ソ∵¥ラメゥ怐クぱナ∨ル∨⊇Å\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "艢ム縲ミム\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "艢ム縲ミム∈みマ√∨\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "艫ロロd♀\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "艫ロロd♀∈みマ√∨\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "♂d゚マユ\n", + /* 58*/ "♂d゚マユ\n", + /* 59*/ "♂d゚マユ∈みマ√∨\n", + /* 60*/ "ムだラリ蚕n", + /* 61*/ "マ窶艢マワ騾ハ焉諢ラ⊇∨\n", + /* 62*/ "マ窶艢マワ騾ハ焉モよマラ⊇⇔⊇リニ\n", + /* 63*/ "iエエ純コΞメヌキい∵ツぁト√⇔⊇リニ\n", + /* 64*/ "∪⊇≠ェ∈∂エ⇔≫∋Åタ\n", + /* 65*/ "ヨ÷ヨモに∨テ∀∃⊇蚕n", + /* 66*/ "ck∪掾モがÅタ\n", + /* 67*/ "сァ∈mΠナ⇔⌒≒⊂∝ツ\n", + /* 68*/ "トエト∀сァメ£∈メタ∃ト⊇エ\n", + /* 69*/ "сァメワムハ焉ク磨竅メ≡エ\n", + /* 70*/ "∝∩エ∨≠鴻ョニ≫≡蚕n", + /* 71*/ "bモ∂⊥⇔チ√蚕n", + /* 72*/ "∪エナオ≫ρ≪マ⊇∨ナリナキ⊂蚕n", + /* 73*/ "ヴメсァ∵エ\n", + /* 74*/ "ラ≒≦сァモmΠト√∨≡\n", + /* 75*/ "テテ∩≒ニ∬マぁ⇔⊇エ⇔チ√エ\n", + /* 76*/ "d♀マエ\n", + /* 77*/ "iヮワ∈ユ∋♭∂≫\n", + /* 78*/ "ム゚ム浴マ⊆⊂蚕n", + /* 79*/ "⊆√=テ∋∃モモタ\n", + /* 80*/ "⌒⊂┏ト√⇔⊇≫≡⊂Å\n", + /* 81*/ "テ√≠ェ∩宴ロナ∨タ\n", + /* 82*/ "栫ソ∵¥ラメゥ怐クぱナ∨ル∨⊇Å\n", + /* 83*/ "⊆√≦ミβ∵タ\n", + /* 84*/ "テメd≠マナ∂∵エ⇔エ\n", + /* 85*/ "ムだあい遵сァ∵リÅミラ窶ニ″♭ニツ\n", + /* 86*/ "сァミム窶早クみナ∨\n", + /* 87*/ "сァミム窶秩クみナ∨\n", + /* 88*/ "сァミム窶刀クみナ∨\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "ユワ$ム\n", + /* 92*/ "ユワ$ム\n", + /* 93*/ "ユワ$ム∈みマ√∨\n", + /* 94*/ "テテモく⌒iヮ∵∩∨⊇モミÅツ\n♀ラ゚dヨヒモぞチマ⊇≫マ⊇∃⊇ツ\n", + /* 95*/ "テメぞチメが∩∵\nニ黶サモ轢d∈エ⇔⊇≫∝\n", + /* 96*/ "ラd蛟マ¥ハ縺メ£∈ノハヌ≡ツ\n∧√♭ョヨ∀ぼツ≫モÅツ\n", + /* 97*/ "ヌキい℃∵゙ェ∫≫ツvマぁ∽エ\n≠ヘミマ艢÷ユワ$ム∈⊃ツ\n", + /* 98*/ "オカメネ#マメルマ$d縲マ縺諢ラ⊇∨\n", + /* 99*/ "wなに盾フ┸モハ∵ハラト√∨\n", + /*100*/ "♀ラ゚dヨヒタ\n", + /*101*/ "♀ラ゚dヨヒ=テテ♭ニ∩タ\n", + /*102*/ "⌒⊂≠磨マぁ⇔⌒θモヤ∩∃タ\n", + /*103*/ "⊃⊃=テメメwモュ⇔汲サツ∨∝ツ\n", + /*104*/ "¬キエ∀=コ=コ∃∨モ蚕n", + /*105*/ "トニ∵£メヤпモにпÅ∃エ\nニ∬マテテ∩≒ラ驕ホチ⇔モエ\n", + /*106*/ "ヴモユχ∃∈ぷエ⇔⊇≫ツ\nぼテ⊂=ナエ∩≪ぎエ⇔チ√≡エ\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/earP.c b/src/files/lang/jap-final/earP.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/jap-final/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_f.c b/src/files/lang/jap-final/ear_str_f.c new file mode 100644 index 000000000..e34e6c7d1 --- /dev/null +++ b/src/files/lang/jap-final/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - D駻outer cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les syst鑪es de s馗urit. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux ct駸 du robot pour ne pas subir de d馮穰s.\n\n|Objectif 3: - Arr黎er les exp駻iences\n\nLes exp駻iences des laboratoires du secteur 2 provoquent des interf駻ences avec nos communications, emp鹹hant nos pirates de briser le code de s馗urit. Forcez les scientifiques pr駸ents les interrompre. Vous pouvez vous risquer cette manoeuvre mais l'alarme se d馗lenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Obtenir 馗hantillons tech.\n\nDr. Caroll nous informe que trois autres projets majeurs sont sur le point d'黎re achev駸 dans les laboratoires voisins du sien. R馗up駻ez les prototypes des trois exp駻iences et rapportez-les l'Institut Carrington pour une 騁ude.\n\n|Objectif 5: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 1*/ "LABORATOIRE SOUTERRAIN\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - D駻outer cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les syst鑪es de s馗urit. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux ct駸 du robot pour ne pas subir de d馮穰s.\n\n|Objectif 3: - Arr黎er les exp駻iences\n\nLes exp駻iences des laboratoires du secteur 2 provoquent des interf駻ences avec nos communications, emp鹹hant nos pirates de briser le code de s馗urit. Forcez les scientifiques pr駸ents les interrompre. Vous pouvez vous risquer cette manoeuvre mais l'alarme se d馗lenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Trouver le Dr. Caroll\n", + /* 10*/ "Arr黎er les exp駻iences\n", + /* 11*/ "D駻outer cycle maintenance\n", + /* 12*/ "Obtenir 馗hantillons tech.\n", + /* 13*/ "Holographier l'isotope radioactif\n", + /* 14*/ "Effets sons m馗anisme.\n", + /* 15*/ "Robots de maintenance activ駸.\n", + /* 16*/ "Robots de maintenance reprogramm駸.\n", + /* 17*/ "Portes s馗urit d騅errouill馥s.\n", + /* 18*/ "Cycle de maintenance activ.\n", + /* 19*/ "Cycle nettoyage activ.\n", + /* 20*/ "Op駻ation refus馥 - robots occup駸.\n", + /* 21*/ "Robots de maintenance d駸activ駸.\n", + /* 22*/ "Objet crucial d騁ruit.\n", + /* 23*/ "Syst鑪e robots maintenance d駸activ.\n", + /* 24*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 25*/ "Qui 黎es-vous?\n", + /* 26*/ "Pertes inacceptables de scientifiques.\n", + /* 27*/ "Terminal inactif.\n", + /* 28*/ "Coupure des syst鑪es actifs.\n", + /* 29*/ "Exp駻ience interrompue.\n", + /* 30*/ "Alarme activ馥.\n", + /* 31*/ "Alarme d駸activ馥.\n", + /* 32*/ "Ne me tuez pas! Je vais vous aider.\n", + /* 33*/ "Qu'est-ce que vous foutez ici?\n", + /* 34*/ "Je vais vous aider...\n", + /* 35*/ "Zut alors. J'ai fait une b黎ise.\n", + /* 36*/ "ACCES REFUSE - code de s馗urit requis.\n", + /* 37*/ "Recherche mot de passe.\n", + /* 38*/ ".", + /* 39*/ "Mot de passe localis - d駻ivation serrure.\n", + /* 40*/ "Contact rompu - r騁ablissement connexion.\n", + /* 41*/ "Porte de s馗urit d駛 d騅errouill馥.\n", + /* 42*/ "Exp駻ience d駛 interrompue.\n", + /* 43*/ "Etrange - l'exp駻ience est d駛 arr黎馥!\n", + /* 44*/ "Quelqu'un a cass mon PC!\n", + /* 45*/ "Obtenir Vue nocturne.\n", + /* 46*/ "Cassandra De Vries: \n", + /* 47*/ "Vue nocturne\n", + /* 48*/ "Mallette de De Vries\n", + /* 49*/ "Vue nocturne obtenue.\n", + /* 50*/ "Obtenir objet de tech bouclier.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Objet de tech bouclier\n", + /* 53*/ "Mallette de De Vries\n", + /* 54*/ "objet de tech bouclier obtenu.\n", + /* 55*/ "Obtenir r馗epteur.\n", + /* 56*/ "\n", + /* 57*/ "R馗epteur\n", + /* 58*/ "Un r馗epteur\n", + /* 59*/ "R馗epteur obtenu.\n", + /* 60*/ "Connexion 騁ablie.\n", + /* 61*/ "Sas de maintenance ouvert.\n", + /* 62*/ "Sas de maintenance d駛 ouvert.\n", + /* 63*/ "ATTENTION - radioactivit d騁ect馥.\n", + /* 64*/ "Que faites-vous dans mon labo?\n", + /* 65*/ "Je ne vous connais pas...\n", + /* 66*/ "Vous 黎es qui, bordel?\n", + /* 67*/ "Arr黎ez l'exp駻ience.\n", + /* 68*/ "Eteignez-moi tout 軋. MAINTENANT!\n", + /* 69*/ "Coupez ce truc.\n", + /* 70*/ "Je vais l'騁eindre.\n", + /* 71*/ "Ne me faites pas de mal!\n", + /* 72*/ "Je vais vous aider.\n", + /* 73*/ "Mes exp駻iences!\n", + /* 74*/ "Voil. C'est 騁eint.\n", + /* 75*/ "Partez... TOUT DE SUITE!\n", + /* 76*/ "S馗urit!\n", + /* 77*/ "J'appelle la s馗urit.\n", + /* 78*/ "Oups. Je me suis tromp...\n", + /* 79*/ "Comment s'est arriv?\n", + /* 80*/ "C'est d駛 騁eint on dirait.\n", + /* 81*/ "Vous avez jou avec 軋, ou quoi?\n", + /* 82*/ "On a tout cass mon 駲uipement!\n", + /* 83*/ "Qu'est-il arriv mon terminal?\n", + /* 84*/ "Racaille, va! Tout est fichu!\n", + /* 85*/ "Connexion perdue - exp駻iences en cours.\n", + /* 86*/ "Objet exp駻imental 1 obtenu.\n", + /* 87*/ "Objet exp駻imental 2 obtenu.\n", + /* 88*/ "Objet exp駻imental 3 obtenu.\n", + /* 89*/ "Obtenir CamSpy.\n", + /* 90*/ "Dr. Caroll: \n", + /* 91*/ "CamSpy\n", + /* 92*/ "Une CamSpy\n", + /* 93*/ "CamSpy obtenue.\n", + /* 94*/ "C'est le secteur le plus prot馮 - Le Dr. Caroll \ndoit s'y trouver.\n", + /* 95*/ "Quelque chose dans les environs consomme beaucoup d'駭ergie.\n", + /* 96*/ "Reprogrammez ce robot de nettoyage - \nil vous fera entrer.\n", + /* 97*/ "Sortez, Joanna! La radioactivit est 駘ev馥. \nUtilisez la CamSpy.\n", + /* 98*/ "Compartiment armes secr鑼es ouvert.\n", + /* 99*/ "Ennemi d騁ect - coffre d'armes ferm.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, 黎es-vous ici?\n", + /*102*/ "Tout...tout danger est 馗art?\n", + /*103*/ "Oui. Tout va bien.\n", + /*104*/ "M...Mais... vous...\n", + /*105*/ "Belle manoeuvre, mon enfant. Il n'y a pas de\ntemps perdre. Nous devons partir!\n", + /*106*/ "Allons. J'ai des informations vitales \nr騅駘er et vous devez me prot馮er.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_g.c b/src/files/lang/jap-final/ear_str_g.c new file mode 100644 index 000000000..0628e05ce --- /dev/null +++ b/src/files/lang/jap-final/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgefhrt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelst wird. Auf keinen Fall drfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Bringen Sie die experimentellen Technologien in Ihren Besitz!\n\nDr. Caroll hat uns darber informiert, dass noch drei weitere Projekte kurz vor dem Abschluss stehen. Ihre Aufgabe ist es, die drei Prototypen zu finden und diese an das Carrington Institut zur Evaluierung zu bergeben. \n\n|5. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 1*/ "UNTERGRUND-LABOR\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgefhrt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelst wird. Auf keinen Fall drfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Finden Sie Dr. Caroll!\n", + /* 10*/ "Unterbrechen Sie alle Experimente!\n", + /* 11*/ "Starten Sie den Wartungszyklus!\n", + /* 12*/ "Finden Sie die technischen Experimente!\n", + /* 13*/ "Holografieren Sie die Isotope!\n", + /* 14*/ "Maschineller Soundeffekt\n", + /* 15*/ "Wartungsroboter aktiviert\n", + /* 16*/ "Wartungsroboter umprogrammiert\n", + /* 17*/ "Sicherheitstren entriegelt\n", + /* 18*/ "Wartungszyklus aktiviert\n", + /* 19*/ "Wartungszyklus-Routine aktiviert.\n", + /* 20*/ "Unerlaubte Operation - Roboter sind besch臟tigt.\n", + /* 21*/ "Wartungsroboter deaktiviert\n", + /* 22*/ "Wichtiges Objekt zerstrt\n", + /* 23*/ "Wartungssystem ist offline.\n", + /* 24*/ "MISSION FEHLGESCHLAGEN \n - Erreichung aller Ziele unmglich\n", + /* 25*/ "Wer sind Sie?\n", + /* 26*/ "Es sind unschuldige Wissenschaftler zu Schaden gekommen.\n", + /* 27*/ "Das Terminal ist nicht aktiv.\n", + /* 28*/ "Aktive Systeme werden heruntergefahren.\n", + /* 29*/ "Das Experiment wurde abgeschaltet.\n", + /* 30*/ "Alarm wurde aktiviert.\n", + /* 31*/ "Alarm wurde deaktiviert.\n", + /* 32*/ "Nicht schie゚en - Ich helfe Ihnen.\n", + /* 33*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 34*/ "Lassen Sie mich Ihnen helfen.\n", + /* 35*/ "Unf舁le passieren manchmal.\n", + /* 36*/ "ZUGRIFF VERWEIGERT - Sicherheitscode erforderlich.\n", + /* 37*/ "Passwort wird gesucht.\n", + /* 38*/ ".", + /* 39*/ "Passwort gefunden - Verriegelung wird umgangen.\n", + /* 40*/ "Kontakt abgebrochen - Link muss wiederhergestellt werden.\n", + /* 41*/ "Sicherheitstr wurde bereits entriegelt.\n", + /* 42*/ "Experiment wurde bereits abgeschaltet.\n", + /* 43*/ "Eigenartig - das Experiment ist bereits abgebrochen worden!\n", + /* 44*/ "Es sieht so aus, als h舩te jemand meinen PC besch臈igt.\n", + /* 45*/ "Erlangen Sie das Nachtsichtger舩.\n", + /* 46*/ "Cassandra De Vries\n", + /* 47*/ "Nachtsichtger舩\n", + /* 48*/ "Aktenkoffer von De Vries\n", + /* 49*/ "Nachtsichtger舩 aufgenommen\n", + /* 50*/ "Finden Sie den Prototypen.\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Prototyp\n", + /* 53*/ "De Vries Aktenkoffer\n", + /* 54*/ "Prototyp aufgenommen\n", + /* 55*/ "Finden sie das Data Uplink-Ger舩.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink-Ger舩\n", + /* 58*/ "Ein Data Uplink-Ger舩\n", + /* 59*/ "Data Uplink-Ger舩 aufgenommen\n", + /* 60*/ "Verbindung hergestellt\n", + /* 61*/ "Wartungsklappe wurde geffnet.\n", + /* 62*/ "Wartungsklappe ist bereits offen.\n", + /* 63*/ "WARNUNG - Radioaktive Substanz entdeckt!\n", + /* 64*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 65*/ "Ich habe Sie hier noch nie gesehen...\n", + /* 66*/ "Wer sind Sie, verdammt noch mal?\n", + /* 67*/ "Brechen Sie das Experiment ab!\n", + /* 68*/ "Ziehen Sie den Stecker raus, SOFORT!\n", + /* 69*/ "Schalten Sie das Ding ab!\n", + /* 70*/ "Ich schalte es ab.\n", + /* 71*/ "Bitte tun Sie mir nichts!\n", + /* 72*/ "Erlauben Sie mir, Ihnen zu helfen.\n", + /* 73*/ "Meine Experimente!\n", + /* 74*/ "Da! Das Experiment ist abgeschaltet!\n", + /* 75*/ "Verschwinden Sie von hier - SOFORT!\n", + /* 76*/ "Security!\n", + /* 77*/ "Ich alarmiere die Security.\n", + /* 78*/ "Unf舁le knnen passieren.\n", + /* 79*/ "Wie konnte das geschehen?\n", + /* 80*/ "Sieht so aus, als w舐e es bereits abgeschaltet.\n", + /* 81*/ "Haben Sie daran herumgefummelt?\n", + /* 82*/ "Jemand hat meine Ausrstung zerstrt!\n", + /* 83*/ "Was ist mit dem Terminal geschehen?\n", + /* 84*/ "Du Vandale - du hast es zerstrt!\n", + /* 85*/ "Verbindung abgebrochen - Experimente sind noch aktiv.\n", + /* 86*/ "Experimentelles Objekt Nr. 1 aufgenommen\n", + /* 87*/ "Experimentelles Objekt Nr. 2 aufgenommen\n", + /* 88*/ "Experimentelles Objekt Nr. 3 aufgenommen\n", + /* 89*/ "Finden Sie den CamSpy.\n", + /* 90*/ "Dr. Carolls\n", + /* 91*/ "CamSpy\n", + /* 92*/ "Ein CamSpy\n", + /* 93*/ "CamSpy aufgenommen\n", + /* 94*/ "Dies ist der Hochsicherheitssektor - Dr. Caroll \nmuss ganz nahe sein.\n", + /* 95*/ "Etwas in diesem Areal verbraucht extrem viel Strom.\n", + /* 96*/ "Programmieren Sie den Wartungsroboter um! \nMit seiner Hilfe kommen Sie weiter.\n", + /* 97*/ "Mach, dass du raus kommst, Jo! Die Strahlung ist zu stark. \nSetz den CamSpy ein.\n", + /* 98*/ "Geheimes Waffenschott geffnet\n", + /* 99*/ "Feind entdeckt - Waffenspeicher verriegelt\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, sind Sie da?\n", + /*102*/ "Ka... kann ich jetzt rauskommen?\n", + /*103*/ "Ja, Sie sind jetzt sicher.\n", + /*104*/ "Wa..was... Sie sind...\n", + /*105*/ "Sehr professionell, meine Liebe, aber wir \ndrfen keine Zeit verlieren! Wir mssen sofort hier raus!\n", + /*106*/ "Kommen Sie. Ich habe wichtige Informationen, und Sie \nmssen mich beschtzen!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_i.c b/src/files/lang/jap-final/ear_str_i.c new file mode 100644 index 000000000..69d4b19ce --- /dev/null +++ b/src/files/lang/jap-final/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ci ti permetter di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Procurati strumento tecnologico sperimentale\n\nIl Dr. Caroll ci ha informato della presenza di altri tre importanti progetti in fase di completamento nei laboratori di fianco al suo. Dovrai raccogliere i prototipi dei tre progetti e portarli al Carrington Institute per l'analisi.\n\n|Obiettivo 5: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 1*/ "LABORATORIO SOTTERRANEO\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ci ti permetter di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizza il Dr. Caroll\n", + /* 10*/ "Interrompi gli esperimenti\n", + /* 11*/ "Inizia manutenzione sistemi\n", + /* 12*/ "Procurati le tecnologie sperimentali\n", + /* 13*/ "Isotopo olografico radioattivo\n", + /* 14*/ "Effetti sonori macchine\n", + /* 15*/ "Attivati robot di manutenzione\n", + /* 16*/ "Riprogrammati robot di manutenzione\n", + /* 17*/ "Aperte porte di sicurezza\n", + /* 18*/ "Attivato ciclo di manutenzione\n", + /* 19*/ "Attivato ciclo di pulizia di routine\n", + /* 20*/ "Operazione impossibile: robot impegnati\n", + /* 21*/ "Disattivati robot di manutenzione\n", + /* 22*/ "Distrutto strumento essenziale alla missione\n", + /* 23*/ "Sistema robot di manutenzione non in linea\n", + /* 24*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 25*/ "Chi sei?\n", + /* 26*/ "Vittime inaccettabili: uccisi scienziati\n", + /* 27*/ "Terminale non attivo\n", + /* 28*/ "Spegnimento sistemi attivi...\n", + /* 29*/ "Interrotto esperimento\n", + /* 30*/ "Allarme attivato\n", + /* 31*/ "Allarme disattivato\n", + /* 32*/ "Non sparare! Ti aiuter!\n", + /* 33*/ "Cosa diavolo ci fai nel mio laboratorio?\n", + /* 34*/ "Ti dar una mano.\n", + /* 35*/ "Eh s! Succede...\n", + /* 36*/ "ACCESSO NEGATO: inserire codice di sicurezza\n", + /* 37*/ "Ricerca password in corso...\n", + /* 38*/ ".", + /* 39*/ "Trovata password: blocco eliminato\n", + /* 40*/ "Contatto interrotto: ristabilire connessione\n", + /* 41*/ "Porta di sicurezza gi aperta\n", + /* 42*/ "Esperimento gi interrotto\n", + /* 43*/ "Strano: l'esperimento gi chiuso!\n", + /* 44*/ "Qualcuno deve aver manomesso il mio PC!\n", + /* 45*/ "Procurati Vista Notturna\n", + /* 46*/ "Cassandra De Vries:\n", + /* 47*/ "Vista Notturna\n", + /* 48*/ "Cartella di De Vries\n", + /* 49*/ "Presa Vista Notturna\n", + /* 50*/ "Procurati strum. tecn. scudo\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Strum. tecn. scudo\n", + /* 53*/ "Cartella di De Vries\n", + /* 54*/ "Preso strum. tecn. scudo\n", + /* 55*/ "Procurati Connettore Dati.\n", + /* 56*/ "\n", + /* 57*/ "C. Dati\n", + /* 58*/ "Connettore Dati\n", + /* 59*/ "Preso Connettore Dati.\n", + /* 60*/ "Stabilita connessione\n", + /* 61*/ "Sportello di manutenzione aperto\n", + /* 62*/ "Sportello di manutenzione gi aperto\n", + /* 63*/ "ATTENZIONE! Materiale radioattivo!\n", + /* 64*/ "Cosa ci fai nel mio laboratorio?\n", + /* 65*/ "Non ti ho mai visto prima...\n", + /* 66*/ "Chi diavolo sei?\n", + /* 67*/ "Interrompi l'esperimento.\n", + /* 68*/ "Stacca la spina! SUBITO!\n", + /* 69*/ "Spegni quest'affare!\n", + /* 70*/ "Va bene! Lo chiudo!\n", + /* 71*/ "Non farmi del male!\n", + /* 72*/ "Lascia che t'aiuti.\n", + /* 73*/ "I miei esperimenti!\n", + /* 74*/ "Ecco, l'esperimento interrotto.\n", + /* 75*/ "Ora vattene! SUBITO!\n", + /* 76*/ "Sicurezza!\n", + /* 77*/ "Chiamer la sicurezza!\n", + /* 78*/ "Eh s! Succede...\n", + /* 79*/ "Com' potuto succedere?\n", + /* 80*/ "Sembra che sia gi spento!\n", + /* 81*/ "Ci hai messo le mani tu?\n", + /* 82*/ "Qualcuno ha manomesso la strumentazione!\n", + /* 83*/ "Cos' successo al terminale?\n", + /* 84*/ "L'hai rotto, maledizione!\n", + /* 85*/ "Connessione interrotta: esperimento ancora attivo\n", + /* 86*/ "Trovato strumento sperimentale 1\n", + /* 87*/ "Trovato strumento sperimentale 2\n", + /* 88*/ "Trovato strumento sperimentale 3\n", + /* 89*/ "Procurati TeleSpia.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "TeleSpia\n", + /* 93*/ "Presa la TeleSpia.\n", + /* 94*/ "Questo il principale settore di sicurezza: \nil Dr. Caroll non pu essere lontano.\n", + /* 95*/ "C' qualcosa che consuma un sacco qua!\n", + /* 96*/ "Riprogramma quella scatola di latta: \nti dar una mano ad entrare.\n", + /* 97*/ "Attenzione! I piani sono troppo alti.\n Usa la TeleSpia!\n", + /* 98*/ "Aperto compartimento armi segrete\n", + /* 99*/ "Intercettato nemico: bloccato compartimento armi.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, qui dentro?\n", + /*102*/ "Si pu uscire? Via libera?\n", + /*103*/ "S, nessun problema!\n", + /*104*/ "Che... cosa... lei ...\n", + /*105*/ "Molto professionale, mia cara, ma non c' \ntempo da perdere! Dobbiamo uscire subito di qui!\n", + /*106*/ "Andiamo! Sono a conoscenza di informazioni \ndi vitale importanza e tu devi proteggermi!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_s.c b/src/files/lang/jap-final/ear_str_s.c new file mode 100644 index 000000000..22dcf0736 --- /dev/null +++ b/src/files/lang/jap-final/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del 疵ea de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitir llegar m疽 lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios est疣 causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los cdigos de seguridad. Obliga a los cientficos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los cientficos.\n\n|Objetivo Cuatro: - Obtener Objetos de Tecnologa Experimental\n\nEl Dr. Caroll nos inform de que hay otros tres grandes proyectos a punto de ser terminados en los laboratorios adem疽 del suyo. Debes recoger los prototipos de los tres proyectos y traerlos al Instituto Carrington para su evaluacin.\n\n|Objetivo Cinco: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 1*/ "LABORATORIO DEL SOTANO\n", + /* 2*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del 疵ea de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitir llegar m疽 lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios est疣 causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los cdigos de seguridad. Obliga a los cientficos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los cientficos.\n\n|Objetivo Cuatro: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizar al Dr. Caroll\n", + /* 10*/ "Detener los experimentos\n", + /* 11*/ "Iniciar ciclo de mant. de seguridad\n", + /* 12*/ "Obtener experimentos tecnolgicos\n", + /* 13*/ "Holografiar istopos radioactivos\n", + /* 14*/ "Efectos de sonido Fx de maquinaria.\n", + /* 15*/ "Robots de mantenimiento activados.\n", + /* 16*/ "Robots de mantenimiento reprogramados.\n", + /* 17*/ "Puertas de seguridad desbloqueadas.\n", + /* 18*/ "Ciclo de mantenimiento activado.\n", + /* 19*/ "Rutina del ciclo de limpieza activada.\n", + /* 20*/ "Operacin no permitida: robots ocupados.\n", + /* 21*/ "Robots de mantenimiento desactivados.\n", + /* 22*/ "Objeto crtico de la misin destruido.\n", + /* 23*/ "Sistema de mantenimiento de robots apagado.\n", + /* 24*/ "MISIモN FALLADA:\n no se pueden completar los objetivos.\n", + /* 25*/ "ソQui駭 eres t?\n", + /* 26*/ "Bajas de cientficos inaceptables.\n", + /* 27*/ "El terminal no est activo.\n", + /* 28*/ "Quitando energa a los sistemas activos.\n", + /* 29*/ "El experimento ha sido detenido.\n", + /* 30*/ "Alarma activada.\n", + /* 31*/ "Alarma desactivada.\n", + /* 32*/ "No me dispares: te ayudar.\n", + /* 33*/ "ソQu demonios est疽 haciendo en mi laboratorio?\n", + /* 34*/ "D駛ame ayudarte.\n", + /* 35*/ "Pueden ocurrir accidentes.\n", + /* 36*/ "ACCESO DENEGADO - cdigo de seguridad requerido.\n", + /* 37*/ "Buscando el cdigo.\n", + /* 38*/ ".", + /* 39*/ "Cdigo localizado - abriendo cerradura.\n", + /* 40*/ "Contacto perdido - reestableciendo contacto.\n", + /* 41*/ "La puerta de seguridad ya ha sido abierta.\n", + /* 42*/ "El experimento ya ha sido apagado.\n", + /* 43*/ "。Qu extrao: el experimento ya est detenido!\n", + /* 44*/ "Parece que alguien ha roto mi PC.\n", + /* 45*/ "Obt駭 Visin Nocturna.\n", + /* 46*/ "Cassandra De Vries :\n", + /* 47*/ "V. Nocturna\n", + /* 48*/ "Maletn de De Vries\n", + /* 49*/ "Visin Nocturna obtenida.\n", + /* 50*/ "Obt駭 el escudo tecnolgico.\n", + /* 51*/ "Cassandra de Vries:\n", + /* 52*/ "Escudo tecnolgico\n", + /* 53*/ "Maletn de De Vries\n", + /* 54*/ "Escudo tecnolgico obtenido.\n", + /* 55*/ "Obt駭 Conector de Datos.\n", + /* 56*/ "\n", + /* 57*/ "C. Datos\n", + /* 58*/ "Un Conector de Datos\n", + /* 59*/ "Conector de Datos obtenido.\n", + /* 60*/ "Conexin establecida.\n", + /* 61*/ "La rejilla de mantenimiento est abierta.\n", + /* 62*/ "La rejilla de mantenimiento ya est abierta.\n", + /* 63*/ "PELIGRO - material radioactivo detectado.\n", + /* 64*/ "ソQu est疽 haciendo en mi laboratorio?\n", + /* 65*/ "No te he visto antes...\n", + /* 66*/ "ソQui駭 demonios eres?\n", + /* 67*/ "Det駭 el experimento.\n", + /* 68*/ "Tira del enchufe, AHORA.\n", + /* 69*/ "Apaga esa cosa.\n", + /* 70*/ "Lo apagar.\n", + /* 71*/ "Por favor, no me haga dao.\n", + /* 72*/ "D駛eme ayudarle.\n", + /* 73*/ "。Mi experimento!\n", + /* 74*/ "Ya, el experimento est detenido.\n", + /* 75*/ "。Deja este 疵ea AHORA!\n", + /* 76*/ "。Seguridad!\n", + /* 77*/ "Estoy avisando a seguridad.\n", + /* 78*/ "Pueden ocurrir accidentes.\n", + /* 79*/ "ソCmo pudo ocurrir?\n", + /* 80*/ "Parece que ya est apagado.\n", + /* 81*/ "ソHas estado tocando esto?\n", + /* 82*/ "Alguien ha roto mi equipo.\n", + /* 83*/ "ソQu le ha pasado al terminal?\n", + /* 84*/ "Cafre. Lo has roto.\n", + /* 85*/ "Conexin perdida: experimentos todava activos.\n", + /* 86*/ "Objeto experimental 1 obtenido.\n", + /* 87*/ "Objeto experimental 2 obtenido.\n", + /* 88*/ "Objeto experimental 3 obtenido.\n", + /* 89*/ "Obt駭 la C疥ara Espa.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "C疥ara Espa\n", + /* 92*/ "Una C疥ara Espa\n", + /* 93*/ "C疥ara Espa obtenida.\n", + /* 94*/ "ノste es el sector de mayor seguridad: el Dr. Caroll \ndebe estar cerca.\n", + /* 95*/ "Algo est usando mucha energa por aqu.\n", + /* 96*/ "Reprograma ese robot de limpieza: \nte permitir entrar.\n", + /* 97*/ "。Sal, Joanna! Los niveles son demasiado altos. \nUsa la C疥ara Espa.\n", + /* 98*/ "Compartimento de armas secreto abierto.\n", + /* 99*/ "Enemigo detectado: arsenal de armas cerrado.\n", + /*100*/ "ソDr. Caroll?\n", + /*101*/ "Dr. Caroll, ソest usted aqu?\n", + /*102*/ "Pero, ソes seguro salir?\n", + /*103*/ "S, todo despejado.\n", + /*104*/ "ソQu... qu... eres...?\n", + /*105*/ "。Muy profesional, querida, pero no hay tiempo \nque perder! 。Debemos irnos inmediatamente!\n", + /*106*/ "Vamos. Tengo informacin vital, y t \ndebes protegerme.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/eldE.c b/src/files/lang/jap-final/eldE.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/jap-final/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eldJ.c b/src/files/lang/jap-final/eldJ.c new file mode 100644 index 000000000..3e706153a --- /dev/null +++ b/src/files/lang/jap-final/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\n≧蛟モヨヒマ縲マ∵<ヨマラリmマ♂d゚≧ムマメηべyマ∪∧∝√>アレマロ≒∝√⇔ナリエ∨ツ♂d゚≧ムマメユレマ♀∩≒ワ⊇∨ハンd≠マ≡√†÷ヨヒマ縲マメ驕諷ンナツ√†=橿ラ゚dヨヒ∀ユ†√⇔⊇≫噫「∈テ¬≒マヶニ≡⊂マ∀メテ∀Åツ♂d゚≧ムマ┫モリÅΨ♯⊇⇔⊇∃⊇∵≦пモ∧メ♀ラ゚dヨヒモ<ヘリ瘁焉諷cネナ⇔⊇≫ヨメmマ⊇≫メÅツ∪∧≒チ瘁焉マに⇒∩≫掾マ÷ヨヒマ縲マ∵φュ∃リ轣マ゙ナ∨⌒メ∀━∝√≫ツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|しじ操セワ艢ム$d∈ュ⇔ほヌ\n\nユレマ♀∩≒メ瘁クゐツ宦エ∨Β=ニ∬マゆeモヨメヒεマрщy∈えエ∨ツぽ≒∩≒メマ≡≪≦゚焉メヒマワ艢ム$d∨¬∵tヮト√⇔⊇≫テ∀∵∝∩エ∨ツしじメぼ∈φュマぼ⊂∨⊥マモ=リ瘁焉ク汲サツ⇔∪チョャ∵⊆≫ツ\n\n|しじ逐セ竄bネλロワ窶∈ぴтヌ≡\n\nヨメ繝ノbυ♭⊆≫竄bネλロワ窶∵<ヘリロてナ⇔⊇∃⊇ツ♂d゚≧ムマ∵ヨメルマ¢フd゚ロワ窶マミランワニ≫メ∈栫閨ノ⊥÷ヨヒマ縲マ∵浴烙ロヒハ縺メマナ∨⌒メ∀━∝√≫ツλb∵ぴтニ√†≠フメョメ♀ミ∵ラチÅ∽⊂ツ\n\n|しじ凍セ騾ハヨマ∈┃┏ヌ≡\n\nテ√リ♭⌒♂d゚≧ムマメ騾ハユd∨¬モ÷ヨヒマ縲マぅうメナムマミランワナ≡⊂∀≦狽∃艨ル∈ぼエ⇔タ∨ツヨnメゥ怐ヘヨヒマ縲マぅうメロワ窶モ蜈ム⇒∃∵エ⇔⊇≫メ♭=テテ♭∃≒騾ハヨマ⌒蜈諱⊆∽⊂ツ⌒ナ瘁焉諱ネメ≡⊂∃ぼ轣マぁ∨リホモ≠ァモロ⊇♭ナ∃チ⇔モ∃≒∃⊇ツゥ怐マモゆeメχャ∃♂d゚⌒チ⊥≒√⇔⊇≫メ♭≠ホ閨ナ∃⊇≡⊂マ┛Χ∵ョャÅツ\n\n|しじ楳セwワ∈ロ≒⊃∽\n\n♂d゚≧ムマメηべy∈ロ≒⊃≫テ∀マΤ┯ニ√†÷瘁焉メへ⊇∵が♭⊆≫∩∈タぁニテ∀∵ぃいÅ∽⊂ツ瘁焉メc┳∈Ψ驟黶トヌ≦ロ≒⊃≫メÅツ\n\n|しじ斧セヨヒマ縲マ∈おぁヌ≡\n\nヨヒマ縲マÅツ∵=橿ラ゚dヨヒメ辣リ∈ナエ⇔⊇≫ツ♂d゚≧ムマ⌒⊇√モテメπマΨ♯⊇⇔÷ヨヒマ縲ママ∧メ∈∩ヌ≡⊂∀=コ≒∇≫みσ∈エ⇔チ≫Å∽⊂ツ♀ラ゚dヨヒメ諠潟轣諱朽∨ンπ♭÷ヨヒマ縲マメ驕モ゚∝√⇔ナリ⊂∩⌒ナ√∃⊇メÅツ\n\nEND\n", + /* 1*/ "ヨヒマ縲マメヨ\n\n", + /* 2*/ "|ワ竄пbhセ\n\n≧蛟モヨヒマ縲マ∵<ヨマラリmマ♂d゚≧ムマメηべyマ∪∧∝√>アレマロ≒∝√⇔ナリエ∨ツ♂d゚≧ムマメユレマ♀∩≒ワ⊇∨ハンd≠マ≡√†÷ヨヒマ縲マメ驕諷ンナツ√†=橿ラ゚dヨヒ∀ユ†√⇔⊇≫噫「∈テ¬≒マヶニ≡⊂マ∀メテ∀Åツ♂d゚≧ムマ┫モリÅΨ♯⊇⇔⊇∃⊇∵≦пモ∧メ♀ラ゚dヨヒモ<ヘリ瘁焉諷cネナ⇔⊇≫ヨメmマ⊇≫メÅツ∪∧≒チ瘁焉マに⇒∩≫掾マ÷ヨヒマ縲マ∵φュ∃リ轣マ゙ナ∨⌒メ∀━∝√≫ツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|しじ操セヤ縲マ∃エ∨┻ぶ∈お⊃\n\nヨヒマ縲マぅうメワ゚ハ∵≠ァ∵蜈諱マム♭タ≫≡⊂マ÷ヤ縲マ∃エ⇔⊇∨ツナ∩ナぽまモヵリトマ♂d゚≧ムマメワy∨¬マへべト√≡⊂∀ナ⇔⊇≫ツニ∬マ∧メワy♪⌒∈へべニ≫メÅツロ騾エ\n\n|しじ逐セワ艢ム$d∈ュ⇔ほヌ\n\nユレマ♀∩≒メ瘁クゐツ宦エ∨Β=ニ∬マゆeモヨメヒεマрщy∈えエ∨ツぽ≒∩≒メマ≡≪≦゚焉メヒマワ艢ム$d∨¬∵tヮト√⇔⊇≫テ∀∵∝∩エ∨ツしじメぼ∈φュマぼ⊂∨⊥マモ=リ瘁焉ク汲サツ⇔∪チョャ∵⊆≫ツ\n\n|しじ凍セ竄bネλロワ窶∈ぴтヌ≡\n\nヨメ繝ノbυ♭⊆≫竄bネλロワ窶∵<ヘリロてナ⇔⊇∃⊇ツ♂d゚≧ムマ∵ヨメルマ¢フd゚ロワ窶マミランワニ≫メ∈栫閨ノ⊥÷ヨヒマ縲マ∵浴烙ロヒハ縺メマナ∨⌒メ∀━∝√≫ツλb∵ぴтニ√†≠フメョメ♀ミ∵ラチÅ∽⊂ツ\n\n|しじ楳セヨヒマ縲マ∈おぁヌ≡\n\nヨヒマ縲マÅツ∵=橿ラ゚dヨヒメ辣リ∈ナエ⇔⊇≫ツ♂d゚≧ムマ⌒⊇√モテメπマΨ♯⊇⇔÷ヨヒマ縲ママ∧メ∈∩ヌ≡⊂∀=コ≒∇≫みσ∈エ⇔チ≫Å∽⊂ツ♀ラ゚dヨヒメ諠潟轣諱朽∨ンπ♭÷ヨヒマ縲マメ驕モ゚∝√⇔ナリ⊂∩⌒ナ√∃⊇メÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\n≧蛟モヨヒマ縲マ∵<ヨマラリmマ♂d゚≧ムマメηべyマ∪∧∝√>アレマロ≒∝√⇔ナリエ∨ツ♂d゚≧ムマメユレマ♀∩≒ワ⊇∨ハンd≠マ≡√†÷ヨヒマ縲マメ驕諷ンナツ√†=橿ラ゚dヨヒ∀ユ†√⇔⊇≫噫「∈テ¬≒マヶニ≡⊂マ∀メテ∀Åツ♂d゚≧ムマ┫モリÅΨ♯⊇⇔⊇∃⊇∵≦пモ∧メ♀ラ゚dヨヒモ<ヘリ瘁焉諷cネナ⇔⊇≫ヨメmマ⊇≫メÅツ∪∧≒チ瘁焉マに⇒∩≫掾マ÷ヨヒマ縲マ∵φュ∃リ轣マ゙ナ∨⌒メ∀━∝√≫ツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|しじ操セヤ縲マ∃エ∨┻ぶ∈お⊃\n\nヨヒマ縲マぅうメワ゚ハ∵≠ァ∵蜈諱マム♭タ≫≡⊂マ÷ヤ縲マ∃エ⇔⊇∨ツナ∩ナぽまモヵリトマ♂d゚≧ムマメワy∨¬マへべト√≡⊂∀ナ⇔⊇≫ツニ∬マ∧メワy♪⌒∈へべニ≫メÅツロ騾エ\n\n|しじ逐セ竄bネλロワ窶∈ぴтヌ≡\n\nヨメ繝ノbυ♭⊆≫竄bネλロワ窶∵<ヘリロてナ⇔⊇∃⊇ツ♂d゚≧ムマ∵ヨメルマ¢フd゚ロワ窶マミランワニ≫メ∈栫閨ノ⊥÷ヨヒマ縲マ∵浴烙ロヒハ縺メマナ∨⌒メ∀━∝√≫ツλb∵ぴтニ√†≠フメョメ♀ミ∵ラチÅ∽⊂ツ\n\n|しじ凍セヨヒマ縲マ∈おぁヌ≡\n\nヨヒマ縲マÅツ∵=橿ラ゚dヨヒメ辣リ∈ナエ⇔⊇≫ツ♂d゚≧ムマ⌒⊇√モテメπマΨ♯⊇⇔÷ヨヒマ縲ママ∧メ∈∩ヌ≡⊂∀=コ≒∇≫みσ∈エ⇔チ≫Å∽⊂ツ♀ラ゚dヨヒメ諠潟轣諱朽∨ンπ♭÷ヨヒマ縲マメ驕モ゚∝√⇔ナリ⊂∩⌒ナ√∃⊇メÅツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ヤ縲マ∃エ∨┻ぶ∈お⊃\n", + /* 6*/ "ワ艢ム$d∈ュ⇔ほヌ\n", + /* 7*/ "竄bネλロワ窶∈ぴтヌ≡\n", + /* 8*/ "騾ハヨマ∈┃┏ヌ≡\n", + /* 9*/ "ヨヒマ縲マ∈おぁヌ≡\n", + /* 10*/ "wワ∈ロ≒⊃∽\n", + /* 11*/ "ヤ縲マ∃エ⇔⊇∨┻ぶ∵ほト√∨\n", + /* 12*/ "ワ艢ム$d∈ュ⇔ほナ∨\n", + /* 13*/ "ヤ縲マ∃エ⇔⊇∨┻ぶ∵シпマむィナ∨\n", + /* 14*/ "ロワ窶∵づて\n", + /* 15*/ "ロワ窶∵ロヒハ縺メマ\n", + /* 16*/ "なλロワ窶∵づて\n", + /* 17*/ "なλロワ窶∵ロヒハ縺メマ\n", + /* 18*/ "竇浴謔ツ‡てタリ⊥∨\n", + /* 19*/ "竇浴諢ャ⊥≒√∨\n", + /* 20*/ "ヨマλb∵ぴтナ∨\n", + /* 21*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 22*/ "≠ヘミマ艢÷騾ハユd∵ムナ⇔⊇≫エ\n瘁焉諱奄о゚∈みニ≫掾マほニ∋Åエ\n", + /* 23*/ "騾ハユd∵騾ハヨマ∈ナ∨\n", + /* 24*/ "騾ハユd∈ほナ∨\n", + /* 25*/ "ヨヒマ縲マメおν\n", + /* 26*/ "しじん純⇔メしじ∈ニ≫テ∀∵♭タリヌ∋\n", + /* 27*/ "ハ£縲ハ£マ\n", + /* 28*/ "ャム\n", + /* 29*/ "wワ∈ロ≒⊃∨\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "♀ミヨd\n", + /* 33*/ "♀ミヨd\n", + /* 34*/ "♀ミヨd∈みマ√∨\n", + /* 35*/ "竄bネλロワ窶∈ぴтニ√†―nxフヨメλb∵ト√≫∋Åエ∨∝ムツ\n", + /* 36*/ "ロ∵∃タオ>ウぶ∵ほト√⇔ナリ⊂∝\n", + /* 37*/ "タエ∀テテマ¥ワモトΡト√⇔⊇≫メムツ\n", + /* 38*/ "ヨヒマ縲マ∈νツ≫掾マ÷騾ハユd♪⌒∈\n汲サツ∃チ¬オツ\n", + /* 39*/ "操楳摩ハロヘマ腐摩ツ\nスユレマ♀∩≒λΑ∵⊆エ∨ツ\np♂d゚≧ムマ刀モ―n¥ワメヨマ縺ナエ∨ツ\np瘁焉モ=準ワ∈┳レマ宦痼―n♀ラ゚dヨヒ∈ャナ∨ツ\n", + /* 40*/ "♀ラ゚dヨヒモ¥ワ∀\ncマヨマ諱ノモ♭⊆≫ツ\np¥ワ∵ヨメ♪テ∩マぽ∈゙ナ\nリÅ÷瘁焉マΨ♯∩√⇔∃⊇≡⊂Åツ\n", + /* 41*/ "ぅうモ≦マ≫∈ナ∃∵≒\nヨヨムニ≫ロq∈∀エ⇔⊇≫ツ\npヵぴ<マト≒ト√⇔⊇≫メモ\nヴメ驕ツ♭モ∃⊇蚕n", + /* 42*/ "¥ワ÷リモ∃⊇♭ニ∩タ\n", + /* 43*/ "⊆ッツナ∩ナ♀ラ゚dヨヒ∵\n縺繝≒√⇔ナリエ∨ツ\np⌒⊂ォナメ\nぷ¬テ∨⊃≒√√†蚕n", + /* 44*/ "¥ワメヌ⊇♭モ∃⊇∝ツ\n⌒エ∀レチヰ≫タÅエ∨ツ\n", + /* 45*/ "翼∈⊥≫ョャモ∃⊇ツ\n♀ラ゚dヨヒ⌒\np掾ソ≒ヴマiナ⇔⊇∨ツ\npナ∩ナ瘁烙<煤諠オナ⇔⊇≫∀━⊇\nユχ∃∈℃℃ナオ≪∪エ∨ツ\npヵス÷ロユ÷メ普劇♭\nオカメうテ∵⊆≫≒ナ⊇ツ\npη♭噤サ∵<蛛ハマ\n∧テヨユ∩エ⇔チ√ツ\n", + /* 46*/ "f=準ワツ♀ラ゚dヨヒモ\nが∩⇒∈ぷエ⇔⊇∨メタ\n", + /* 47*/ "⊆ッ=ワ¬∽∋Åツぉ∵ロユ÷マぼチ凾香\n∧√∈ゎナ⇔⊇テ⊂ツ∧√≡≪蚕np瘁焉モ≠ロメ┳氏クヱニニヌ≒ナ⊇ツ\n°ハラミハ£モぜるナ⇔∪チ∧⊂Åツ\npト⇔∀÷瘁焉ヘスニ≫∨⊥マ\n∧∽∧∽マ♀メνツ∵ョャ∩死ツ\n", + /* 48*/ "ロэレロ遵竇浴謔ト⊇⇔⊇リニ\n", + /* 49*/ "しじん盾翼潤諷ロ≒⊃≒√リヌ∋♭ナ∨\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eldP.c b/src/files/lang/jap-final/eldP.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/jap-final/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_f.c b/src/files/lang/jap-final/eld_str_f.c new file mode 100644 index 000000000..85e9682a3 --- /dev/null +++ b/src/files/lang/jap-final/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Eliminer les snipers du toit\n\nApr鑚 avoir re輹 la demande de ran輟n, nous avons effectu un vol de reconnaissance au-dessus de la villa. Nos prises de vues r騅鑞ent la pr駸ence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les 駘iminer.\n\n|Objectif 2: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Trouver et neutraliser les pirates\n\nA de nombreuses reprises, les hackers de la dataDyne ont tent de pirater les fichiers de l'Institut. Leur t稍he sera plus facile s'ils interviennent directement dans la villa. S'ils lancent une telle op駻ation, vous devrez agir promptement. Assurez-vous aussi que les terminaux contenant des donn馥s vitales pour l'Institut ne sont pas endommag駸.\n\n|Objectif 4: - Capturer un garde ennemi\n\nCapturer un membre de l'駲uipe d'assaut de la dataDyne nous donnerait une id馥 de leurs plans. Surtout ne le tuez pas: assommez-le si vous le pouvez, ainsi il ne pourra pas s'馗happer.\n\n|Objectif 5: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la n馮ociatrice\n\nUn membre de l'Institut s'est port volontaire pour cr馥r une diversion pendant votre entr馥 sur les lieux. Elle sera tr鑚 certainement execut馥 par les soldats de la dataDyne si vous ne la tirez pas de l tr鑚 rapidement. D駱lacez-vous en rampant.\n\n|Objectif 2: - Eliminer les snipers du toit\n\nApr鑚 avoir re輹 la demande de ran輟n, nous avons effectu un vol de reconnaissance au-dessus de la villa. Nos prises de vues r騅鑞ent la pr駸ence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les 駘iminer.\n\n|Objectif 3: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 4: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la n馮ociatrice\n\nUn membre de l'Institut s'est port volontaire pour cr馥r une diversion pendant votre entr馥 sur les lieux. Elle sera tr鑚 certainement execut馥 par les soldats de la dataDyne si vous ne la tirez pas de l tr鑚 rapidement. D駱lacez-vous en rampant.\n\n|Objectif 2: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Sauver la n馮ociatrice\n", + /* 6*/ "Eliminer les snipers du toit\n", + /* 7*/ "Activer l'駮lienne\n", + /* 8*/ "Trouver et neutraliser les pirates\n", + /* 9*/ "Sauver Carrington\n", + /* 10*/ "Capturer un garde ennemi\n", + /* 11*/ "N馮ociatrice abattue.\n", + /* 12*/ "Snipers 駘imin駸.\n", + /* 13*/ "N馮ociatrice en s馗urit.\n", + /* 14*/ "Refroidisseurs activ駸.\n", + /* 15*/ "Refroidisseurs d駸activ駸.\n", + /* 16*/ "G駭駻ateurs activ駸.\n", + /* 17*/ "G駭駻ateurs d駸activ駸.\n", + /* 18*/ "Eolienne r饌ctiv馥.\n", + /* 19*/ "Eolienne d駸activ馥.\n", + /* 20*/ "Courant r騁abli dans la villa.\n", + /* 21*/ "Objet crucial d騁ruit.\n", + /* 22*/ "Joanna! C'est Grimshaw. Il y a des hackers dans \nla villa! Arr黎ez-les avant\n qu'ils ne piratent nos fichiers!\n", + /* 23*/ "Les hackers ont copi les fichiers vitaux.\n", + /* 24*/ "Hackers 駘imin駸.\n", + /* 25*/ "Carrington sauv.\n", + /* 26*/ "Objectifs incomplets - mission 馗hou馥.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Fusil sniper\n", + /* 29*/ "Garde ennemi enlev.\n", + /* 30*/ "Obtenir cl de porte.\n", + /* 31*/ "Garde: \n", + /* 32*/ "Cl de porte\n", + /* 33*/ "Cl de porte\n", + /* 34*/ "Cl de porte obtenue.\n", + /* 35*/ "Si je r饌ctive l'駮lienne, je pourrai \nr騁ablir le courant dans le sous-sol.\n", + /* 36*/ "Je dois faire vite ou ils tueront la \nn馮ociatrice!\n", + /* 37*/ "Ils doivent garder Daniel ici.\n", + /* 38*/ "Je dois arr黎er les hackers avant de \nsauver Daniel.\n", + /* 39*/ "Journal de mission de l'agent Dark, 18:46. \nNous avons re輹 un appel de Cassandra de Vries hier soir. \nUne 駲uipe de la dataDyne retient Daniel Carrington \nen otage dans sa villa priv馥 sur la cte, \net 駱argnera sa vie en 馗hange de l'IA.\n", + /* 40*/ "Malheureusement, nous ne l'avons pas. Daniel et \nle Dr. Caroll 騁aient tous deux dans la villa \npour un 'arrangement'. Il semblerait que \nDaniel ait pu dissimuler le Dr. Caroll dans la \nvilla lors de l'arriv馥 des troupes de la \ndataDyne.\n", + /* 41*/ "Par chance notre ruse 'de la n馮ociatrice' \nme donnera l'occasion de surprendre les \nsoldats de la dataDyne. Cette fois il ne \ns'agit pas que de ma propre vie.\n", + /* 42*/ "Monsieur? Etes-vous bless?\n", + /* 43*/ "Non, Joanna. Je vais bien. Mais ces \nordures de la dataDyne m'ont fait dire \no se trouvait le Dr. Caroll. Si seulement \nj'avais pu tenir une minute de plus...\n", + /* 44*/ "Ce n'est pas de votre faute. J'aurais d \nfaire plus vite.\n", + /* 45*/ "Le Dr. Caroll m'a confi qu'il s'attendait \n une telle action. De plus, les hommes \nde la dataDyne, fiers de leur succ鑚, \nont discut alors que je faisais semblant \nd'黎re inconscient. Ils ont mentionn une \nrencontre dans l'immeuble G5 de Chicago, \nen Illinois, ce soir. Vous devez vous y \nrendre, bien qu'il ne vous reste que \npeu de temps pour vous pr駱arer.\n", + /* 46*/ "Aucun probl鑪e, monsieur. Le Dr. Caroll \na-t-il pu vous r騅駘er des informations \nimportantes?\n", + /* 47*/ "En effet, tr鑚 importantes. \nJe vous brieferai sur la route de \nChicago. Nous pourrons peut-黎re encore \nl'aider, m麥e si ces sadiques lui enl钁ent \nsa personnalit. Il veulent en garder \nune sauvegarde l'abri. Il est \nenfin temps que j'appelle certains amis \npour s'occuper de la dataDyne.\n", + /* 48*/ "Op駻ation refus馥 - 駮lienne active.\n", + /* 49*/ "Mission 馗hou馥 - garde ennemi non captur.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_g.c b/src/files/lang/jap-final/eld_str_g.c new file mode 100644 index 000000000..be60715cc --- /dev/null +++ b/src/files/lang/jap-final/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Eliminieren Sie die Scharfschtzen auf dem Dach!\n\nGleich nachdem wir die Forderungen bermittelt bekommen haben, wurde von uns ein Aufkl舐ungsflug ber der Villa durchgefhrt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschtzen auf den D臘hern positioniert wurden. Es ist von hchster Notwendigkeit, diese Schtzen zu eliminieren.\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Finden und stoppen Sie die dataDyne-Hacker!\n\nIn der Vergangenheit hat es sporadische Versuche von dataDyne-Hackern gegeben, Zugriff auf die Daten des Instituts zu erhalten. Es wrde ihre Arbeit stark vereinfachen, wenn sie in der Villa auf die Direktverbindung zum Institut zugreifen knnten. Sollte dies der Fall sein, mssen Sie rasch reagieren. Achten Sie allerdings darauf, dass die Terminals nicht besch臈igt werden drfen, da sonst das Institut Daten der Priorit舩sstufe 1 verliert.\n\n|4. Ziel: - Nehmen Sie eine Wache gefangen!\n\nDie Gefangennahme eines Mitglieds der dataDyne-Truppe verschafft uns Einblick in ihre tats臘hlichen Vorhaben. Sie drfen diese Wachen nicht eliminieren, sondern nur bewusstlos schlagen. Dadurch verhindern Sie auch eine Flucht.\n\n|5. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Retten Sie die Unterh舅dlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Eliminieren Sie die Scharfschtzen auf dem Dach!\n\nGleich nachdem wir die Forderungen bermittelt bekommen haben, wurde von uns ein Aufkl舐ungsflug ber der Villa durchgefhrt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschtzen auf den D臘hern positioniert wurden. Es ist von hchster Notwendigkeit, diese Schtzen zu eliminieren.\n\n|3. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|4. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Retten Sie die Unterh舅dlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Retten Sie die Unterh舅dlerin!\n", + /* 6*/ "Eliminieren Sie die Scharfschtzen!\n", + /* 7*/ "Aktivieren Sie den Generator!\n", + /* 8*/ "Stoppen Sie die Hacker!\n", + /* 9*/ "Retten Sie Carrington!\n", + /* 10*/ "Nehmen Sie eine Wache gefangen!\n", + /* 11*/ "Die Unterh舅dlerin wurde verloren.\n", + /* 12*/ "Die Scharfschtzen wurden eliminiert.\n", + /* 13*/ "Die Unterh舅dlerin konnte sich in Sicherheit bringen.\n", + /* 14*/ "Khlsysteme wurden aktiviert.\n", + /* 15*/ "Khlsysteme wurden deaktiviert.\n", + /* 16*/ "Stromversorgung wurde aktiviert.\n", + /* 17*/ "Stromversorgung wurde deaktiviert.\n", + /* 18*/ "Windmhle wurde aktiviert.\n", + /* 19*/ "Windmhle wurde deaktiviert.\n", + /* 20*/ "Die Stromversorgung der Villa wurde wiederhergestellt.\n", + /* 21*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 22*/ "Joanna! Hier spricht Grimshaw. In der Villa befinden \n sich Hacker! Sie mssen Sie aufhalten, \n bevor sie an unsere Daten gelangen!\n", + /* 23*/ "Die Hacker haben geheime Daten kopiert.\n", + /* 24*/ "Die Hacker wurden eliminiert.\n", + /* 25*/ "Carrington wurde gerettet.\n", + /* 26*/ "Es wurden nicht alle Ziele erreicht - die Mission ist fehlgeschlagen.\n", + /* 27*/ "Laptop-Gewehr\n", + /* 28*/ "Sniper-Gewehr\n", + /* 29*/ "Feindliche Wache wurde kampfunf臧ig gemacht.\n", + /* 30*/ "Finden Sie den Schlssel!\n", + /* 31*/ "Schlssel\n", + /* 32*/ "der Wache\n", + /* 33*/ "Schlssel\n", + /* 34*/ "Schlssel aufgenommen\n", + /* 35*/ "Wenn ich den Windkraft-Generator aktiviere, \nsteht auch die Stromversorgung im Keller wieder.\n", + /* 36*/ "Ich muss schnell sein, oder der Unterh舅dler \nist verloren!\n", + /* 37*/ "Hier mssen sie Daniel gefangenhalten.\n", + /* 38*/ "Bevor ich Daniel rette, mssen diese Hacker \ngestoppt werden.\n", + /* 39*/ "Agent Dark Missions-Logbuch, 18.46 Uhr. Letzte \nNacht erhielten wir einen Anruf von Cassandra de Vries. \nEin dataDyne-Trupp hat Daniel Carrington \nin seiner Villa an der Kste als Geisel genommen. \nSie sagen, dass sie sein Leben im Austausch \nfr die KI schonen werden.\n", + /* 40*/ "Unglcklicherweise haben wir die KI nicht. Daniel und \nDr. Caroll waren in der Villa, um 'Themen von \nbeiderseitigem Interesse' zu besprechen. Es sieht \nso aus, als h舩te Daniel einen Weg gefunden, Dr. Caroll \nin der Villa zu verstecken, bevor die dataDyne-Truppen \neingetroffen sind.\n", + /* 41*/ "Ich hoffe, dass mir unser Unterh舅dler-Trick \nzu einer Chance verhilft, die dataDyne-Truppen zu \nberraschen. Diesmal geht es nicht nur um mein \nLeben...\n", + /* 42*/ "Sir? Sind Sie verletzt?\n", + /* 43*/ "Nein, Joanna, ich bin okay, aber diese dataDyne-\nSchl臠er haben aus mir herausgeprgelt, wo ich \nDr. Caroll versteckt habe. Wenn ich nur noch ein \npaar Minuten l舅ger durchgehalten h舩te...\n", + /* 44*/ "Es ist nicht Ihre Schuld, Sir. Ich h舩te schneller \nsein mssen.\n", + /* 45*/ "Machen Sie sich keine Vorwrfe! Dr. Caroll \nhat mir gesagt, dass er diesen Zug erwartet hat. \nAls sie ihn gefunden haben, sind die dataDyne-Leute \netwas unvorsichtig geworden. Sie dachten, ich w舐e \nbewusstlos und haben darber gesprochen, wohin sie \nihn bringen. Sie erw臧nten ein Meeting im \nG5-Building in Chicago, Illinois, noch heute Nacht.\nIch mchte, dass Sie dorthin gehen, aber das \nbedeutet, dass Sie nicht viel Zeit haben, um sich \nauf die Mission vorzubereiten.\n", + /* 46*/ "Das soll nicht das Problem sein, Sir. Konnte \nIhnen Dr. Caroll wenigstens einige ntzliche \nInformationen weitergeben?\n", + /* 47*/ "Oh ja, das konnte er. Ich werde Sie weiterinformieren, \nwenn Sie sich auf dem Weg nach Chicago befinden. \nWir sind noch immer in der Lage, ihm zu helfen, \nselbst wenn diese Schl臘hter seine Persnlichkeit \nver舅dern. Er glaubt, dass sie eine Sicherungskopie \nseiner Daten haben. Es ist wohl an der Zeit, dass ich \nmich mit ein paar Freunden unterhalte, die mit dataDyne \nabrechnen werden.\n", + /* 48*/ "Unzul舖sige Operation - Windmhle ist aktiv.\n", + /* 49*/ "Mission nicht erfolgreich - Feindliche Wache wurde nicht gefangen.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_i.c b/src/files/lang/jap-final/eld_str_i.c new file mode 100644 index 000000000..2655e5787 --- /dev/null +++ b/src/files/lang/jap-final/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Localizza e blocca gli hacker dataDyne\n\nIn passato gli hacker dataDyne hanno effettuato sporadici tentativi di accedere ai file dell'istituto. Ora avrebbero la vita molto pi facile provando dall'interno della villa, grazie al nostro collegamento diretto con l'istituto. Se agiscono in tal senso dovrai rispondere repentinamente! Evita qualsiasi danno ai terminali poich contengono dati di fondamentale importanza per l'istituto.\n\n|Obiettivo 4: - Cattura la guardia dataDyne\n\nSe riuscissimo a catturare un componente della squadra d'assalto dataDyne, saremmo in grado di farci finalmente un'idea in merito ai loro obiettivi. Ricorda di non ucciderlo: colpiscilo facendo perdere loro i sensi, in modo da impedirne la fuga.\n\n|Obiettivo 5: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 1*/ "VILLA DI CARRINGTON \n", + /* 2*/ "|Situazione:\n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sar sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 3: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 4: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sar sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Salva la mediatrice\n", + /* 6*/ "Elimina i cecchini sul tetto\n", + /* 7*/ "Attiva il generatore eolico\n", + /* 8*/ "Localizza e blocca gli hacker dataDyne\n", + /* 9*/ "Salva Carrington\n", + /* 10*/ "Cattura la guardia dataDyne\n", + /* 11*/ "La mediatrice stata uccisa.\n", + /* 12*/ "I cecchini sono stati eliminati.\n", + /* 13*/ "La mediatrice si messa in salvo.\n", + /* 14*/ "Attivato l'impianto di raffreddamento\n", + /* 15*/ "Disattivato l'impianto di raffreddamento\n", + /* 16*/ "Attivati gli accumulatori energetici\n", + /* 17*/ "Disattivati gli accumulatori energetici\n", + /* 18*/ "Riattivato il generatore eolico\n", + /* 19*/ "Disattivato il generatore eolico\n", + /* 20*/ "Ristabilita l'elettricit nella villa\n", + /* 21*/ "Distrutto strumento essenziale alla missione.\n", + /* 22*/ "Joanna! Sono Grimshaw. Ci sono degli hacker \nnella villa! Devi fermarli prima che \n mettano le mani sui file.\n", + /* 23*/ "Gli hacker hanno scaricato dati essenziali.\n", + /* 24*/ "Gli hacker sono stati eliminati.\n", + /* 25*/ "Carrington stato salvato.\n", + /* 26*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 27*/ "Pistola Laptop\n", + /* 28*/ "Fucile cecchino\n", + /* 29*/ "Sconfitta la guardia nemica\n", + /* 30*/ "Procurati chiave porta\n", + /* 31*/ "Guardia:\n", + /* 32*/ "Chiave porta\n", + /* 33*/ "Chiave porta\n", + /* 34*/ "Presa chiave porta\n", + /* 35*/ "Riattivando il generatore eolico, \npotr portare l'elettricit \nnel sotterraneo inferiore.\n", + /* 36*/ "Devo fare alla svelta o \nuccideranno la mediatrice!\n", + /* 37*/ "Daniel dev'essere imprigionato qui!\n", + /* 38*/ "Devo fermare gli hacker prima \ndi salvare Daniel!\n", + /* 39*/ "Missione dell'Agente Dark, ore 18.46. La notte\nscorsa abbiamo ricevuto una chiamata di Cassandra \nde Vries. Una squadra dataDyne ha preso in ostaggio \nDaniel Carrington nella sua villa sulla costa. \nDicono che lo risparmieranno in cambio \ndell'automa.\n", + /* 40*/ "Sfortunatamente, non ce l'abbiamo noi. \nDaniel e il Dr. Caroll erano alla villa \nper discutere 'questioni di interesse \nreciproco'. Sembra che Daniel abbia trovato \nil modo di nascondere il Dr. Caroll prima \nche arrivasse la squadra dataDyne.\n", + /* 41*/ "Speriamo che il nostro piano della falsa \nmediatrice mi permetta di sorprendere la \nsquadra dataDyne. Stavolta non c' solo \nla mia vita in gioco!\n", + /* 42*/ "ネ ferito, signore?\n", + /* 43*/ "No, Joanna, tutto bene, ma quelle bestie \ndella dataDyne mi hanno costretto a dir loro \ndove ho nascosto il Dr. Caroll. Se solo \navessi resistito qualche minuto in pi...\n", + /* 44*/ "Non colpa sua, signore! Avrei \ndovuto fare pi in fretta io!\n", + /* 45*/ "Non essere troppo dura con te stessa, Jo. \nIl Dr. Caroll si aspettava una cosa del \ngenere. Anzi, dopo averlo catturato la \nsquadra dataDyne ha guadagnato sicurezza \ne, credendomi svenuto, si lasciata \nsfuggire un paio di cosette interessanti. \nHanno parlato di una riunione prevista per\nquesta notte nell'Edificio G5 a Chicago, \nIllinois! Voglio che tu sia l, ma certo\nnon ti resta molto tempo per prepararti! \n", + /* 46*/ "Non c' problema, signore! Allora, \nil Dr. Caroll le ha dato informazioni \nutili?\n", + /* 47*/ "Oh, certo, eccome! Ti racconter ogni \nparticolare durante il tuo viaggio verso \nChicago. Possiamo ancora salvarlo, anche \nse quei macellai riescono a manipolargli \nil cervello. Ritiene che ne conservino una \ncopia in un posto sicuro. ネ proprio ora \ndi contattare alcuni amici perch si \noccupino della dataDyne!\n", + /* 48*/ "OPERAZIONE IMPOSSIBILE - Generatore attivo\n", + /* 49*/ "MISSIONE FALLITA - Guardia nemica non catturata\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_s.c b/src/files/lang/jap-final/eld_str_s.c new file mode 100644 index 000000000..824e87b8b --- /dev/null +++ b/src/files/lang/jap-final/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deber疽 eliminarlos.\n\n|Objetivo Dos: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Tres: - Localizar y Detener a los 'Hackers' de dataDyne\n\nEn el pasado ha habido intentos espor疆icos de los 'hackers' de dataDyne de acceder a los ficheros del Instituto. Su trabajo ser mucho m疽 f當il si lo intentan desde la villa, debido a la conexin directa con el Instituto. Si se hace ese intento, necesitar疽 responder r疳idamente. Asegrate de que los terminales no son daados, ya que contienen datos vitales para el Instituto.\n\n|Objetivo Cuatro: - Capturar a Guarda Enemigo\n\nCapturar a un miembro del equipo de asalto de dataDyne nos dar una idea de sus intenciones reales. Recuerda no matarles: d駛alos inconscientes si puedes, ya que esto nos asegurar que no escapen.\n\n|Objetivo Cinco: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distraccin para ayudarte a entrar. Es casi seguro que esa persona ser abatida por los soldados de dataDyne a menos que acabes con ellos r疳idamente. Tienes que ser muy r疳ida.\n\n|Objetivo Dos: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deber疽 eliminarlos.\n\n|Objetivo Tres: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Cuatro: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distraccin para ayudarte a entrar. Es casi seguro que esa persona ser abatida por los soldados de dataDyne a menos que acabes con ellos r疳idamente. Tienes que ser muy r疳ida.\n\n|Objetivo Dos: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Tres: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Salvar al negociador\n", + /* 6*/ "Eliminar francotiradores del tejado\n", + /* 7*/ "Activar generador elico\n", + /* 8*/ "Localizar y eliminar 'hackers'\n", + /* 9*/ "Rescatar a Carrington\n", + /* 10*/ "Capturar guarda de dataDyne \n", + /* 11*/ "El negociador ha muerto.\n", + /* 12*/ "Los francotiradores han sido eliminados.\n", + /* 13*/ "El negociador ha escapado a lugar seguro.\n", + /* 14*/ "Los sistemas de refrigeracin han sido activados.\n", + /* 15*/ "Los sistemas de refrigeracin han sido desactivados.\n", + /* 16*/ "Los sistemas de energa han sido activados.\n", + /* 17*/ "Los sistemas de energa han sido desactivados.\n", + /* 18*/ "La torre elica ha sido activada.\n", + /* 19*/ "La torre elica ha sido desactivada.\n", + /* 20*/ "La electricidad ha sido restablecida en la Villa.\n", + /* 21*/ "Objeto crtico de la misin destruido.\n", + /* 22*/ "。Joanna! Grimshaw al habla. 。Tenemos 'hackers' en \nla villa! Debes detenerles antes de que accedan\n a nuestros ficheros.\n", + /* 23*/ "Los 'hackers' han descargado datos vitales.\n", + /* 24*/ "Los 'hackers' han sido eliminados.\n", + /* 25*/ "Carrington ha sido rescatado.\n", + /* 26*/ "Objetivos no completados: misin fallada.\n", + /* 27*/ "Arma PC\n", + /* 28*/ "Rifle Fr\n", + /* 29*/ "Guarda enemigo ha sido dominado.\n", + /* 30*/ "Obt駭 la llave de la puerta.\n", + /* 31*/ "Guarda:\n", + /* 32*/ "Llave de la Puerta\n", + /* 33*/ "Llave de la Puerta\n", + /* 34*/ "Llave de la Puerta obtenida.\n", + /* 35*/ "Si conecto de nuevo el generador elico, \ntendremos energa en el stano inferior.\n", + /* 36*/ "。Tengo que ser r疳ida, o matar疣 \nal negociador!\n", + /* 37*/ "Aqu es donde deben tener retenido a Daniel.\n", + /* 38*/ "Esos 'hackers' deben ser detenidos antes \n de que rescate a Daniel.\n", + /* 39*/ "Informe de la Misin de la Agente Dark, 18:46 horas. \nAnoche tuvimos una llamada de Cassandra De Vries. \nUn equipo de dataDyne tiene a Daniel Carrington \nretenido en su villa privada en la costa, \ny dicen que respetar疣 su vida a cambio \nde la IA.\n", + /* 40*/ "Desafortunadamente, no la tenemos. Daniel y el \nDr. Caroll estaban en la villa para discutir \n'materias de mutuo inter駸'. Parece que Daniel \nencontr un modo de esconder al Dr. Caroll en \nla villa cuando el escuadrn de dataDyne \nirrumpi all.\n", + /* 41*/ "Con un poco de suerte nuestro ardid del falso \nnegociador me dar una oportunidad de sorprender \nal escuadrn de dataDyne. Esta vez no slo mi \nvida est en juego.\n", + /* 42*/ "Seor, ソest herido?\n", + /* 43*/ "No, Joanna, estoy bien, pero esos matones \nde dataDyne me han hecho contarles donde \nesconda al Dr. Caroll. Si hubiera aguantado \nunos minutos m疽...\n", + /* 44*/ "No fue su culpa, seor. Deb ser \nm疽 r疳ida.\n", + /* 45*/ "No te culpes, Joanna. El Dr. Caroll \nme dijo que esperaba que esto ocurriera. \nEn realidad, cuando fue recapturado, el \nequipo de dataDyne, en un exceso de confianza, \ndej caer algunas cosas, ya que pensaban que \nestaba inconsciente. Mencionaron una reunin \nen el Edificio G5 en Chicago, Illinois, esta \nnoche. Quiero que est駸 all, pero esto no \nte deja mucho tiempo para prepararte.\n", + /* 46*/ "Eso no ser un problema, seor. As que, \nソel Dr. Caroll le dio alguna informacin \ntil para usted?\n", + /* 47*/ "Oh, claro que s. Ciertamente lo hizo, y \nte har un breve resumen cuando est駸 de \ncamino a Chicago. Todava podemos ser capaces \nde ayudarle, incluso aunque esos carniceros \neliminen su personalidad. ノl cree que ellos \nguardar疣 una copia en un lugar seguro. Es \ncuestin de tiempo que llame a unos \namigos para que se encarguen de dataDyne.\n", + /* 48*/ "Operacin denegada - el molino est activo.\n", + /* 49*/ "Misin no conseguida - guarda enemigo no capturado.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/gunE.c b/src/files/lang/jap-final/gunE.c new file mode 100644 index 000000000..f1f4f9168 --- /dev/null +++ b/src/files/lang/jap-final/gunE.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", + /*256*/ "ECM Mine\n", + /*257*/ "Falcon 2\n", + /*258*/ "Suitcase\n", + /*259*/ "Skedar Bomb\n", + /*260*/ "Reprogrammer\n", + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gunJ.c b/src/files/lang/jap-final/gunJ.c new file mode 100644 index 000000000..493cdb3ce --- /dev/null +++ b/src/files/lang/jap-final/gunJ.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "ほナ∨ヌ", + /* 2*/ "ほ√∨ヌ 1\n", + /* 3*/ "ほ√∨ヌ", + /* 4*/ " ぴ", + /* 5*/ "羅漕ヌ", + /* 6*/ "ヤみ\n", + /* 7*/ "ナルマ箪n", + /* 8*/ "ナルマ茶槽マ\n", + /* 9*/ "ナルマ嫡ッ圭n", + /* 10*/ "MagSec4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357艢\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "ネ蛟ラワ\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "♀÷マ\n", + /* 18*/ "ャ♀÷マ\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "レムラマ\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "ユワ縲ァ\n", + /* 24*/ "ハ£縲ハ£マ\n", + /* 25*/ "ロヘハ縲マ\n", + /* 26*/ "d$d\n", + /* 27*/ "ォマ烙ヒ\n", + /* 28*/ "♂°ワ゚d\n", + /* 29*/ "ワムd\n", + /* 30*/ "ムミマみ≪カ⊂、\n", + /* 31*/ "ナdレム綵n", + /* 32*/ "ャム\n", + /* 33*/ "ラワ¥メ\n", + /* 34*/ "縲マヨム=\n", + /* 35*/ "ルマ°ハ縲艢ム\n", + /* 36*/ "み≪カ⊂、\n", + /* 37*/ "ァ¥\n", + /* 38*/ "ン」、\n", + /* 39*/ "ンマレd」、\n", + /* 40*/ "d繞」、\n", + /* 41*/ "梳怙ヲムマ\n", + /* 42*/ "ハロフ°マ\n", + /* 43*/ "蛟ノd\n", + /* 44*/ "リハ綵n", + /* 45*/ "dマリハ綵n", + /* 46*/ "マ烙ヒメ、\n", + /* 47*/ "d=d\n", + /* 48*/ "構n", + /* 49*/ "レムヨハラマ\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KLO1313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT(9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "窶ワ゚d\n", + /* 59*/ "艢ム縲ミム\n", + /* 60*/ "ユワ$ム\n", + /* 61*/ "掾ヲ.ワ$ム\n", + /* 62*/ "¥ワ$ム\n", + /* 63*/ "♀ミルd≧\n", + /* 64*/ "」ィ\n", + /* 65*/ "アワヨヒマ\n", + /* 66*/ "ヤd縲ヤ%\n", + /* 67*/ "ミ゚ハロフ\n", + /* 68*/ "蛟ノd\n", + /* 69*/ "IRワヨヒマ\n", + /* 70*/ "ォ縲ハユ\n", + /* 71*/ "ミ゚ハロフリdワ\n", + /* 72*/ "羅漕ィ\n", + /* 73*/ "ワ$ムラdラ\n", + /* 74*/ "″dワ縺操\n", + /* 75*/ "♂d゚マユ\n", + /* 76*/ "HRワルd£\n", + /* 77*/ "麾嫡ッ圭n", + /* 78*/ "麾茶槽マ\n", + /* 79*/ "麾レム綵n", + /* 80*/ "ォマ烙ヒ\n", + /* 81*/ "ンマレd媾n", + /* 82*/ "レムヨハラ\n", + /* 83*/ "艢ム\n", + /* 84*/ "DY357\n", + /* 85*/ "ロマロヘハ綵n", + /* 86*/ "繞キ\n", + /* 87*/ "゙繞キ\n", + /* 88*/ "ぴウ繞キ\n", + /* 89*/ "ロマロヘハ綵n", + /* 90*/ "dマ\n", + /* 91*/ "リハ繞、\n", + /* 92*/ "dマリハ綵n", + /* 93*/ "リハ縲ユ\n", + /* 94*/ "ハ£ミ゚ハラ\n", + /* 95*/ "」、ロネ\n", + /* 96*/ "ム♀ロヘハ綵n", + /* 97*/ "≠マュキ\n", + /* 98*/ "マ烙ヒ\n", + /* 99*/ "メノdロヘハ綵n", + /*100*/ "$マ濬n", + /*101*/ "のはf\n", + /*102*/ "ハラヤマ\n", + /*103*/ "ケンワルd£\n", + /*104*/ "驍о≠マ\n", + /*105*/ "≧″ロヘハ綵n", + /*106*/ "ムマ≧d\n", + /*107*/ "究ゥ圭n", + /*108*/ "dレ┛\n", + /*109*/ "ワハロフ\n", + /*110*/ "みー騾艢ム\n", + /*111*/ "レd濬n", + /*112*/ "ヨ\n", + /*113*/ "ワd\n", + /*114*/ "閧о\n", + /*115*/ "騾ムムマ$ラ綵n", + /*116*/ "ワ$ムラdラ\n", + /*117*/ "翌トδも\n", + /*118*/ "ンマレd」、\n", + /*119*/ "Σなに\n", + /*120*/ "ン」、\n", + /*121*/ "ンマレd」、\n", + /*122*/ "d繞」、\n", + /*123*/ "づ」\n", + /*124*/ "陪ロ黴フd<\n", + /*125*/ "ンマレd¢マ¥d\n", + /*126*/ "ン」な\n", + /*127*/ "ンマレd」な\n", + /*128*/ "塘繞キ\n", + /*129*/ "烙ヒd≠ミハ£\n", + /*130*/ "ナオ∵ル\n", + /*131*/ "チ拿n", + /*132*/ "d=d$ワ\n", + /*133*/ "ロヘd縲マ≠\n", + /*134*/ "ムマ$ラ繞」な\n", + /*135*/ "揉ムd♀\n", + /*136*/ "d縲ミム\n", + /*137*/ "アイd♀\n", + /*138*/ "ノvイd♀\n", + /*139*/ "<d\n", + /*140*/ "こごd♀\n", + /*141*/ "ル轢ラロヘマ\n", + /*142*/ "゚dハ縲ワヨヒマ\n", + /*143*/ "蛟ノdは\n", + /*144*/ "」、u\n", + /*145*/ "┗劇ワルd£\n", + /*146*/ "レムマレd\n", + /*147*/ "諷≠マ\n", + /*148*/ "d=dろ├\n", + /*149*/ "by ♂d゚≧ムマ貼n", + /*150*/ "by ヨヒマ縲マぅう\n", + /*151*/ "by 烙ネワハラaэ\n", + /*152*/ "by ワリ≧d\n", + /*153*/ "by ムミマ\n", + /*154*/ "by ≠ヘdマ<貼n", + /*155*/ "メネ#マ∵∃⊇∀タ♭⌒≠ァモ゚∃ナム゚dマ∃≪Η≫ツ$マ焉クエ⇔Φみ∈閠ハラミメ縲=ワナチモのはfナ⇔Φみメメネ#マ♭わべ∈ニ≫メÅツ\n", + /*156*/ "せ♭Ζサメuツ≫≠」う♭く⌒≡チ∝√⇔⊇≫もÅツd=dろ├∈エ⇔コb∃、潤クべ¬テ∠∩÷ハ£ミ゚ハラ♭w∈閠ハラ≧メマトヌ≫メÅツ\n", + /*157*/ "ナルマ秩メすヲ♂♭÷レムマレdδい∀コb∃ばぱb∈ユぶヮ⊃⇔⊇≫ツ\n", + /*158*/ "ナルマ秩メすヲ♂♭÷仲氈モоメワ艢ム$dワルd£∈ヒタナ÷ナルマメせ∃キべ∈ニマな戟タ≫ツ\n", + /*159*/ "┬пヨメ¢ワ縲メシロ♭>カ。ぷ┬マ≡エ⇔縺マ∝√⇔⊇≫ツロマ£∃<dδい∈ぷエ⇔∪≪<艢窒フ┸d♀マ∪⊇⇔モ塘繞キ∵♭タ≫ツ\n", + /*160*/ "ワリ≧dマ∪∧∝√∨ンモ=テ√∈みマ√≫烙ヒマワ∩⌒ナ√∃⊇ツθタ∃≠マ∀「メ⇒⊇∨もき∈ぷエ∨サ≫タ騾マ♀マÅツ艢窒フ┸d♀メ烙ヒd≠ミハ£∈⊂∀繞キ゚モフ∵≫∵<コb∃$d♭wマθフべ∈煤ス≫♭⊆∽⊂ツ\n", + /*161*/ "♂d゚≧ムマメ捩イ凍斧浴モ>推早く⌒$∃騾マ♀マÅツコb∃ばぱb♭ォeメΣモョρナ≠浴ク蜈諱マユエ∀†ナ⇔チ√≫Å∽⊂ツ∪ΗΧ買マユワ゚♂⌒ロ≒√⇔∪≪>揆桷氈メ縲マ縲ムdワ縲マモ÷d♀♂∈ぷエ⇔⊇≫∀⊇⊂メレ♭⊆≫ツ\n", + /*162*/ "DY357-LXモ揆桷氈メ│┌┐÷縲マ縲ムdワ縲マヨメユワ゚♂♭⊆≫ツナ⊇゚ムdワヨマメハ£マ蛛ス⇔=テメ÷d♀マモ、メワ¢d♀∵くマ∃≫≡⊂もきマノハ∵蛛ス⇔⊆≪≠モラョ早Φみ∈ほニテ∀∵♭タ≫ツ\n", + /*163*/ "ムミマメワ゚マ≧d♀∃メネ#マÅツテメ¢ワ縲モ÷ロマロヘハ縺ヘ」、ロネ∈>モ轢dヨェ♭なキ♭タ≫ツ\n", + /*164*/ "♂d゚≧ムマメ℃ワ縲ンd∀∃エ∨レ″ロママツ凍嫡繧ネメ≠ママ┓δい∈ヒタツ浴メ掾メ゚dハ縺ク」ヌナ÷ハラヤマニ≫テ∀∵♭タ≫メÅツテメδいモ、ρメキべみ∈=逐メワ艢ム$dマぬ⊃⇔ナリエ∨ツ・繞キΞセ凰逗吹ヲ▽■\n", + /*165*/ "ヨヒマ縲マぅう♭く⌒≡チヨト√⇔⊇≫ムツ┠⊇キΝ∀θタ∃≠マレム<♭<ニぬ⊇セみメ≡⊇メネ#マ♭⊆≫ツ艢窒フ┸d♀♭モ=モоミハ£ナ∨リリ♭てタリ∝≫テ∀∈ぃいマナ⇔⊇≫ツ・繞キΞセ沃斧吹ヲ▽■\n", + /*166*/ "¬キエ∀に∨∀テ∽÷ワ゚マ≧d♀∃ム♭⊆≫∵<艢窒フ┸d♀∵づてト√≫∀≠焉マ≡チマ∨ンマレd」、ヨ∀ぬきニ≫ツ・繞キΞセ沃逗吹ヲ▽■\n", + /*167*/ "♀÷マメぬ♂ツンマレd」、メ∩∝≪マ>焉ト∃マ烙ヒ∈ヒタナ⇔⊇≫クケマ⇒もÅツ・繞キΞセ沃逗吹ヲ▽■\n", + /*168*/ "リ∨ナ⇔⌒♂d゚≧ムマメ騾ム窶ラメネ#マÅツ焉ト浴メ≠マ∈ぷ⇒cに、ρメムÅ∵=逗∃ばぱbメラ∩マ<Σなにd♀∈はヮナ⇔⊇≫ツテメd♀マニ≫∀≦」、∂δも∃♪メΣ∈оナナ⇔チ√≫ツ\n", + /*169*/ "θικメ¥♂ニd♀ヨマラなト√∨レムラマモ÷窶∃♪∈、普ニ≫マぐ√∨いb∈な戟ニ≫ツクケンマモ繞キΞ∈仲气窮ヒマナ÷≠マ∈漕ロレ≒♭⊇ン∨ニ∀⊇⊂テ∀⌒♭タ≫ツ・繞キΞセ凰逗吹ヲ▽■≠ュθ逐逗逗吹ヲ▽■\n", + /*170*/ "ヨヒマ縲マぅうメオカメネ#マツ∪♪∽チタ繞キΞ∀θタ∃≠マ∈ぷエ⇔⊇≫ツ艢窒フ┸d♀モワ$ムラdラ♭÷≠マnメ、ィ∈モ轢d∀ナ⇔ヨニ≫ツ・繞キΞセ操操逗吹ヲ▽■\n", + /*171*/ "テ√⌒ムミマをメメネ#マツワ゚マ≧d♀∃繞キd♀メマ÷騾ムムマ$ラ繞、∵⊃≫d♀∵⊆≫ツテ√モコ⊇ばぱb♭≦ォeメΣ∃≒ョρニ≫ツテメd♀メπモ繞キΞ∵フ∵≫テ∀∀÷ロヘハ縺メ$dメ黷ト♭<驍劫・∵フ∵≫テ∀Åツ・繞キΞセ凰逗吹ヲ▽■ャ艢窒フ┸d♀セ凍逗吹ヲ▽■Ыn", + /*172*/ "ハ£縲ハ£ゥ怐マに⊃≫≡⊂マをト√∨レ″ロママツゥ怐メ∈ナ⇔⊇≫∀タモなキ∵♭タ∃⊇ツ艢窒フ┸d♀♭モ翌トδも∀ナ⇔tヮニ≫テ∀∵♭タ≫ツ・繞キΞセ操逗逗吹ヲ▽■\n", + /*173*/ "♂d゚≧ムマメiヮワヨマラなト√∨メネ#マツ凾ネ≪メ≠マ∈ぷ¬÷ロマロヘハ縺ヘ≧″ロヘハ縺クなキニ≫テ∀∵ぁヰ≫ツムぞqユタツ\n", + /*174*/ "⊇テ∃ヌ≫┳マ∀エ⇔モクケマコb∃メネ#マÅ∵≠ョcムマモ⊇マチ⊇ツナ∩ナρずマ⊆ユ√≫w∈cヒニ≫マモエ∨≪メメネ#マツくθメ繞キΞモ操逗吹ヲ▽■マ⌒∃≫ツ\n", + /*175*/ "∀⇔⌒′d∃メネ#マツρケメリハ縺マ蛛ス⇔÷゚dハ縺クハラヤマナ⇔dマリハ縺クなキニ≫テ∀⌒♭タ≫ツ\n", + /*176*/ "♂d゚≧ムママ≡エ⇔をト√∨≦戟チリ♭」、∈なキニ≫ロワ窶ツ艢窒フ┸d♀マモ縲ハヨd∃δい∵はヮト√⇔⊇≫ツなキト√≫∀、モァ∃♪マチエ⇒⊇⇔≧ヌロΒマxマぺ¬⇔」なニ≫メÅツ\n", + /*177*/ "ワリ≧dモ≠浴諠サ√∪メメ⊇⇔⊇≫メ∈に≫メ∵θアタ♭⊆≫ツ∧√∈ミ⊃≫∀ワムdメ艢窒フ┸d♀マ÷リハ縲ユδい∵⇒⊇⇔⊇≫メマモチΗ∵⊇チツ⊃タ∵リハ縺ソ≒ョげ♭ラ驕゚⊂∀ニ≫メ∈に≫メモ≠ロ≒マ∀エ⇔ぐメヤ∀∀タ∃メÅツ\n", + /*178*/ "ナdレム縺モムミマメアワヨヒマ∀=ラ∀∋♪が♭⌒ョρニ≫ムメ∵ホ∝トエ∨騾ム″ハ♀メネ#マÅツテメワルd£モΚ驛黹∈レd焉ナ⇔ハラヤマ♭タ≫∵=ネメレd烙ワ¢d♀モムチ≠トチwマモ⇒⊇⇔⊇ツ∃⊇ツ\n", + /*179*/ "ヨヒマ縲マぅう∵ロエ∨テメ桷サモ<゙゚い∃<d∀゙∃、潤≠ュ゙メワ艢ム$dム∀ユ†√≫≡⊂マ∃エ∨ツナオ∵∠∀へ⊇∵φヌニ≫ツ\n", + /*180*/ "テメラワ¥メモ≧セ⊇キΝメ¢ワ縲レム<メ♂♭÷ヨヒマ縲マぅうメモd≠ネマ縺メワ縺マはヮト√≫ツv∩≒に⇔⌒∝∩≒∃⊇≡⊂マ私チ♭タ÷符キメ香ヘ究ゥ劇=ネナ⇔cべョ操ロヘハ縺メヨ∈ヌ⇒テ∀∵♭タ≫ツ\n", + /*181*/ "繞キぃい∃♂°ムワ♭≧帥鴻刀マモメネ#マ∀ナ⇔⌒窿♭タ≫∵>キヰモ究ゥ隙ョキヨメワ£d∀ナ⇔をト√∨⌒メÅツ艢窒フ┸d♀♭モ∞究ゥ戟ク♭┛ナ驕ク∃リルマニ≫∵≦ムぞq♭ナ∩⊃∃⊇ツ\n", + /*182*/ "θタチ⇔∃ルマ°ハ縲艢ムツー驕ノ艢ム∵黴ハ縺ニ√†≠浴モ昧ロ∀エ⇔⊇≒√∃⊇モÅツ♂d゚≧ムママ┠チゐツ⇒∵√⇔タ∨メネ#マ♭⊆≫ツ\n", + /*183*/ "くルメみ≪カ⊂、♭÷陪ロ黴フd<=ワナチモ°メマ♀ナ⇔」なニ≫ンマレd¢マ¥dメ秩ヒメd♀∈エ⇔ー驕竅テ∀∵♭タ≫ツ\n", + /*184*/ "#d゚″゚ム£メm゚с」、ツ黴ハ縺ナ∨ンπ♭」なトヌ⇔⌒⊇⊇ナ÷ンマレd」、∀ナ⇔ヨ⊇≫テ∀⌒♭タ≫ツ\n", + /*185*/ "セ⊇ン黴フd<メ⇒⊇∨」、ツ艢窒フ┸d♀マモΣなにδい⌒はヮナ⇔⊇≫ツ\n", + /*186*/ "てタ∈チナナ⇔づ」ト√≫」、ツ艢窒フ┸d♀マモΣなにδい⌒はヮナ⇔⊇≫ツ\n", + /*187*/ "ルマ♭づ」♭タ≫」、ツルマモ艢窒フ┸d♀♭づてニ≫ツ\n", + /*188*/ "λсδ┸∈こごニ≫♂°ムワツ宦瘁ヒツ≒√∨ロワ窶マモd∈え≪テ∠ツ\n", + /*189*/ "d=dモワ縺マはヮト√=ネメロヘハ縺モクケマせ♭⊆≫ツ┠ノフヨメd=d$ワ=ワナチモcヌノフマモ轢d∈モ香トヌ≫ロヘd縲マ≠∈なキニ≫テ∀∵♭タ≫ツ\n", + /*190*/ "ルマ°ハ繝マラなト√∨ィ♭≧舮メマヲめ∈煤ス≫テ∀マ≡≪<唐メ焉縺諠チチ≒√≫≡⊂マ∃≫ツ\n", + /*191*/ "艢ム縲ワルd£пメ桷サメくル°d≠ヘマ♭≦揉堰⌒モエタ≪ひ≪∵に⊃≫ツΚ驛黹メ⊆≫⌒メモоナト√≫ツ\n", + /*192*/ "黹ヤb窶ラ閠≠d∈エ∨く⌒焉ト⊇桷サ♭≦宦メыぼ♂°ムワツ°ムユ∈ぷエ⇔∪≪÷ΓΔメ腐磨諱タ≫ツ\n", + /*193*/ "♪∋∃Σ♭⌒ァム♭タ≫セノフワルd£ツひ≪メ嚊宦クロマ£∃ムd≠マナ⇔モοニ≫ツ\n", + /*194*/ "ャマμ♂d゚∀ノvイワヨヒ蛟マ∈ヨ⊇∨ワルd£ツひ≪メ嚊宦クラミマにヌ≫∀ンマ÷ムフd∃Σ∈ツぁニ≫テ∀∵♭タ≫ツリ∨÷ワ$ムラdラ∃♪∈エ⇔゙√⇔⊇≫w∈≠ネにニ≫テ∀⌒♭タ≫ツ\n", + /*195*/ "モムミマメラワ゚∵ぷ⇒∞ャ∈チ驕邃ュ゚∈エ∨♂°ムワツ⇔⊇≫Φみメリ∝≪マラdヨマニd♀∈⇒チ≪Åナ≠ミ≪∩≒に⊃∃チニ≫ツテメニd♀モてτモ轢d∈ゐツ≫∀チ∃≫メ♭≠焉クべエ∨≪ニ≫∀=ナ†≒チワン∵ヱ⊃⇔ナリ⊂ツ\n", + /*196*/ "┠ノフヨメ′≠フミワヨヒ艪оツユ浴メb゙dワ∩≒メ∈ホΤナ∨ムd≠∵°ム=dマモ浴ト√≫ツ<dδいそタツ\n", + /*197*/ "ラ∀∋♪ュ゚ム£メλс♂d゚∈栫ル宦竅テ∀∵♭タ÷ヨヒマ縲マぅうメ騾ハユdヨ∀♂d゚∈λえ♭タ≫ツテ√∈エ⇔ぅうメ騾ハユd∵dユロワ窶ヨ∀蜈ムミランワニ≫テ∀⌒♭タ≫ツ\n", + /*198*/ "$∃d≧d♂°ムワツ♪∋∃⌒メ⌒゚dハ縺マ♭タ≫ツ┳÷メネ#マ÷ミム窶<潟轣ホ♪∵ミ⊃≒√≫∀テ∽Å∽⊂∩ツ\n", + /*199*/ "θικメοリメωラリル≦ェメ妹腐磨ホ♪メ∵ミ゚ムマト√≫ツθικ∵戟チメ┳黶ルメ∃∩マ⊇⇔⌒<ャ∃∈ツぁ♭タ≫ツ\n", + /*200*/ "ロマ£∃揀レf梳ロワ窶ツ、ρメλсハラ∃≒ヌロ♭ば≫ツ⌒¬∽∋ユメ゚ム£マ⌒≡≫メÅ∵蚕n", + /*201*/ "ムミマメす∋Å摩窶ラ閠≠dマ≡≫<翌トみロワ窶ツ窒メメ└πモ÷ムミマΦみマナ∩⊃∃⊇∀⊇⊂テ∀♭⊆≫ツ\n", + /*202*/ "熈ィメ£ワ烙ハラ」、ツぬねあい∃゚ムd∵はヮト√⇔∪≪÷窶マルd窶ニマト√∨」、∵モ⊥っリ√⇔⊇≫ツ\n", + /*203*/ "ぉ⌒Ψ♯⊇⇔⊇≫ρ≪=テ√モ奄ョ」ユ゚メフd≠ヘマ」、Åツ」な∵フマユ⊇⇔づテ≫≡⊂マンハ縺ナ⇔チ√ツ∧⊂ニ√†=奄о゚≧ムマメxフ=謔ホぱト√=劇ュk∵チ√≫テ∀♭⊆∽⊂ツ\n", + /*204*/ "ρΖメd#ムマ縺ヘナ⇔宦痰サツ≒√≫焉ト∃はuツcaメλμマゥぢナ⇔≦戟チマ⊇≫モd≠ネマ縺ヘぅうメオカマラ∈せ♭タ≫ツ\n", + /*205*/ "テメはuメnoマモオカ∵゙ト√⇔⊇≫祉羅」ロワ窶∵Λルテリ√⇔⊇≫メÅツリ∨テメはuマモェсρΖメ∵∝√⇔∪≪<マΖメΖサ゚モクケマ゙⊇ツ\n", + /*206*/ "ェсρΖメ∈窿ナ<宦瘁ヒツ∨゚dハ縺メせ∃ネu∈ニ≫ツモヨヒマ縲マぅうメなΖ┸マ⌒∝√⇔⊇≫ツ\n", + /*207*/ "θικ┿ヨδメム縺逐マ∀ρΖ腐摩=セ≡‡揀レヨdツ\n", + /*208*/ "♂d゚≧ムマ∨¬∵%≠ハラ秩クエ⇔ぼエ∨чшощメュ腐摩ヅ艪оハ¢マ≠レ♂d゚÷モムミママ掾ニ≫♂d゚<kレマ£∃♪ツ\n", + /*209*/ "噫「メ橿ラ゚dヨヒпメ<泣掾メ┳死ルd♀メ°ハラミハ£ツdヱミ÷<ノハ掾メリルツ翼ムメルヨ∈ゥぃツ∵゙⊇━ミ∈ぷ⇒ルd♀マ⇒タツ♂d゚≧ムマ「シャシ怙シ梳シィシ準逐凍ス摩ス逐貼n", + /*210*/ "モミ斧早縲マ縺諢ナ⇔⊇∨サ∽ナ⊇ヲも♭÷゚dハ縺マ掾ニ≫チゃ∈メウトヌ⇔ナリ⊂ツ┷メ┻ぶモヵ┷メw蚕n", + /*211*/ "ぉメ、σメ宦モ∃⊇ツぬはナ∨⊇∀タマエ⇔チ√ツ\n", + /*212*/ "ンマレd\n", + /*213*/ "ン\n", + /*214*/ "d綵n", + /*215*/ "δも\n", + /*216*/ "」、\n", + /*217*/ "ヨマリハ綵n", + /*218*/ "♂d゚マユ\n", + /*219*/ "θικ蛟゚d\n", + /*220*/ "ヤd縲ヤ%\n", + /*221*/ "ワリ≧d¥\n", + /*222*/ "ρΖマユ\n", + /*223*/ "なΖ┸\n", + /*224*/ "λсdユ\n", + /*225*/ "ム縺逐マ\n", + /*226*/ "♂d゚\n", + /*227*/ "°ハラミハ£♂d゚\n", + /*228*/ "ユd♀ヨd\n", + /*229*/ "ミ゚ハロフリdワ\n", + /*230*/ "轢ハラワ\n", + /*231*/ "ゥ蛟゚d\n", + /*232*/ "″dワ綵n", + /*233*/ "アワヨヒマ\n", + /*234*/ "HRワルd£\n", + /*235*/ "λсdユ\n", + /*236*/ "ユワ$ムメぬ°d≠ヘマ♭÷ユδいメ∩∝≪マ゙゚い∃£ワ烙ハラ」、∈はヮナ⇔⊇≫ツ\n", + /*237*/ "ユワ$ムメぬ°d≠ヘマ♭≧Θ∈黶トヌ≫ィ∈゚dハ縺マなキニ≫ツ\n", + /*238*/ "ユレマ♀♂″d<メ轢ハラワツ′nメlモミマミランワ♭タ≫ンマレd∵⇒⊇⇔⊇≫ツ∧メンマレdモ轢ハラワメ辜痺∵Κタ⇔⊇≫メルδいニ≫ツ", + /*239*/ "ユレマ♀♂″d<メ⌒⊂早ヒメ轢ハラワツd=d「捩セ%s潤逗ワd♀セ%s\n", + /*240*/ "艫ロロd♀\n", + /*241*/ "ロd♀モv∩≒メわべ∈チナナ≠ャ塔ム∃$dニd♀∈ロ≪ぁニテ∀マ≡エ⇔÷d=d∈ぎ≫ミム窶♭⊆≫ツロd♀メモ轢dマモ≪∵⊆≪≠ヤヌメ≧d≠∈ゐツ≫∀ば閨ニ≫ツロd♀モぷエ⇔⊇ト⊃ニ√†翌トτマはト√≫∵=テメ艫ロ┰モ=リÅδいナ⇔⊇∃⊇ツ\n", + /*242*/ "″dワ縺操\n", + /*243*/ "♂-゚マユ\n", + /*244*/ "艢ム縲ミム\n", + /*245*/ "♀ミルd≧\n", + /*246*/ "羅漕ィ\n", + /*247*/ "究ゥ圭n", + /*248*/ "ヤd縲ヤ%\n", + /*249*/ "Backup Disk\n", + /*250*/ "l媾n", + /*251*/ "ゥ怙マ\n", + /*252*/ "d縲媾n", + /*253*/ "ロヘハ繧濬n", + /*254*/ "ャム\n", + /*255*/ "ン」、\n", + /*256*/ "梳怙ヲ\n", + /*257*/ "麾箪n", + /*258*/ "ミ゚ハロフ\n", + /*259*/ "ワリ≧d媾n", + /*260*/ "♂-゚マユ\n", + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gunP.c b/src/files/lang/jap-final/gunP.c new file mode 100644 index 000000000..fcacb1fa3 --- /dev/null +++ b/src/files/lang/jap-final/gunP.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_f.c b/src/files/lang/jap-final/gun_str_f.c new file mode 100644 index 000000000..dd505e733 --- /dev/null +++ b/src/files/lang/jap-final/gun_str_f.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Frags", + /* 2*/ "Mort(e) 1 fois\n", + /* 3*/ "Mort(e)", + /* 4*/ "fois", + /* 5*/ "Suicides", + /* 6*/ "Mains nues\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Fusil pompe\n", + /* 26*/ "Reaper\n", + /* 27*/ "L-roquettes\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Grenade maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Fusil sniper\n", + /* 33*/ "Arbal鑼e\n", + /* 34*/ "Tranquil.\n", + /* 35*/ "Couteau combat\n", + /* 36*/ "Grenade\n", + /* 37*/ "Bombe-N\n", + /* 38*/ "Mine retard.\n", + /* 39*/ "Mine prox.\n", + /* 40*/ "Mine t駘馗om.\n", + /* 41*/ "Mine CME\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Costume\n", + /* 44*/ "Roquette\n", + /* 45*/ "T黎e cherch.\n", + /* 46*/ "Munit. grenade\n", + /* 47*/ "Laser\n", + /* 48*/ "Carreau\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Sp馗ial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Vue nocturne\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "D馗odeur\n", + /* 64*/ "Explosifs\n", + /* 65*/ "Scanner X\n", + /* 66*/ "Medkit\n", + /* 67*/ "Mallette\n", + /* 68*/ "Costume\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Pisteur R\n", + /* 71*/ "Mallette\n", + /* 72*/ "Pilule suicide\n", + /* 73*/ "Occulteur\n", + /* 74*/ "Boost combat\n", + /* 75*/ "R馗epteur\n", + /* 76*/ "Scanner Horizon\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L-roquettes\n", + /* 81*/ "Mine prox.\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Couteau\n", + /* 84*/ "DY357\n", + /* 85*/ "Tir simple\n", + /* 86*/ "Tir rapide\n", + /* 87*/ "Tir explosif\n", + /* 88*/ "Etripage\n", + /* 89*/ "Tir simple\n", + /* 90*/ "Effet Rail-gun\n", + /* 91*/ "Roquette\n", + /* 92*/ "Roquette cibl馥\n", + /* 93*/ "Radioguidage\n", + /* 94*/ "Coup de crosse\n", + /* 95*/ "Balles explosives\n", + /* 96*/ "Tirs guid駸\n", + /* 97*/ "Vider chargeur\n", + /* 98*/ "Lance-grenades\n", + /* 99*/ "Attache-mur\n", + /*100*/ "Coup de poing\n", + /*101*/ "D駸armer\n", + /*102*/ "Verr. cible\n", + /*103*/ "Utiliser Scope\n", + /*104*/ "Moiti chargeur\n", + /*105*/ "Double tir\n", + /*106*/ "Hachoir\n", + /*107*/ "Endormir\n", + /*108*/ "Injection mortelle\n", + /*109*/ "Coup de couteau\n", + /*110*/ "Lancer empoisonn饅n", + /*111*/ "Localisateur cible\n", + /*112*/ "Mort instantan馥\n", + /*113*/ "Boost\n", + /*114*/ "Retour\n", + /*115*/ "Perce-blindage\n", + /*116*/ "Occulter\n", + /*117*/ "D駱loyer sentinelle\n", + /*118*/ "Autodestruct. prox.\n", + /*119*/ "D騁ecteur danger\n", + /*120*/ "Explosif retard.\n", + /*121*/ "Explosif prox.\n", + /*122*/ "Explosif t駘馗om.\n", + /*123*/ "D騁onation\n", + /*124*/ "Fusible 4 secs\n", + /*125*/ "Pinball prox.\n", + /*126*/ "D騁onation retard.\n", + /*127*/ "D騁onation prox.\n", + /*128*/ "Tir 3 balles\n", + /*129*/ "Tir charg饅n", + /*130*/ "S'accroupir\n", + /*131*/ "Infecter\n", + /*132*/ "Impulsion\n", + /*133*/ "Courte port馥\n", + /*134*/ "D騁onation impact\n", + /*135*/ "Ampli lumi鑽e\n", + /*136*/ "Cam駻a mobile\n", + /*137*/ "Vision rayons X\n", + /*138*/ "Image thermique\n", + /*139*/ "Zoom\n", + /*140*/ "App. brouillage\n", + /*141*/ "Connecter\n", + /*142*/ "Identifier cibles\n", + /*143*/ "Porter costume\n", + /*144*/ "Placer explosifs\n", + /*145*/ "Vue t駘escopique\n", + /*146*/ "Silencieux\n", + /*147*/ "Rallonge chargeur\n", + /*148*/ "Vue laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "M麥e sans arme, vous demeurez une menace pour vos ennemis. Vos poings peuvent assommer ou d駸armer un ennemi pour lui voler son arme.\n", + /*156*/ "Pr馗is et fiable, c'est l'arme de base des op駻ations de l'Institut. La vis馥 laser sert localiser les tirs. Utiliser aussi la crosse pour assommer les ennemis.\n", + /*157*/ "Un Falcon 2 am駘ior, b駭馭iciant d'un silencieux tr鑚 utile.\n", + /*158*/ "Un Falcon 2 am駘ior, b駭馭iciant d'un scope d'agrandissement x2 pour profiter d'une grande pr馗ision.\n", + /*159*/ "Un pistolet de l'arm馥 dernier cri utilis par les forces de l'ordre. Il poss鐡e un l馮er zoom et lance trois balles en mode de tir secondaire.\n", + /*160*/ "C'est l'arme de pr馘ilection de tout Skedar qui se respecte. Un grand chargeur et un canon ray font de ce pistolet une arme de poing formidable, surtout gr稍e son tir secondaire: charger le tir pour plus de puissance en utilisant plusieurs munitions.\n", + /*161*/ "Le dataDyne DY357 est la plus puissante des armes de poing. Ses balles poss鐡ent un facteur de p駭騁ration 駘ev et repoussent la cible de leur poids et leur puissance. Des mod鑞es customis駸 sont fabriqu駸 pour des clients importants. On raconte que Trent Easton, le directeur de la NSA en poss鐡e un plaqu or.\n", + /*162*/ "Le DY357-LX a 騁 con輹 la demande du directeur de la NSA, Trent Easton. En plus de poss馘er une crosse en peau de tigre, ce pistolet d'or poss鐡e un canon ray et utilise des balles haute v駘ocit. C'est une arme meurtri鑽e.\n", + /*163*/ "L'arme standard Maian. Elle peut au choix tirer des balles normales ou des balles explosives, sans modifier la consommation de munitions.\n", + /*164*/ "Un classique de la dataDyne tr鑚 r駱andu. Cette arme automatique tire des rafales de calibre 32 et poss鐡e une capacit sp馗iale: verrouiller une cible. Elle fait du profane un tireur d'駘ite. Cadence de tir moyenne: 900 cpm.\n", + /*165*/ "Le fusil d'assaut principal de l'Institut Carrington. Une port馥 et un grand chargeur font de cette arme un excellent choix. Le tir secondaire permet de se d駱lacer tout en ciblant un ennemi. Cadence de tir moyenne: 750 cpm.\n", + /*166*/ "Un fusil d'assaut standard avec un ct vicieux: lorsque le mode secondaire est activ, il devient une mine de proximit aux apparences d'un fusil. Cadence de tir moyenne: 700 cpm.\n", + /*167*/ "Une variante du fusil d'assaut Dragon: plutt qu'un explosif de proximit, il poss鐡e un mini lance-grenades. Une arme excellente. Cadence de tir moyenne: 700 cpm.\n", + /*168*/ "Une autre arme high-tech de la dataDyne. Un fusil d'assaut poss馘ant un chargeur plus petit et un impact puissant, qui peut d騁ecter les explosifs, les armes sentinelles et autres pi鑒es du m麥e ordre. Cadence de tir moyenne: 950 cpm.\n", + /*169*/ "Con輹 pour les gardes du corps, le Cyclone a 騁 choisi par le service de s馗urit du Pr駸ident gr稍e son efficacit en mati鑽e de r駱ression. En cas d'urgence, il peut doubler sa cadence de tir, vidant son chargeur en moins d'une seconde. Cadence de tir moyenne: 900 cpm. Se vide 2000 cpm.\n", + /*170*/ "L'arme secr鑼e de l'Institut Carrington. Elle tire une cadence ph駭om駭ale et contient 駭orm駑ent de munitions. Le mode secondaire est un occulteur qui consomme les munitions. Une arme d騅astatrice. Cadence de tir moyenne: 1100 cpm.\n", + /*171*/ "Un autre exemple du g駭ie maian. Il peut tirer des balles normales aussi vite qu'un autre pistolet-mitrailleur, ou tirer des projectiles rapides p駭騁rant facilement les obstacles vous s駱arant d'une cible. Seul d駸avantage du mode secondaire: la cadence de tir est plus lente et la pr馗ision est diminu馥 par la puissance du coup. Cadence de tir moyenne: 900 cpm (tir sec. 300 cpm).\n", + /*172*/ "Un PC portable qui peut tirer une fois transform en mitrailleuse. Il peut 黎re utilis comme PC mais un contrle minutieux r騅駘era la supercherie. Cadence de tir moyenne: 1000 cpm.\n", + /*173*/ "Une arme de la dataDyne fabriqu馥 par les services de s馗urit. Un chargeur de 9 balles est coupl un mode de tir simple ou double, faisant de cette arme un atout en combat rapproch.\n", + /*174*/ "Con輹 pour 黎re mani par un utilisateur plus fort qu'un humain. Sa cadence de tir ultra rapide en fait une v駻itable machine d馗hiqueter, tr鑚 efficace dans les couloirs. \nCadence de tir maximum: 1800 cpm.\n", + /*175*/ "Une arme encombrante. Elle tire soit une roquette normale soit un missile plus lent mais t黎e chercheuse, pouvant verrouiller un ennemi.\n", + /*176*/ "Un lance-grenades de longue port馥 fabriqu par la dataDyne. Le tir secondaire recouvre les grenades d'une substance collante. Une fois projet馥, la bombe se fixe sur un mur ou un plafond. Apr鑚 quelques secondes, elle se d騁ache et tombe au sol pour exploser.\n", + /*177*/ "Les Skedars aiment inspirer la terreur chez leurs ennemis. Il est donc naturel pour eux de disposer d'une roquette command馥 distance comme tir secondaire de leur lance-roquettes. Ils ont ainsi le plaisir de voir leur proie tenter de s'enfuir devant un projectile mortel.\n", + /*178*/ "Le fusil FarSight est un appareil maian combinant un scanner rayons X et un lance-projectiles traversant les 駘駑ents solides. Le traceur peut rep駻er et verrouiller une forme de vie mais ne peut compenser les d駱lacements rapides d'un ennemi en pleine course.\n", + /*179*/ "B駭馭iciant d'un puissant zoom et de balles haute v駘ocit, cette arme de l'Institut Carrington est l'un des meilleurs fusils de sniper. S'accroupir permet une meilleure pr馗ision.\n", + /*180*/ "Cette arbal鑼e est une arme de courte port馥 mont馥 sur le poignet de l'agent de l'Institut Carrington. Elle se plie pour mieux se dissimuler et peut tirer jusqu' 5 carreaux anesth駸iants ou mortels.\n", + /*181*/ "Un appareil tir rapide utilis en cas d'urgence mais plus souvent en seringue hypodermique pour injecter un s馘atif. Les utilisateurs sont inform駸 qu'une dose trop importante peut entraner la mort.\n", + /*182*/ "Un tr鑚 long couteau de combat. Il contient un r駸ervoir de poison se brisant l'impact et tuant la cible en moins de 6 secondes. Une arme sign馥 dataDyne.\n", + /*183*/ "Une version am駘ior馥 de la grenade. Elle peut 黎re utilis馥 avec un d騁onateur de 4 secondes ou en tant que bombe effet de ricochet.\n", + /*184*/ "Une bombe neutrons faible zone d'effet. Elle peut se d馗lencher l'impact ou 黎re r馮l馥 en mode de proximit.\n", + /*185*/ "Une mine dot馥 d'un d騁onateur de courte dur馥. Elle poss鐡e un d騁ecteur et 騅aluateur activer en mode secondaire.\n", + /*186*/ "Une mine dot馥 d'un d騁onateur de proximit. Elle poss鐡e un d騁ecteur de menace activ en mode secondaire.\n", + /*187*/ "Une mine d馗lencher distance. La commande d'activation est la fonction secondaire.\n", + /*188*/ "Un appareil 駘ectronique de brouillage, capable d'engendrer une panne 駘ectrique sur n'importe quel syst鑪e sur lequel il est fix.\n", + /*189*/ "Un laser de poignet meurtrier et ultra pr馗is. Il peut lancer des impulsions de longue distance ou maintenir un flux continu et concentr courte distance.\n", + /*190*/ "Une drogue de combat chimique. Une fois absorb馥, elle permet des r饌ctions plus rapides.\n", + /*191*/ "Le dernier de la ligne de scopes 'starlight' amplifiant la lumi鑽e ambiante pour une image plus claire des environs. Cet appareil utilise un algorithme de mouvement pour identifier les menaces possibles.\n", + /*192*/ "Cet appareil utilise la meilleure des applications en mati鑽e d'anti-gravit. Il poss鐡e un lien audio/vid駮 avec une fonction d'enregistrement et d'holographie spectroscopique.\n", + /*193*/ "Un scope de courte port馥 pouvant voir travers toute mati鑽e - m麥e le plomb - et produisant une repr駸entation chromatique simplifi馥 des environs.\n", + /*194*/ "Ce scope utilise un scanner infrarouge modul par ultrason pour donner une image claire des environs et la position des irr馮ularit駸 de structure. Il peut aussi localiser les ennemis occult駸 ou utilisant un appareil de brouillage optique.\n", + /*195*/ "Il utilise les capacit駸 d'un cristal extraterrestre pour cr馥r une champs de r馭raction de la lumi鑽e autour de l'utilisateur. Il ne peut fonctionner si une turbulence cin騁ique p駭鑼re dans le champ. Ouvrir le feu annule les effets du champ.\n", + /*196*/ "Un scanner optique binoculaire de longue port馥. Le viseur affiche une image composite de deux sources d'entr馥. Il poss鐡e aussi un zoom.\n", + /*197*/ "Il peut enregistrer n'importe quelles donn馥s et les envoyer au service informatique de l'Institut. Une variante de cet appareil permet aux pirates d'騁ablir un lien direct entre eux et le terminal connect.\n", + /*198*/ "Un pisteur puissant param騁rer sur les humains, les armes, les objets, ou encore les emplacements g駮graphiques.\n", + /*199*/ "Un scanner m馘ical modifi contenant les derni鑽es donn馥s de l'騁at de sant du Pr駸ident ainsi qu'un r駸um de tous les traitements administr駸. Il peut monitorer les fonctions vitales du Pr駸ident distance m麥e s'il se trouve au milieu d'une foule.\n", + /*200*/ "Un passe-partout 駘ectronique. Il ouvre les serrures cod馥s en quelques secondes mais un syst鑪e tr鑚 駘abor lui prendra plus de temps.\n", + /*201*/ "Une merveille m馘icale maian pouvant effectuer un diagnostique automatique et une intervention chirurgicale sans aucune incision. Un seul d馭aut: il ne reconnat et donc ne fonctionne que sur des organismes maians.\n", + /*202*/ "Une petite charge de plastique explosive coupl馥 une horloge scell馥 et impossible d駸amorcer, le tout rev黎u de shrapnel en t馭lon.\n", + /*203*/ "Une bombe fusion directionnelle placer de telle fa輟n que la charge est point馥 vers le bas. Ceci interrompra les recherches des labos de la dataDyne et fera s'effondrer l'immeuble tout entier.\n", + /*204*/ "Un petit mouchard fixer sur tout relais de communication qui permet d'imiter le signal officiel, 騁ablissant ainsi le lien entre l'Institut et l'agent m麥e dans une zone de brouillage. Il fait partie int馮rante du syst鑪e de communication local cibl.\n", + /*205*/ "Le fonctionnement de ce mouchard sp馗ial est tenu secret. Le m馗anisme d'auto-destruction couvre la majeure partie de l'appareil. Il est tr鑚 probable qu'il soit un exemple de communication mol馗ulaire quantique, ceci expliquant son efficacit.\n", + /*206*/ "Il utilise la technologie de communication quantique pour fournir des informations ultra pr馗ises l'armement en orbite, ceci minimisant les risques de dommages collat駻aux. La m麥e technologie est utilis馥 pour les mouchards pisteurs de l'Institut Carrington.\n", + /*207*/ "Ils d騁aillent les points de navigation et les codes de communication ainsi que les codes et fr駲uences de l'Air Force One. Les codes de cryptage y sont aussi donn駸.\n", + /*208*/ "Toutes les donn馥s se rattachant aux recherches oc饌niques conduites par la dataDyne sur le navire d騁ourn Pelagic II y figurent. Il contient le relev sonar, les donn馥s g駮logiques, les donn馥s sur les artefacts extraterrestres, les 馗hantillons de coque, etc.\n", + /*209*/ "Le dernier enregistrement en date de la personnalit de l'IA Dr. Caroll avant conditionnement c駻饕ral. A utiliser pour 騁ude seulement ou projections th駮riques. Mental corrompu et dangereux. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un m駘ange chimique alt駻ant la perception de la cible. Le bien devient le mal, les m馗hants les gentils, les ennemis et les amis s'intervertissent. Un des nombreux projets du Secteur 51 sign Trent Easton.\n", + /*211*/ "Un uniforme diff駻ent du vtre. Portez-le et jouez la com馘ie.\n", + /*212*/ "PROX.\n", + /*213*/ "RETARD.\n", + /*214*/ "TELECOM.\n", + /*215*/ "SENTINELLE\n", + /*216*/ "IMPACT\n", + /*217*/ "M馮a Roquette\n", + /*218*/ "R馗epteur\n", + /*219*/ "Scan Pr駸.\n", + /*220*/ "Autochirur.\n", + /*221*/ "Bombe skedar\n", + /*222*/ "D駻outeComms\n", + /*223*/ "Pisteur\n", + /*224*/ "Ampli cible\n", + /*225*/ "Plans de vol\n", + /*226*/ "Cassette\n", + /*227*/ "Disque sauv.\n", + /*228*/ "Carte\n", + /*229*/ "Mallette\n", + /*230*/ "Collier\n", + /*231*/ "ScanPresident\n", + /*232*/ "Boost\n", + /*233*/ "Scan X\n", + /*234*/ "ScanHorizon\n", + /*235*/ "Ampli cible\n", + /*236*/ "Dans cette variante de la Camspy, le module d'enregistrement a 騁 remplac par du plastic hautement explosif.\n", + /*237*/ "Cette variante de la Camspy utilise une toxine neuro-active qui provoque un coma presque instantan chez la victime.\n", + /*238*/ "Collier de Cassandra De Vries. Pourvu d'une cl-駑etteur ouvrant les portes courte port馥, qui permet l'acc鑚 aux zones non-autoris馥s. Le mod鑞e Mk3 ne fonctionne que si son propri騁aire est en vie. Niveau de s馗urit AA-1 (gamma).", + /*239*/ "Collier de remplacement de Cassandra De Vries'. Nom d'utilisateur: %s Mot de passe: %s\n", + /*240*/ "Bouclier\n", + /*241*/ "Le bouclier prot鑒e son utilisateur en d騁ectant les attaques et en g駭駻ant momentan駑ent un champ de force concentr pour repousser l'attaque. Le bouclier poss鐡e une quantit d'駭ergie limit馥. Il ne prot鑒e pas l'utilisateur ind馭iniment. Les boucliers sont g駭駻alement activ駸 lorsqu'ils sont port駸, bien que celui-ci soit un prototype inachev.\n", + /*242*/ "Boosts combat\n", + /*243*/ "R馗epteur\n", + /*244*/ "Vue nocturne\n", + /*245*/ "D馗odeur\n", + /*246*/ "Pilule\n", + /*247*/ "Tranquil.\n", + /*248*/ "Autochirur.\n", + /*249*/ "Disque sauv.\n", + /*250*/ "Costume\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Mine t駘馗om.\n", + /*253*/ "Fusil pompe\n", + /*254*/ "Fusil sniper\n", + /*255*/ "Mine retard.\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_g.c b/src/files/lang/jap-final/gun_str_g.c new file mode 100644 index 000000000..9ae509d20 --- /dev/null +++ b/src/files/lang/jap-final/gun_str_g.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Hits", + /* 2*/ "Ein Fehlversuch\n", + /* 3*/ "Versagt", + /* 4*/ "Fehlversuche", + /* 5*/ "Selber schuld!", + /* 6*/ "unbewaffnet\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (Schalld.)\n", + /* 9*/ "Falcon 2 (Zielf.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop-Gewehr\n", + /* 25*/ "Schrotflinte\n", + /* 26*/ "Reaper\n", + /* 27*/ "Raketenwerfer\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Maianische Granate\n", + /* 31*/ "FS XR-20\n", + /* 32*/ "Sniper-Gewehr\n", + /* 33*/ "Armbrust\n", + /* 34*/ "Bet舫bungs-Gewehr\n", + /* 35*/ "Kampfmesser\n", + /* 36*/ "Granate\n", + /* 37*/ "N-Bombe\n", + /* 38*/ "Zeitznder-Mine\n", + /* 39*/ "Ann臧erungs-Mine\n", + /* 40*/ "Fernznder-Mine\n", + /* 41*/ "ECM-Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Verkleidung\n", + /* 44*/ "Rakete\n", + /* 45*/ "Zielsuch-Rakete\n", + /* 46*/ "Granaten\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolzen\n", + /* 49*/ "Psychosis-Gewehr\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KLO1313\n", + /* 53*/ "KF7 Spezial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Nachtsicht-Ger舩\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Tr-Decoder\n", + /* 64*/ "Sprengsatz\n", + /* 65*/ "Rntgen-Scanner\n", + /* 66*/ "extraterrestrisches Medipack\n", + /* 67*/ "Koffer\n", + /* 68*/ "Verkleidung\n", + /* 69*/ "IR-Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Aktenkoffer\n", + /* 72*/ "Suizid-Kapsel\n", + /* 73*/ "Tarnkappe\n", + /* 74*/ "Adrenalin\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizont-Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FS XR-20\n", + /* 80*/ "R-Werfer\n", + /* 81*/ "A-Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Messer\n", + /* 84*/ "DY357\n", + /* 85*/ "Einzelfeuer\n", + /* 86*/ "Schnellfeuer\n", + /* 87*/ "Feuersto゚\n", + /* 88*/ "Streufeuer\n", + /* 89*/ "Schrotflintenfeuer\n", + /* 90*/ "Rail-gun-Effekt\n", + /* 91*/ "Raketenabschuss\n", + /* 92*/ "kalibrierte Rakete\n", + /* 93*/ "Fly-By-Wire-Rakete\n", + /* 94*/ "Schlag \n", + /* 95*/ "Explosiv-Munition\n", + /* 96*/ "gezielte Schsse\n", + /* 97*/ "Magazin-Entleerung\n", + /* 98*/ "Granat-Werfer\n", + /* 99*/ "Wandhaftung\n", + /*100*/ "Schlag\n", + /*101*/ "entwaffnen\n", + /*102*/ "Zielaufschaltung\n", + /*103*/ "Zielfernrohr kompatibel\n", + /*104*/ "halbes Magazin wird entleert\n", + /*105*/ "Doppelschuss\n", + /*106*/ "Schleifer\n", + /*107*/ "Sedativ\n", + /*108*/ "letale Injektion\n", + /*109*/ "Messerstich\n", + /*110*/ "vergiftetes Wurfmesser\n", + /*111*/ "Zielsucher\n", + /*112*/ "sofortige Eliminierung\n", + /*113*/ "Verst舐kung\n", + /*114*/ "Umkehr\n", + /*115*/ "High Impact-Munition\n", + /*116*/ "Tarnung\n", + /*117*/ "Selbstschussanlage\n", + /*118*/ "Ann臧erungsfunktion\n", + /*119*/ "Gefahrenmelder\n", + /*120*/ "verzgerte Explosion\n", + /*121*/ "Expl. bei N臧erung\n", + /*122*/ "ferngez. Explosion\n", + /*123*/ "Detonator\n", + /*124*/ "Vier-Sekunden-Zndung\n", + /*125*/ "Ann臧erungs-Pinball\n", + /*126*/ "Verzgerte Detonation\n", + /*127*/ "Expl. bei N臧erung\n", + /*128*/ "dreifacher Schuss\n", + /*129*/ "aufgeladener Schuss\n", + /*130*/ "Hocken\n", + /*131*/ "infizieren\n", + /*132*/ "Feuerst゚e\n", + /*133*/ "Kurzstrecken-Strahl\n", + /*134*/ "Kontakt-Detonation\n", + /*135*/ "Restlichtverst舐ker\n", + /*136*/ "Mobile Kamera\n", + /*137*/ "Rntgen-Sicht\n", + /*138*/ "Infrarot-Scanning\n", + /*139*/ "Zoom\n", + /*140*/ "Strsender\n", + /*141*/ "Verbindung\n", + /*142*/ "Zielidentifizierung\n", + /*143*/ "Kann angelegt werden\n", + /*144*/ "Sprengs舩ze mssen platziert werden\n", + /*145*/ "Teleskop-Sicht\n", + /*146*/ "Schalld舂pfer\n", + /*147*/ "Magazin-Erweiterung\n", + /*148*/ "Ziel-Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maianisch\n", + /*154*/ "JonesCorp\n", + /*155*/ "Auch ohne Waffen sind Sie ein wrdiger Gegner. Setzen Sie Ihre F舫ste ein, um Gegner niederzuschlagen oder zu entwaffnen. Anschlie゚end knnen Sie deren Waffen aufsammeln.\n", + /*156*/ "Diese zielgenaue und treffsichere Waffe wird von den Mitarbeitern des Instituts bevorzugt eingesetzt. Verwenden Sie die Laser-Zieleinheit, um Schsse punktgenau zu platzieren. Im Gefecht empfiehlt es sich, von der Pistolen-Funktion Gebrauch zu machen.\n", + /*157*/ "Eine verbesserte Falcon 2, die noch zus舩zlich ber einen Schalld舂pfer verfgt.\n", + /*158*/ "Eine verbesserte Falcon 2, die durch ein Pr艘isions-Fernrohr noch zus舩zlich an Genauigkeit gewinnt.\n", + /*159*/ "Eine state-of-the-art Milit舐-Pistole, die haupts臘hlich von Friedenstruppen eingesetzt wird. Die Waffe verfgt ber eine leichte Zoom-Funktion und feuert drei Kugeln gleichzeitig ab (Sekund舐).\n", + /*160*/ "Wenn Sie auf einen Skedar treffen, ist er vermutlich mit dieser Waffe ausgestattet. Ein gro゚es Magazin macht diese Pistole zu einer formidablen Handfeuerwaffe. Aber die Sekund舐-Funktion ist noch bemerkenswerter. Die Feuerkraft kann durch Aufladen verst舐kt werden, kostet aber Munition.\n", + /*161*/ "Die dataDyne DY357 ist die st舐kste Handfeuerwaffe der Welt. Jede Kugel verfgt ber einen hohen Penetrations-Faktor und schleudert das Ziel zurck. Modifizierte Modelle werden nur fr spezielle Kunden angefertigt. NSA-Chef Trent Easton verfgt angeblich ber eine vergoldete Variante.\n", + /*162*/ "Die DY357-LX wurde speziell fr Trent Easton angefertigt. Neben einem mit Tigerleder berzogenen Griff verfgt diese Pistole ber einen integrierten Beschleuniger, der jeder Kugel noch mehr Kraft verleiht.\n", + /*163*/ "Die Maianische Standard-Waffe. Eine flexible Waffe, die in der Lage ist, sowohl normale als auch Explosiv-Geschosse abzufeuern. Bei letzterer Variante wird nicht mehr Munition als sonst verbraucht.\n", + /*164*/ "Ein dataDyne-Klassiker und Bestseller! Dieses Maschinengewehr verfgt ber ein 32er Magazin und eine Sonderfunktion. Jedes sichtbare Ziel kann fixiert werden. Dieses Feature macht jeden durchschnittlichen Schtzen zu einem Profi. Vorausgesetzt natrlich, er oder sie ist intelligent genug, die Waffe zu bedienen. Durchschnittliche Feuerrate: 900 rpm.\n", + /*165*/ "Das Sturmgewehr des Carrington Instituts. Diese Waffe zeichnet sich durch hohe Reichweite und Magazin-Kapazit舩 aus. Die Sekund舐-Funktion ermglicht es dem Schtzen, sich zu bewegen, w臧rend er auf ein Ziel zoomt. Durchschnittliche Feuerrate: 750 rpm.\n", + /*166*/ "Ein Standard-Gewehr mit ワberraschungseffekt. Die Sekund舐-Funktion verwandelt es in eine Mine, die auf Bewegungen reagiert, aber nach wie vor wie ein herumliegendes Gewehr aussieht. Durchschnittliche Feuerrate: 700 rpm.\n", + /*167*/ "Eine Variante des Dragon. Anstatt der Minen-Funktion verfgt die Waffe ber einen kleinen Granat-Werfer. Hervorragend als Untersttzung. Durchschnittliche Feuerrate: 700 rpm.\n", + /*168*/ "High-tech pur von dataDyne. Der Avenger wird als Sturmgewehr eingesetzt. Die wichtigste Funktion ist ein Gefahren-Melder, der auf die Anwesenheit von Sprengkrpern, Selbstschu゚anlagen und トhnlichem reagiert. Durchschnittliche Feuerrate: 950 rpm.\n", + /*169*/ "Speziell fr Bodyguards. Die Cyclone wird auch von der Leibwache des Pr舖identen eingesetzt. In Extremsituationen kann die Feuerrate um mehr als das Doppelte erhht werden. Allerdings wird durch diese Aktion das Magazin in sekundenschnelle geleert. Durchschnittliche Feuerrate: 900 rpm bzw. 2000 rpm.\n", + /*170*/ "Die geheime Waffe des Carrington Instituts. Verfgt ber eine hohe Feuerrate und ein gro゚es Magazin. Die Sekund舐-Funktion aktiviert eine Tarnfunktion, allerdings auf Kosten der Munition. Daher sollte diese Funktion mit gr゚ter Vorsicht gehandhabt werden. Durchschnittliche Feuerrate: 1100 rpm.\n", + /*171*/ "Ein weiteres Beispiel Maianischer Waffentechnik. Diese Waffe feuert normale Munition mit der gleichen Geschwindigkeit ab, wie jedes andere Gewehr. Es sind aber auch Hochgeschwindigkeits-Schsse mglich, die Deckungen durchbrechen knnen. Der Nachteil dabei ist, dass die Feuerrate sinkt und aufgrund des Rcksto゚es die Genauigkeit leidet. Durchschnittliche Feuerrate: 900 rpm bzw. 300 rpm.\n", + /*172*/ "Ein Maschinengewehr, das in der Form eines Laptops designt wurde. In Tarnform kann nicht gefeuert werden. Diese Waffe h舁t auch einer genaueren Untersuchung stand. Sie wird wie jeder PC gebootet, verfgt aber nur ber ein Viertel des Speichers. Durschnittliche Feuerrate: 1000 rpm.\n", + /*173*/ "Eine dataDyne-Waffe fr die hausinterne Security. Ein neunfaches Magazin in Kombination mit Einfach- oder Doppelfeuer macht diese Waffe zu einem gef臧rlichen Nahkampf-Instrument.\n", + /*174*/ "In den H舅den von jemandem, der den starken Rcksto゚ ausgleichen kann, ist dies wohl die schrecklichste aller Waffen. Auf jeden Fall eignet sie sich hervorragend fr Gefechte in engen Korridoren. Maximale Feuerrate: 1800 rpm.\n", + /*175*/ "An und fr sich eine sehr unhandliche Waffe. Sie feuert eine Standard-Rakete oder eine langsamere Zielsuch-Rakete auf das Ziel ab.\n", + /*176*/ "Ein von dataDyne entworfener Granatwerfer. Die Sekund舐funktion umhllt die Granate mit einer klebrigen Substanz, welche die Haftung an W舅den und Decken ermglicht. Einige Sekunden sp舩er f舁lt die Granate zu Boden, wo sie detoniert.\n", + /*177*/ "Die Skedar lieben es, die Angst in den Augen ihrer Gegner zu sehen. Daher ist es beinahe selbstverst舅dlich, dass sie mit der Sekund舐-Funktion ihres Raketenwerfers ein Geschoss fernsteuern knnen. So knnen sie sich an den vergeblichen Fluchtversuchen ihrer Opfer weiden.\n", + /*178*/ "Das Fernsicht-Gewehr ist ein Maianischer Hybrid zwischen einem Rntgen-Scanner und einem Gewehr, das durch feste Objekte schie゚en kann. Das Fernrohr ist in der Lage, langsame lebende Objekte zu erfassen und als festgelegten Zielpunkt zu speichern.\n", + /*179*/ "Ausgestattet mit hervorragender Zoom-F臧igkeit und Hochgeschwindigkeits-Kugeln ist dies wohl eines der besten Sniper-Gewehre aller Zeiten. In geduckter Haltung erzielen Sie die bestmgliche Genauigkeit.\n", + /*180*/ "Die Armbrust ist nicht gr゚er als eine Pistole, und wird am Handgelenk des Agenten befestigt. Die Spannweite der Waffe kann aus Grnden der Geheimhaltung verringert werden. Die Munition umfasst bis zu fnf entweder vergiftete oder regelrecht letale Bolzen.\n", + /*181*/ "Eine Vorrichtung, die im Notfall auch als Waffe benutzt werden kann. Der eigentliche Verwendungszweck dient aber der Verabreichung von Sedativen. Eine volle Entladung des Reservoirs kann durchaus fatale Folgen haben.\n", + /*182*/ "Ein sehr gro゚es Kampfmesser. Es enth舁t eine Giftkapsel, die beim Aufprall nach einem Wurf zerbricht. Das Gift entfaltet im Normalfall nach ca. sechs Sekunden seine Wirkung. Eine typische dataDyne-Waffe.\n", + /*183*/ "Eine verbesserte Version der Granate. Kann sowohl mit verzgerter Detonation als auch mit Ann臧erungs-Sensor eingesetzt werden. \n", + /*184*/ "Eine kleine Neutronenbombe mit reduziertem Wirkungsradius. Die Detonation kann, je nach Wunsch, beim Aufprall oder bei Ann臧erung erfolgen.\n", + /*185*/ "Eine Mine mit verzgerter Detonation. Diese Waffe verfgt ber einen Gefahren-Sensor, der als Sekund舐-Funktion aktiviert werden kann.\n", + /*186*/ "Eine Mine, die auf Bewegung reagiert. Diese Waffe verfgt ber einen Gefahren-Sensor, der als Sekund舐-Funktion aktiviert werden kann.\n", + /*187*/ "Diese Mine kann ferngezndet werden. Die Sekund舐-Funktion stellt quasi die Aktivierung dar.\n", + /*188*/ "Diese Strsender-Vorrichtung ist in der Lage, in jedem System, mit dem sie verbunden ist, eine fokusierte elektrische Strung zu simulieren. Voraussetzung ist ein unmittelbarer Kontakt mit dem System.\n", + /*189*/ "Der Laser wird am Handgelenk getragen und verfgt ber perfekte Pr艘ision. Man kann mit ihm entweder Langstrecken-Energiest゚e oder einen konstanten, hochkonzentrierten Kurstrecken-Energiestrom entladen.\n", + /*190*/ "Genetische Stimulation fr die Anwendung im Kampf. Nach der Anwendung erscheint der zeitliche Ablauf verlangsamt, was eine wesentlich hhere Reaktionsf臧igkeit zur Folge hat.\n", + /*191*/ "Das neueste Produkt in einer Reihe von Ger舩en, das nicht nur Restlicht verst舐kt, um eine klarere Wahrnehmung der Umgebung zu ermglichen, sondern auch mit Hilfe eines Ziel-Algorithmus mgliche Gefahren erkennt und entsprechend hervorhebt.\n", + /*192*/ "Dieses Ger舩 beinhaltet die kleinstmgliche Antigravitations-Technologie. Als ultimative Spionage-Einheit bietet der CamSpy Video- und Audio-Links, Aufzeichnungsfunktion und eine integrierte Vorrichtung fr spektroskopische Holografie.\n", + /*193*/ "Dieser Scanner kann auf kurze Strecken jegliches Material durchleuchten. Blei bildet hier keine Ausnahme! Der Anwender nimmt eine vereinfachte, chromatisierte Darstellung der Umgebung wahr.\n", + /*194*/ "Der IR-Scanner setzt mit Ultraschall modulierte Infrarot-Strahlung ein, um die Umgebung auf strukturelle Irregularit舩en zu untersuchen. Der Anwender erh舁t ein erstaunlich detailliertes Bild der Gegebenheiten. Au゚erdem durchdringt der Scanner auch jegliche Art von Tarnkappen-Technologie und andere optische T舫schungen.\n", + /*195*/ "Diese Maschine nutzt die lichtbrechenden Eigenschaften einer kristallinen extraterrestrischen Substanz, um den Tr臠er unsichtbar erscheinen zu lassen. Solange es zu keinen kybernetischen Strungen kommt, bleibt das Feld intakt. Aber schon der Einsatz einer Waffe unterbricht diese Funktion.\n", + /*196*/ "Ein binokularer Langstrecken-Scanner. Im Sichtfenster erscheint ein Bild, welches aus den beiden optischen Eingaben zusammengestellt wird. Zoom vorhanden.\n", + /*197*/ "Mit Hilfe dieses Ger舩s knnen nahezu alle Arten von gespeicherten Daten abgerufen und direkt an die Hacker des Instituts gesandt werden. Eine Variante dieser Maschine erlaubt den Hackern durch einen direkten Link den Zutritt zum lokalen System.\n", + /*198*/ "Ein ausgezeichnetes Suchger舩, das auf jegliche Parameter konfiguriert werden kann: Personen, Waffen, Gegenst舅de und Orte sind nur ein Bruchteil der Optionen, welche der Tracker anbietet.\n", + /*199*/ "Ein modifizierter medizinischer Scanner, der die aktuellen Vital-Werte des Pr舖identen anzeigt. Es werden auch 舁tere Daten und verschiedene Behandlungen archiviert. Der Scanner ist in der Lage, die entsprechenden Werte auch ber gr゚ere Entfernungen zu erfassen. Dies ist auch mglich, wenn sich das Ziel inmitten einer Menschenmenge befindet.\n", + /*200*/ "Ein einfacher, aber wirkungsvoller Safeknacker, der elektronisch codierte Schlsser normalerweise innerhalb von Sekunden knackt. Selbstverst舅dlich h舅gt dies auch vom jeweiligen Schloss ab.\n", + /*201*/ "Ein Wunder Maianischer Technologie. Dieses Instrument erstellt eine automatische Diagnose und fhrt die entsprechenden chirurgischen Eingriffe OHNE Einschnitte durch. Der Nachteil ist, dass es nur bei Maianern funktioniert.\n", + /*202*/ "Ein kleiner Plastik-Sprengsatz, dessen Timer durch ein Siegel vor Missbrauch geschtzt wird. Die Schrapnelle sind mit Teflon ummantelt. Sehr bse!\n", + /*203*/ "Hierbei handelt es sich um eine direktionale Fusionsbombe, die so platziert wird, dass die Entladung nach unten geht. Dadurch werden die dataDyne-Labors verwstet, und der Rest des Geb舫des strzt in das so entstandene Loch.\n", + /*204*/ "Eine kleine Wanze, die an jedem Kommunikations-Ger舩 angebracht werden kann. Diese Vorrichtung benutzt das Fremdsignal, um eine Verbindung zwischen dem Agenten und dem Institut herzustellen. Das Signal kann auch zurckverfolgt werden, um den Standort des Agenten zu bestimmen. Vor allem in Situationen hchster Bedr舅gnis hat sich der Einsatz hervorragend bew臧rt. Ein unverzichtbares Zubehr fr jeden Agenten.\n", + /*205*/ "Das Innenleben dieser Wanze ist ein gut gehtetes Geheimnis. Fest steht, dass der Selbstzerstrungsmechanismus ein wichtiger Bestandteil ist. Man vermutet, das die Wanze auf quantenmolekularer Kommunikation aufbaut, welche die ph舅omenale Verl舖slichkeit des Ger舩s erkl舐en wrde.\n", + /*206*/ "Quantenmolekulare Technologie ermglicht au゚erordentlich akkurate Zielerfassung fr Orbitalwaffen. Dadurch wird der Schadensradius auf den ntigen Umfang beschr舅kt. \n", + /*207*/ "Detaillierte Flugpl舅e, Kommunikationscodes und Frequenzen fr die Air Force One. Beinhaltet auch Dechiffrier-Codes.\n", + /*208*/ "Betrifft alle Daten der Forschungsarbeit, die durch dataDyne von der gekaperten Pelagic II am Meeresgrund durchgefhrt wurden. Der Inhalt besteht aus Sonar-Karten, geologischen Daten, Gewebeproben etc.\n", + /*209*/ "Die letzte Aufzeichnung der Persnlichkeit der knstlichen Intelligenz, die sich selbst Dr. Caroll nennt. Die Aufzeichnung wurde vor der Lschung und cerebralen Restrukturierung durchgefhrt. Kann zu Studienzwecken herangezogen worden. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Ein chemischer Cocktail, der die Realit舩swahrnehmung der Zielperson umkehrt. Gut wird zu Bse, Bse wird zu gut, Freund und Feind tauschen die Pl舩ze. Ein weiteres Forschungsergebnis, entwickelt von Trent Easton in der Area 51.\n", + /*211*/ "Tragen Sie diese Verkleidung, um unerkannt zu bleiben.\n", + /*212*/ "BEWEG\n", + /*213*/ "ZEIT\n", + /*214*/ "FERN\n", + /*215*/ "AUTO\n", + /*216*/ "SCHLAG\n", + /*217*/ "Big King-Rakete\n", + /*218*/ "Data Uplink\n", + /*219*/ "Pr舖identen-Scanner\n", + /*220*/ "Auto-Chirurg\n", + /*221*/ "Skedar-Bombe\n", + /*222*/ "Komm-Wanze\n", + /*223*/ "Wanze\n", + /*224*/ "Peilger舩\n", + /*225*/ "Flugpl舅e\n", + /*226*/ "Forschungsdaten\n", + /*227*/ "Sicherungsdiskette\n", + /*228*/ "Schlsselkarte\n", + /*229*/ "Aktentasche\n", + /*230*/ "Halskette\n", + /*231*/ "Pr舖identScan\n", + /*232*/ "Adrenalin\n", + /*233*/ "R-Scanner\n", + /*234*/ "H-Scanner\n", + /*235*/ "Ziel-Verst.\n", + /*236*/ "Bei dieser Version des CamSpy wurde die Aufzeichnungs-Funktion durch einen starken Plastik-Sprengsatz ersetzt.\n", + /*237*/ "Diese Version des CamSpy verfgt ber ein paralysierendes Nervengift, das die Zielperson fast augenblicklich in Katatonie versetzt.\n", + /*238*/ "Cassandra De Vries Halskette. Beinhaltet eine Ann臧erungs-Schlsselkarte, um Sperrzonen betreten zu knnen. Das MK3 Modell funktioniert nur, solange der Besitzer am Leben ist. Sicherheitsklasse AA-1 (gamma).", + /*239*/ "Cassandra De Vries Ersatzhalskette. Benuzername: %s Passwort: %s\n", + /*240*/ "Schild\n", + /*241*/ "Der Schild schtzt den Tr臠er, indem er automatisch Gefahren erkennt und ein tempor舐es Kraftfeld errichtet. Dadurch wird die Attacke neutralisiert. Der Schild verfgt ber einen begrenzten Energievorrat. Die Schutzfunktion kann also nur ber eine bestimmte Zeitspanne gew臧rleistet werden. Im Normalfall werden Schilde aktiv, sobald sie von jemandem getragen werden, auch wenn es so aussieht, als w舐e dieser spezielle Schild ein nicht-funktionabler Prototyp.\n", + /*242*/ "Adrenalin\n", + /*243*/ "Data Uplink\n", + /*244*/ "Nachtsicht\n", + /*245*/ "Decoder\n", + /*246*/ "Suizid-Pille\n", + /*247*/ "B-Gewehr\n", + /*248*/ "Medipack\n", + /*249*/ "Backup\n", + /*250*/ "Verkl.\n", + /*251*/ "Laptop\n", + /*252*/ "F-Mine\n", + /*253*/ "Schrotfl.\n", + /*254*/ "Sniper\n", + /*255*/ "Z-Mine\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_i.c b/src/files/lang/jap-final/gun_str_i.c new file mode 100644 index 000000000..a0f12d74c --- /dev/null +++ b/src/files/lang/jap-final/gun_str_i.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Vittime", + /* 2*/ "Morto una volta\n", + /* 3*/ "Morto", + /* 4*/ "volte", + /* 5*/ "Suicidi", + /* 6*/ "A mani nude\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenz.)\n", + /* 9*/ "Falcon 2 (cannoc.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Vendetta\n", + /* 20*/ "Ciclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Pistola Laptop\n", + /* 25*/ "Fucile a pompa\n", + /* 26*/ "Falciatore\n", + /* 27*/ "Lanciamissili\n", + /* 28*/ "Devastatore\n", + /* 29*/ "Killer\n", + /* 30*/ "Granata Maian\n", + /* 31*/ "TeleVista XR-20\n", + /* 32*/ "Fucile cecchino\n", + /* 33*/ "Balestra\n", + /* 34*/ "Sedativo\n", + /* 35*/ "Pugnale da lotta\n", + /* 36*/ "Granata\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina orologeria\n", + /* 39*/ "Mina prossimit濬n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Travestimento\n", + /* 44*/ "Missile\n", + /* 45*/ "Missile ritorno\n", + /* 46*/ "Granata a giro\n", + /* 47*/ "Laser\n", + /* 48*/ "Dardo\n", + /* 49*/ "PsicoArma\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Vista Notturna\n", + /* 60*/ "TeleSpia\n", + /* 61*/ "CapsuSpia\n", + /* 62*/ "BombaSpia\n", + /* 63*/ "Decodificatore\n", + /* 64*/ "Esplosivo\n", + /* 65*/ "Scanner a raggi X\n", + /* 66*/ "AutoChirurgo alieno\n", + /* 67*/ "Valigia\n", + /* 68*/ "Travestimento\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Puntatore-R\n", + /* 71*/ "Cartella\n", + /* 72*/ "Compressa suicidio\n", + /* 73*/ "Dispos. mimetico\n", + /* 74*/ "Booster lotta\n", + /* 75*/ "Connettore Dati\n", + /* 76*/ "TeleScanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "TeleVista\n", + /* 80*/ "Lanciamissili\n", + /* 81*/ "Mina pross\n", + /* 82*/ "PsicoArma\n", + /* 83*/ "Pugnale\n", + /* 84*/ "DY357\n", + /* 85*/ "Colpo singolo\n", + /* 86*/ "Fuoco rapido\n", + /* 87*/ "Fuoco a raffica\n", + /* 88*/ "Falciata\n", + /* 89*/ "Fuoco a scoppio\n", + /* 90*/ "Effetto rail-gun\n", + /* 91*/ "Lancio missili\n", + /* 92*/ "Missile guidato\n", + /* 93*/ "Missile filoguidato\n", + /* 94*/ "Botta col calcio\n", + /* 95*/ "Capsule esplosive\n", + /* 96*/ "Spari guidati\n", + /* 97*/ "Scarica del caricatore\n", + /* 98*/ "Lanciagranate\n", + /* 99*/ "Arpione\n", + /*100*/ "Pugno\n", + /*101*/ "Disarma\n", + /*102*/ "Segui l'obiettivo\n", + /*103*/ "Usa cannocchiale\n", + /*104*/ "Mezza scarica caricatore\n", + /*105*/ "Doppio scoppio\n", + /*106*/ "Macinatore\n", + /*107*/ "Sedativo\n", + /*108*/ "Iniezione letale\n", + /*109*/ "Pugnalata\n", + /*110*/ "Lancia lama avvelenata\n", + /*111*/ "Localizza-Obiettivo\n", + /*112*/ "Morte istantanea\n", + /*113*/ "Booster\n", + /*114*/ "Invertitore\n", + /*115*/ "Capsule a impatto\n", + /*116*/ "Mimesi\n", + /*117*/ "Pistola sentinella\n", + /*118*/ "Autodistr. di pross.\n", + /*119*/ "Rilevatore minaccia\n", + /*120*/ "Esplosivo a orol.\n", + /*121*/ "Esplosivo di pross.\n", + /*122*/ "Esplosivo a distanza\n", + /*123*/ "Detonazione\n", + /*124*/ "Miccia a 4 secondi\n", + /*125*/ "Ping-pong di pross.\n", + /*126*/ "Detonazione a orol.\n", + /*127*/ "Detonazione di pross.\n", + /*128*/ "Triplice esplosione\n", + /*129*/ "Sparo a ricarica\n", + /*130*/ "Accucciarsi\n", + /*131*/ "Infettare\n", + /*132*/ "Fuoco a impulsi\n", + /*133*/ "Laser a breve raggio\n", + /*134*/ "Detonazione a impatto\n", + /*135*/ "Illuminatore\n", + /*136*/ "Telecamera mobile\n", + /*137*/ "Vista a raggi X\n", + /*138*/ "Immagine termica\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo disturbo\n", + /*141*/ "Connetti\n", + /*142*/ "Identifica obiettivi\n", + /*143*/ "Travestiti\n", + /*144*/ "Piazza esplosivo\n", + /*145*/ "Vista telescopica\n", + /*146*/ "Silenziatore\n", + /*147*/ "Estensione caricatore\n", + /*148*/ "Vista Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Anche disarmato sei ancora un temibile avversario. Usa il pugno per mandare KO o per disarmare i tuoi avversari e raccogli le loro armi.\n", + /*156*/ "Precisa e affidabile, questa l'arma comunemente usata nelle operazioni dell'istituto. Usa la vista laser per sparare pallottole letali o colpisci i nemici con il calcio della pistola.\n", + /*157*/ "Una Falcon 2 potenziata, dotata di silenziatore e comunque letale.\n", + /*158*/ "Una Falcon 2 potenziata, dotata di cannocchiale a due ingrandimenti per il massimo della precisione.\n", + /*159*/ "Una pistola militare all'avanguardia comunemente usata dalle forze di pace. ネ dotata di zoom e di modalit secondaria di sparo a triplice esplosione.\n", + /*160*/ "Di solito queste armi sono tipiche degli Skedar. Il capiente caricatore e la canna affilata rendono questa pistola un'arma formidabile, sebbene il colpo letale sia dovuto alla sua funzione secondaria: ricaricala per maggiore potenza a costo di qualche giro di munizioni.\n", + /*161*/ "La DY357 dataDyne la pistola pi potente che esista. Ogni colpo ha un impressionante fattore di penetrazione e colpisce l'obiettivo con tutto il peso e la potenza dello sparo. Se ne producono modelli personalizzati su commissione. Pare che Trent Easton ne abbia una placcata d'oro.\n", + /*162*/ "La DY357-LX stata creata per il direttore della NSA, Trent Easton. Oltre al calcio ricoperto in pelle di tigre, quest'arma dorata vanta anche una canna speciale che conferisce al proiettile incredibile velocit e forza.\n", + /*163*/ "ネ la dotazione Maian standard: una pistola versatile per colpi normali o esplosivi senza ripercussioni sul resto del caricatore.\n", + /*164*/ "Questo classico prodotto dataDyne il fucile mitragliatore pi venduto: vanta un caricatore a 32 colpi e la speciale caratteristica di identificare e mirare sul bersaglio nell'intero campo visivo. Trasforma un tiratore scelto medio in uno eccellente, sempre che sia in grado di manovrare l'arma. Velocit media di fuoco: 900 giri/min.\n", + /*165*/ "Il principale fucile d'assalto del Carrington Institute, dotato di gittata e caricatore ottimi. La modalit secondaria permette a chi lo usa di spostarsi mentre zooma sul bersaglio. Velocit media di fuoco: 750 giri/min.\n", + /*166*/ "Un fucile d'assalto standard con un'innovazione micidiale: nella modalit secondaria diventa una mina di prossimit molto simile ad una pistola. Velocit media di fuoco: 700 giri/min.\n", + /*167*/ "Una variante del fucile d'assalto Dragon: invece dell'esplosivo di prossimit dotato un piccolo lanciagranate. Eccellente arma d'appoggio. Velocit media di fuoco: 700 giri/min.\n", + /*168*/ "Altro esempio di alta tecnologia della dataDyne. Solitamente un fucile d'assalto con un caricatore ridotto e perforazione potente, dotato di rilevatore di minaccia per identificare esplosivi, pistole a muro e altro.Velocit media di fuoco: 950 giri/min.\n", + /*169*/ "Progettata per le guardie del corpo, la Ciclone stata adottata dalle Forze di Sicurezza del Presidente per gli eccezionali risultati in caso di soppressione. In estreme circostanze, la velocit di fuoco pu essere raddoppiata, scaricando il caricatore in un secondo. Velocit media di fuoco: 900 giri/min. Scarica a 2000 giri/min.\n", + /*170*/ "L'arma segreta del Carrington Institute. Velocit di fuoco fenomenale e straordinaria capacit del caricatore. La modalit secondaria una funzione nascosta che esaurisce le munizioni nel caricatore. Un'arma distruttiva. Velocit media di fuoco: 1100 giri/min.\n", + /*171*/ "Un altro eccellente esempio di arma Maian. Pu sparare colpi ordinari alla velocit degli altri fucili mitragliatori, ma anche scariche ad alta velocit in grado di perforare oggetti e trovare obiettivi nascosti. Gli unici svantaggi della modalit secondaria sono la ridotta velocit di fuoco e la mancanza di precisione a causa della potenza dello sparo. Velocit media di fuoco: 900 giri/min. (m/s:300 giri/min.).\n", + /*172*/ "Un fucile mitragliatore dalle sembianze di un computer portatile. Quando chiuso, non pu sparare, ma attivandolo assume la sua forma micidiale. Se ispezionato a fondo pu essere scoperto: il PC si avvia, ma la sua memoria solo un quarto del normale.Velocit media di fuoco: 1000 giri/min.\n", + /*173*/ "Un'arma dataDyne realizzata per le forze di sicurezza. Il caricatore a nove cartucce assieme alla modalit di sparo semplice o doppia ne fanno un'arma pericolosa a distanze ravvicinate.\n", + /*174*/ "Un'arma terrificante se nelle mani di qualcuno abbastanza robusto da resistere al forte contraccolpo; altrimenti molto difficile da controllare ma comunque capace di aprire utili corridoi. Velocit massima di fuoco: 1800 giri/min.\n", + /*175*/ "Un'arma ingombrante capace di sparare un missile standard o uno pi lento che rientra alla base dopo aver seguito lo sfortunato obiettivo.\n", + /*176*/ "Un sistema a lunga gittata per il lancio di granate realizzato dalla dataDyne. La modalit secondaria ricopre gli ordigni di una sostanza collosa: quando viene sparata, la granata si attacca alle pareti e ai soffitti. Dopo pochi secondi si stacca e cade a terra, esplodendo.\n", + /*177*/ "Gli Skedar godono nel vedere i nemici tremare di terrore. ネ dunque ovvio che sul loro lanciamissili standard abbiano un missile telecomandato nella modalit secondaria, in modo che possano divertirsi guardando la preda che cerca inutilmente di scappare al proiettile che si avvicina.\n", + /*178*/ "Il fucile TeleVista un'arma Maian risultante dall'unione di un sistema di scansione a raggi X e un fucile capace di perforare oggetti solidi. Il dispositivo pu puntare e seguire le forme di vita, sebbene non raggiunga la stessa velocit del nemico in corsa.\n", + /*179*/ "Grazie al potente zoom e alla pallottola ad elevata velocit, quest'arma del Carrington Institute uno dei migliori fucili cecchino mai prodotti. Accucciandosi si ottiene la massima precisione.\n", + /*180*/ "Questa balestra un esempio di 'pistola' di piccole dimensioni, portata al polso di un agente del Carrington Institute. Si pu ripiegare per nasconderla e pu sparare fino a cinque colpi dall'effetto narcotico o letale.\n", + /*181*/ "Un dispositivo per attacchi serrati che in casi di emergenza pu essere usato anche come arma bench progettato come spray dermico per la somministrazione di sedativi. ネ bene ricordare che scaricare l'intero serbatoio pu avere conseguenze fatali.\n", + /*182*/ "Un pugnale da combattimento dalle grandi dimensioni contenente una fiala di veleno che si frantuma al lancio, eliminando la vittima in sei secondi al massimo. Una tipica arma dataDyne.\n", + /*183*/ "Una versione aggiornata della tradizionale granata. Pu essere lanciata con una miccia a quattro secondi o usata quale bomba di prossimit.\n", + /*184*/ "Una bomba a mano al neutrone dal raggio d'azione limitato. Pu essere fatta esplodere al momento dell'impatto o con esplosione di prossimit.\n", + /*185*/ "Una mina con miccia a breve tempo. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalit secondaria.\n", + /*186*/ "Una mina con miccia di prossimit. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalit secondaria.\n", + /*187*/ "Una mina da fare esplodere a distanza. Il comando di attivazione la sua modalit secondaria.\n", + /*188*/ "Un dispositivo di disturbo intenzionale di alta precisione, capace di simulare un comune guasto elettrico nel sistema a cui applicato.\n", + /*189*/ "Il laser viene portato al polso ed estremamente preciso. Pu emettere impulsi a lunga gittata o un fascio di energia costante e concentrata per breve gittata.\n", + /*190*/ "Stimolanti genetici realizzati per il combattimento. Quando vengono somministrati, sembrano rallentare lo scorrere del tempo per consentire una finestra di reazione.\n", + /*191*/ "La versione pi recente di una serie di sonde a 'luce lunare' che migliora l'illuminazione per produrre un'immagine pi chiara dell'ambiente circostante. Utilizza un algoritmo basato sullo spostamento dell'obiettivo per rilevare le possibili minacce.\n", + /*192*/ "Pur utilizzando la minima applicazione della tecnologia antigravitazionale, questo il pi avanzato dispositivo di spionaggio. Dotato di collegamento audio/video con funzione di registrazione e strumentazione di bordo per l'olografia spettroscopica.\n", + /*193*/ "Una sonda a breve raggio d'azione capace di vedere attraverso ogni materiale, persino il piombo, che produce una raffigurazione cromatica semplificata dell'ambiente.\n", + /*194*/ "Questa sonda utilizza la tecnica di scansione a raggi rossi modulati con dati ultrasonici per fornire un'immagine pi chiara dell'area circostante e identificare qualsiasi irregolarit strutturale. Inoltre pu localizzare i nemici grazie alla tecnologia di mimetizzazione o altre illusioni ottiche.\n", + /*195*/ "Utilizza le qualit di distorsione della luce di un cristallo alieno per creare un campo di riflesso attorno a chi lo indossa. Funziona solo se i disturbi cinetici entro il campo delimitato sono ridotti: basta sparare con una pistola per ristabilire la piena visibilit.\n", + /*196*/ "Un dispositivo di scansione visiva binoculare a lungo raggio. Viene mostrata un'immagine composita delle due fonti visive. Dotato di zoom.\n", + /*197*/ "Capace di eseguire l'interrogazione a distanza dei dati memorizzati, rispediti direttamente agli hacker dei computer dell'istituto. Una variante di questo dispositivo fornisce agli hacker un collegamento diretto al sistema locale.\n", + /*198*/ "Un potente sistema in grado di puntare qualsiasi cosa sia impostata nei parametri: persone, armi, oggetti e luoghi sono solo alcune delle innumerevoli possibilit.\n", + /*199*/ "Un apparecchio di scansione medica modificato che contiene i record pi aggiornati relativo allo stato di salute del Presidente, l'anamnesi e le terapie precedenti. ネ in grado di rilevare a distanza le funzioni vitali del Presidente, anche quando questi in mezzo alla folla.\n", + /*200*/ "Un puro e semplice scassinatore di casseforti. Apre le chiusure a codice elettronico generalmente in pochi secondi, sebbene la velocit vari da serratura a serratura.\n", + /*201*/ "Meraviglia della medicina Maian, capace di effettuare autodiagnosi e operazioni chirurgiche senza dover incidere. Uno svantaggio che funziona solo sui Maian; l'altro la mancanza di assistenza postoperatoria.\n", + /*202*/ "Una piccola carica di esplosivo al plastico, completa di temporizzatore sigillato a prova di manomissione e schegge rivestite di teflon. Molto pericoloso.\n", + /*203*/ "Come noto, si tratta di una bomba direzionale a fusione da piazzare in modo che la carica sia diretta verso il basso e possa sventrare i laboratori di ricerca della dataDyne. L'intero edificio sar inghiottito dalla voragine. \n", + /*204*/ "Una piccola cimice applicata al sistema di comunicazione. Trasporta il segnale ufficiale, permettendo il mantenimento del collegamento tra l'istituto e l'agente grazie a intense contromisure locali; parte integrante del sistema di comunicazione per la localizzazione dell'obiettivo.\n", + /*205*/ "Il funzionamento interno di questa cimice di estrema segretezza: il meccanismo di autodistruzione costituisce gran parte del dispositivo. Si dice che sia un esempio di comunicazione quantica molecolare, che spiega la fenomenale affidabilit del dispositivo usato sul campo.\n", + /*206*/ "Usa la tecnologia di comunicazione quantica per fornire informazioni accurate sugli obiettivi delle armi orbitanti, minimizzando cos i danni collaterali. La stessa tecnologia usata dalle cimici del Carrington Institute.\n", + /*207*/ "Dettagli della traiettoria di volo e dei codici di comunicazione e frequenze per l'Air Force One: anche la chiave attuale di decodifica.\n", + /*208*/ "Tutti i dati pertinenti alla ricerca sul fondo oceanico condotta da dataDyne sulle operazioni del vascello Pelagic II. I contenuti comprendono mappatura sonar, dati geologici, dati sui prodotti alieni, campioni da scafo, ecc.\n", + /*209*/ "L'ultima registrazione della personalit dell'intelligenza artificiale, autodefinita Dr. Caroll, prima della cancellazione della memoria e della ristrutturazione cerebrale. Uso per studi casistici e teorici. Moralmente incorrotto e dunque pericoloso. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un cocktail chimico che distorce la realt percepita dall'obiettivo. Il bene diventa male e viceversa; i nemici si confondono con gli amici. Un altro oscuro progetto di ricerca dell'Area 51 di Trent Easton.\n", + /*211*/ "Non il tuo normale abbigliamento. Indossalo per camuffarti.\n", + /*212*/ "PROSSIM.\n", + /*213*/ "A OROLOG.\n", + /*214*/ "TELECOM.\n", + /*215*/ "AUTOMATIC\n", + /*216*/ "IMPATTO\n", + /*217*/ "Missile Big King\n", + /*218*/ "Connettore Dati\n", + /*219*/ "Scanner Presidente\n", + /*220*/ "AutoChirurgo\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Ponte Com.\n", + /*223*/ "Microspia\n", + /*224*/ "Bersaglio\n", + /*225*/ "Piani Volo\n", + /*226*/ "Nastro Ricerca\n", + /*227*/ "Disco Backup\n", + /*228*/ "Tessera Magnetica\n", + /*229*/ "Cartella\n", + /*230*/ "Collana\n", + /*231*/ "ScannerPres\n", + /*232*/ "Booster\n", + /*233*/ "Scanner-X\n", + /*234*/ "Telescanner\n", + /*235*/ "AmplObiett\n", + /*236*/ "In questa versione della TeleSpia il dispositivo di registrazione stato sostituito da un potente esplosivo plastico.\n", + /*237*/ "Questa versione della TeleSpia utilizza una tossina paralizzante del sistema nervoso per provocare una catatonia quasi istantanea.\n", + /*238*/ "La collana di Cassandra De Vries. Dotata di una chiave magnetica per accedere ad aree riservate. Il modello Mk3 funziona solo se Cassandra ancora viva. Classe di sicurezza AA-1 (gamma).", + /*239*/ "Collana sostitutiva di Cassandra De Vries. Utente: %s Password: %s\n", + /*240*/ "Scudo\n", + /*241*/ "Lo scudo protegge chi lo usa riconoscendo l'attacco e creando temporaneamente un campo magnetico concentrato per respingerlo. ネ dotato di riserva energetica limitata, quindi pu proteggere solo fino ad un certo punto. Normalmente gli scudi sono sempre attivi, sebbene questo scudo in particolare sembri un prototipo non funzionale semifinito.\n", + /*242*/ "Booster lotta\n", + /*243*/ "C. Dati\n", + /*244*/ "Vista Nott.\n", + /*245*/ "Decodif.\n", + /*246*/ "Compressa suicidio\n", + /*247*/ "Sedativo\n", + /*248*/ "AutoChirurgo\n", + /*249*/ "Disco Backup\n", + /*250*/ "Travest.\n", + /*251*/ "PistLaptop\n", + /*252*/ "Mina distanza\n", + /*253*/ "Fuc.Pompa\n", + /*254*/ "Fuc.Cecch.\n", + /*255*/ "Mina Orol.\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_s.c b/src/files/lang/jap-final/gun_str_s.c new file mode 100644 index 000000000..0e34e078e --- /dev/null +++ b/src/files/lang/jap-final/gun_str_s.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Cuenta de muertes", + /* 2*/ "Muerto una vez\n", + /* 3*/ "Muerto", + /* 4*/ "veces", + /* 5*/ "Cuenta de suicidios", + /* 6*/ "Desarmado\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (mirilla)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragn\n", + /* 18*/ "SuperDragn\n", + /* 19*/ "Vengador K7\n", + /* 20*/ "Cicln\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Calisto NTG\n", + /* 24*/ "Arma PC\n", + /* 25*/ "Escopeta\n", + /* 26*/ "Segadora\n", + /* 27*/ "Lanzacohetes\n", + /* 28*/ "Devastador\n", + /* 29*/ "Slayer\n", + /* 30*/ "Granada Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Rifle Fr\n", + /* 33*/ "Ballesta\n", + /* 34*/ "Tranquilizador\n", + /* 35*/ "Cuchillo Combate\n", + /* 36*/ "Granada\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina Tiempo\n", + /* 39*/ "Mina de Proximidad\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disfraz\n", + /* 44*/ "Cohete\n", + /* 45*/ "Cohete Buscador\n", + /* 46*/ "Cinto de Granadas\n", + /* 47*/ "L疽er\n", + /* 48*/ "Rayo\n", + /* 49*/ "Psicosis\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Especial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Testeador\n", + /* 59*/ "Visin Nocturna\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Decodificador\n", + /* 64*/ "Explosivos\n", + /* 65*/ "Esc疣er Rayos-X\n", + /* 66*/ "Paquete M馘ico\n", + /* 67*/ "Maleta\n", + /* 68*/ "Disfraz\n", + /* 69*/ "Esc疣er IR\n", + /* 70*/ "Rastreador-R\n", + /* 71*/ "Maletn\n", + /* 72*/ "Pldora Suicidio\n", + /* 73*/ "Disp. Ocultacin\n", + /* 74*/ "Reforzador\n", + /* 75*/ "Conector de Datos\n", + /* 76*/ "Esc. Horizonte\n", + /* 77*/ "Falcon 2 (+)\n", + /* 78*/ "Falcon 2 (s)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L.Cohetes\n", + /* 81*/ "Mina Prox.\n", + /* 82*/ "Psicosis\n", + /* 83*/ "Cuchillo\n", + /* 84*/ "DY357\n", + /* 85*/ "Disparo nico\n", + /* 86*/ "Fuego r疳ido\n", + /* 87*/ "Fuego en r畴aga\n", + /* 88*/ "Cosechar\n", + /* 89*/ "Fuego de escopeta\n", + /* 90*/ "Efecto carrete\n", + /* 91*/ "Lanzacohetes\n", + /* 92*/ "Cohete Dirigido\n", + /* 93*/ "Cohete Teledirigido\n", + /* 94*/ "Culatazo\n", + /* 95*/ "Cartuchos Explosivos\n", + /* 96*/ "Disparos Guiados\n", + /* 97*/ "Descarga de Cartuchos\n", + /* 98*/ "Lanzagranadas\n", + /* 99*/ "Mina Lapa\n", + /*100*/ "Puetazo\n", + /*101*/ "Desarmar\n", + /*102*/ "Seguir Objetivo\n", + /*103*/ "Usar Mirilla\n", + /*104*/ "Dispara Medio Cargador\n", + /*105*/ "Disparo Doble\n", + /*106*/ "Trituradora\n", + /*107*/ "Sedante\n", + /*108*/ "Inyeccin Letal\n", + /*109*/ "Cuchillada\n", + /*110*/ "Cuchillo Envenenado\n", + /*111*/ "Localizador Objetivos\n", + /*112*/ "Muerte Instant疣ea\n", + /*113*/ "Reforzador\n", + /*114*/ "Revertir\n", + /*115*/ "Cartuchos Alto-Impacto\n", + /*116*/ "Ocultacin\n", + /*117*/ "Dejar como Centinela\n", + /*118*/ "Autodestruccin Prox.\n", + /*119*/ "Detector de Trampas\n", + /*120*/ "Explosivo de Tiempo\n", + /*121*/ "Explosivo de Proximidad\n", + /*122*/ "Explosivo Remoto\n", + /*123*/ "Detonacin\n", + /*124*/ "Fusible 4 segundos\n", + /*125*/ "Pinball Proximidad\n", + /*126*/ "Detonacin temporal\n", + /*127*/ "Detonacin Proximidad\n", + /*128*/ "R畴aga 3 Cartuchos\n", + /*129*/ "Disparo Cargado\n", + /*130*/ "Agacharse\n", + /*131*/ "Infectar\n", + /*132*/ "Disparo con Ritmo\n", + /*133*/ "Rayo Bajo-Alcance\n", + /*134*/ "Detonacin por Impacto\n", + /*135*/ "Amplificador de Luz\n", + /*136*/ "C疥ara Mvil\n", + /*137*/ "Visin de Rayos-X\n", + /*138*/ "Imagen Termal\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo de Bloqueo\n", + /*141*/ "Conectar\n", + /*142*/ "Identificar Objetivos\n", + /*143*/ "Llevar Disfraz\n", + /*144*/ "Colocar Explosivos\n", + /*145*/ "Mira Telescpica\n", + /*146*/ "Silenciador\n", + /*147*/ "Extensin de Cartucho\n", + /*148*/ "Mira L疽er\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Industrias Chesluk\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Incluso desarmado, eres un adversario respetable. Usa tus puos para noquear a tus oponentes o desarmarles para usar sus armas contra ellos.\n", + /*156*/ "Precisa y digna de confianza, esta arma es el caballo de batalla de las operaciones del Instituto. Usa la mira l疽er para situar las balas con un efecto mortal, o golpea a los adversarios para noquearles.\n", + /*157*/ "Una Falcon 2 mejorada, con la ventaja aadida de que es silenciosa, pero mortal.\n", + /*158*/ "Una Falcon 2 mejorada, que cuenta con una mirilla duplicadora que te permite beneficiarte de la superior precisin de la Falcon.\n", + /*159*/ "Una pistola de tecnologa militar punta, usada en gran parte por fuerzas de paz. Cuenta con una ligera capacidad de zoom, y tiene un modo secundario de disparo de r畴aga de tres cartuchos.\n", + /*160*/ "Si ves a un Skedar viniendo hacia ti, es m疽 que posible que lleve una de 駸tas. Un amplio cargador y su can rayado hacen de esta pistola una formidable arma de mano, pero la descarga asesina viene del modo secundario: carga el disparo para fuerza extra al coste de unos cuantos cartuchos.\n", + /*161*/ "La DY357 de dataDyne es la m疽 poderosa arma de mano del mundo. Cada cartucho tiene un factor de penetracin increble y noquea al objetivo con el peso y fuerza del disparo. Se han hecho modelos de encargo para clientes importantes; se rumorea que el director de ANS, Trent Easton, tiene una variante baada en oro.\n", + /*162*/ "La DY357-LX fue diseada especialmente para el director de la ANS, Trent Easton. Adem疽 de tener una atractiva empuadura de genuina piel de tigre, este arma dorada incluye un can optimizado, lo que significa que cada bala siempre encuentra su objetivo con una fuerza mortfera.\n", + /*163*/ "El arma Maian est疣dar. Se trata de un arma flexible, una pistola que dispara proyectiles est疣dar o proyectiles explosivos sin que afecte a la capacidad del cargador.\n", + /*164*/ "Un cl疽ico de dataDyne, y excelentemente vendida, esta metralleta cuenta con un cargador de 32 cartuchos y una caracterstica especial: la habilidad de designar y fijar objetivos en la lnea de fuego. Convierte a un tirador medio en uno excelente, siempre que sea inteligente para manejar el arma. Ratio de disparo normal: 900 dpm.\n", + /*165*/ "El principal rifle de asalto del Instituto Carrington. Su gran alcance y el tamao de su cargador hacen de ella un arma muy til; el modo secundario permite al usuario moverse mientras hace zoom sobre un adversario. Ratio de disparo normal: 750 dpm.\n", + /*166*/ "Un rifle de asalto est疣dar con un giro diablico: cuando se activa el modo secundario, se convierte en una mina activada por proximidad que parece un arma. Ratio de disparo normal: 700 dpm.\n", + /*167*/ "Es una variante del rifle de asalto Dragn: en vez de un explosivo de proximidad, es un pequeo lanzagranadas. Es una excelente arma de apoyo. Ratio de disparo normal: 700 dpm.\n", + /*168*/ "Es otra pieza de alta tecnologa de dataDyne. Ordinariamente es un rifle de asalto con un cargador m疽 bien pequeo y una descarga poderosa, cuenta con un modo detector de trampas que muestra explosivos, armas de pared y peligros similares. Ratio de disparo normal: 950 dpm.\n", + /*169*/ "Diseado para ser usado por guardaespaldas, el Cicln ha sido adoptado por la Seguridad Presidencial debido a su excelente capacidad cuando es usado para 'suprimir'. En circunstancias extremas, puede m疽 que doblar el ritmo de disparo, descargando el cargador completo en un segundo. Ratio de disparo normal: 900 dpm. Descarga a 2000 dpm.\n", + /*170*/ "El arma secreta del Instituto Carrington. Dispara a un ritmo fenomenal y cuenta con una capacidad de cargador gigantesca. El modo secundario es un dispositivo de ocultacin que funciona con la municin del cargador. Es un arma devastadora. Ratio de disparo normal: 1100 dpm.\n", + /*171*/ "Se trata de otro ejemplo del excelente diseo de armas de fuego Maian. Puede disparar tiros est疣dar tan r疳ido como cualquier otro SMG, o puede disparar cartuchos de alta velocidad que pueden penetrar f當ilmente en objetos para encontrar al objetivo al otro lado. La nica desventaja con el modo de disparo secundario es que el ritmo de disparo es lento y la precisin sufre con la potencia del disparo. Ratio de disparo normal: 950 dpm., (f/s: 300 dpm).\n", + /*172*/ "Una ametralladora diseada para parecer un PC port疸il. Disimulada, el arma no puede disparar, pero una vez activada, se despliega. El Arma PC no permite inspecciones detalladas; puede arrancar, pero la memoria es un cuarto de lo que se supone que es. Ratio de disparo normal: 1000 dpm.\n", + /*173*/ "Es un arma de dataDyne fabricada para fuerzas de seguridad. Su cargador de nueve cartuchos combinado con modos de disparo simple o doble hacen que se trate de una peligrosa arma de cerca.\n", + /*174*/ "Es un arma realmente aterradora en manos de alguien lo suficientemente fuerte para controlar su gran retroceso; para el resto, un arma difcil de manejar pero efectiva para despejar pasillos. Ratio de disparo normal: 1800 dpm.\n", + /*175*/ "Es un arma incmoda. Dispara tanto un cohete est疣dar como un cohete m疽 lento dirigido cuando se centra en el desafortunado objetivo.\n", + /*176*/ "Se trata de un sistema lanzador de granadas de largo alcance fabricado por dataDyne. El modo de disparo secundario recubre las granadas con una sustancia pegajosa; cuando se dispara la bomba, 駸ta se pega en las paredes o el techo. Tras unos cuantos segundos, se suelta para caer al suelo, donde detona.\n", + /*177*/ "Los Skedar disfrutan viendo a sus enemigos aterrorizados. Parece natural que cuenten con un cohete a control remoto como modo secundario de fuego en su lanzacohetes b疽ico, as pueden tener el placer de sentir los vanos intentos de escapar de su presa del proyectil que se acerca.\n", + /*178*/ "El rifle FarSight es un hbrido Maian de un dispositivo de esc疣er de Rayos-X emparejado con un rifle que puede disparar a trav駸 de objetos. La mira puede centrarse en formas de vida, aunque el dispositivo no puede centrar tan r疳ido como se mueve el enemigo.\n", + /*179*/ "Con su poderoso zoom y sus balas de alta velocidad, este arma del Instituto Carrington es uno de los mejores rifles de francotirador jam疽 hechos. Ag當hate para una mayor precisin.\n", + /*180*/ "Esta ballesta es un ejemplo de 'pistola' de corto alcance, montada en la mueca de un agente del Instituto Carrington. Se pliega para ocultarla y puede disparar hasta cinco flechas, entre los m疽 usuales tiros sedantes o los dardos mortales.\n", + /*181*/ "Es un dispositivo de fuego r疳ido, que puede ser usado como arma en un caso de emergencia, pero que est diseado en principio como un inyector d駻mico de sedantes. Los usuarios son advertidos que una descarga completa de la reserva de droga puede ser fatal.\n", + /*182*/ "Es una versin ampliada del cuchillo de combate. Contiene una ampolla de veneno que se hace aicos cuando se lanza, dando al enemigo unos seis segundos de vida. Un arma que slo poda haber sido creada por dataDyne.\n", + /*183*/ "Es una versin mejorada de la fiel granada. Puede ser lanzada con un fusible de cuatro segundos, o ser usada como una bomba de proximidad que rebota.\n", + /*184*/ "Es una bomba de neutrones de mano que afecta a un 疵ea muy pequea. Puede detonar por impacto o ser fijada en detonacin por proximidad.\n", + /*185*/ "Es una mina con un corto fusible de tiempo. Tiene un sensor de deteccin/evaluacin que puede ser activado como modo secundario.\n", + /*186*/ "Es una mina con un sensor de proximidad. Tiene un sensor de deteccin/evaluacin que puede ser activado como modo secundario.\n", + /*187*/ "Es una mina que puede ser activada remotamente. El comando de activacin es el modo secundario.\n", + /*188*/ "Se trata de un dispositivo de bloqueo de 'ruido-blanco', capaz de simular alguno de los fallos el馗tricos m疽 comunes en cualquier sistema donde sea directamente colocado.\n", + /*189*/ "El l疽er est montado en la mueca y su precisin es mortal. Puede disparar 'pulsos' de larga distancia, o puede mantener una constante y concentrada corriente de energa en corto alcance.\n", + /*190*/ "Son estimulantes gen騁icos diseados para aplicar en combate. Cuando son administrados, parecen frenar el paso del tiempo para abrir una 'ventana de reaccin'.\n", + /*191*/ "Lo ltimo en la lnea de miras 'starlight' que mejoran la luz visible para producir una imagen clara del ambiente que la rodea. Usa un algoritmo de movimiento de objetivo para mostrar posibles trampas.\n", + /*192*/ "Usando la aplicacin m疽 pequea de la tecnologa anti-gravedad, esto es lo ltimo en dispositivos para fisgar. Tiene una conexin de audio/vdeo con funcin de grabacin y la posibilidad interna de holografiar espectroscpicamente.\n", + /*193*/ "Una mira de corto alcance que puede ver a trav駸 de algunos materiales, incluso el acero, produciendo una representacin crom疸ica simplificada del entorno.\n", + /*194*/ "Esta mira usa escaneo de infrarrojos modulados con datos ultrasnicos para ofrecer no slo una imagen clara del 疵ea colindante, sino tambi駭 la ubicacin de irregularidades estructurales. Tambi駭 puede localizar enemigos que empleen tecnologa de ocultacin u otros desconciertos pticos.\n", + /*195*/ "Usa las cualidades de 'salto de luz' de cristales aliengenas para crear un campo refractivo alrededor del portador. Funciona mientras slo existan pequeas perturbaciones kin騁icas en el campo lmite; el acto de disparar un arma es suficiente para causar que vuelva la visibilidad.\n", + /*196*/ "Es un esc疣er binocular de largo alcance. El visor muestra una imagen compuesta por las dos fuentes recibidas. Tambi駭 cuenta con funcin zoom.\n", + /*197*/ "Es capaz de consultar remotamente casi cualquier tipo de datos guardados, los cuales son directamente enviados a los 'hackers' del Instituto. Una variante de este dispositivo provee a los 'hackers' de conexin directa con los sistemas locales.\n", + /*198*/ "Es un poderoso sistema de rastreo que puede ser preparado para encajar con cualquier tipo de par疥etros: gente, armas, objetos y lugares son algunas de las posibilidades.\n", + /*199*/ "Se trata de un esc疣er m馘ico modificado que contiene la m疽 moderna informacin acerca del estado de salud del Presidente y una biblioteca de pasadas condiciones y tratamientos. Puede detectar las funciones vitales del Presidente a gran distancia, incluso cuando el objetivo est en medio de una multitud.\n", + /*200*/ "Abre cajas fuertes, simple y llanamente. Rompe cierres codificados electrnicamente, habitualmente en cuestin de segundos, aunque esto, por supuesto, depende de cada cerradura.\n", + /*201*/ "Esta maravilla m馘ica Maian puede auto-diagnosticar y realizar operaciones quirrgicas sin necesidad de cortes. Una desventaja es que slo funciona en Maian; la otra desventaja es que no tiene habilidad en el trato a los pacientes.\n", + /*202*/ "Se trata de una pequea carga de explosivo pl疽tico, completada con un temporizador sellado, e incrustada dentro de una capa de tefln con metralla. Muy desagradable.\n", + /*203*/ "Como ya eres consciente, se trata de una bomba de fusin direccional, que se coloca para que la carga se dirija hacia abajo. Esto arrasar los laboratorios de investigacin de dataDyne y causar que el resto del edificio se colapse y caiga al agujero.\n", + /*204*/ "Es un pequeo 'bicho' que se coloca en cualquier parte de un transmisor de comunicaciones. Se oculta en la seal oficial, permitiendo la conexin entre el Instituto y el agente aunque haya importantes contramedidas locales; para todas las posibilidades y propsitos, es parte de la localizacin de las comunicaciones de los objetivos.\n", + /*205*/ "El funcionamiento interno de este 'bicho' es alto secreto: gran parte del dispositivo pertenece al mecanismo de autodestruccin. Se especula que esto es un ejemplo de comunicacin molecular cu疣tica, lo cual explica la fenomenal fiabilidad del dispositivo cuando se usa.\n", + /*206*/ "Usa tecnologa de comunicacin cu疣tica para proveer informacin precisa de los objetivos a las armas orbitales, ayud疣dolas a minimizar los daos colaterales. La misma tecnologa es usada en los rastreadores del Instituto Carrington.\n", + /*207*/ "Son detalles de la trayectoria de vuelo y los cdigos de comunicacin y frecuencias del Air Force One: incluso las claves actuales de encriptacin.\n", + /*208*/ "Todos los datos relacionados con la investigacin en el fondo oce疣ico desarrollada por dataDyne con el navo de operaciones submarinas Pelagic II. El contenido incluye mapeados de snar, datos geolgicos, datos del artefacto aliengena, muestras del casco, etc.\n", + /*209*/ "Es la ltima grabacin del estado de personalidad de la inteligencia artificial, que se llama a s misma Dr. Caroll, antes de su lavado de cerebro y reestructura cerebral. Usada para el estudio del caso, contiene slo proyecciones tericas. Moralmente incorrupta, y por lo tanto peligrosa. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Se trata de un cctel qumico que cambia la realidad que el objetivo percibe. Lo bueno es malo, lo malo es bueno; enemigos y amigos intercambian sus papeles. Se trata de otra de las investigaciones 'oscuras' del チrea 51 de Trent Easton.\n", + /*211*/ "No es tu vestimenta habitual. Ll騅alo para pretender no ser t.\n", + /*212*/ "PROX.\n", + /*213*/ "TIEMPO\n", + /*214*/ "REMOTO\n", + /*215*/ "AUTOARMA\n", + /*216*/ "IMPACTO\n", + /*217*/ "Cohete Big King\n", + /*218*/ "Conector de Datos\n", + /*219*/ "Esc. Presidencial\n", + /*220*/ "AutoCirujano\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Controlador\n", + /*223*/ "'Bicho' R.\n", + /*224*/ "Amplificador\n", + /*225*/ "Planes de Vuelo\n", + /*226*/ "Cinta Investigacin\n", + /*227*/ "Copia de Seguridad\n", + /*228*/ "Llave Magn騁ica\n", + /*229*/ "Maletn\n", + /*230*/ "Collar\n", + /*231*/ "Esc. Pres.\n", + /*232*/ "Reforzador\n", + /*233*/ "Esc. R-X\n", + /*234*/ "Esc. Horiz.\n", + /*235*/ "Amplific.\n", + /*236*/ "En este modelo de la C疥ara Espa el dispositivo de grabacin ha sido reemplazado por un poderoso explosivo pl疽tico.\n", + /*237*/ "Este modelo de la C疥ara Espa usa una toxina nerviosa paralizadora para que los blancos queden en estado catatnico.\n", + /*238*/ "Es el collar de Cassandra De Vries. Est equipado con una llave de proximidad que permite el acceso a 疵eas restringidas. El modelo Mk3 slo funciona si el propietario est vivo. Clase de Seguridad AA-1 (gamma).", + /*239*/ "Collar de repuesto de Cassandra De Vries. Usuario: %s Clave: %s\n", + /*240*/ "Escudo\n", + /*241*/ "El escudo protege al usuario detectando un ataque y generando moment疣eamente un campo de fuerza concentrado para repeler el ataque. El escudo tiene una reserva de energa limitada, as que slo puede proteger al usuario hasta cierto punto. Los escudos suelen permanecer activos cuando el usuario los lleva, aunque este escudo en particular parece no ser funcional, como un prototipo no finalizado.\n", + /*242*/ "Reforzadores\n", + /*243*/ "C. Datos\n", + /*244*/ "V. Nocturna\n", + /*245*/ "Decodif.\n", + /*246*/ "P. Suicidio\n", + /*247*/ "Tranquiliz.\n", + /*248*/ "AutoCirujano\n", + /*249*/ "Disco S.\n", + /*250*/ "Disfraz\n", + /*251*/ "Arma PC\n", + /*252*/ "Mina Remota\n", + /*253*/ "Escopeta\n", + /*254*/ "Rifle Fr\n", + /*255*/ "Mina Tiempo\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/impE.c b/src/files/lang/jap-final/impE.c similarity index 100% rename from src/files/lang/impE.c rename to src/files/lang/jap-final/impE.c diff --git a/src/files/lang/jap-final/impJ.c b/src/files/lang/jap-final/impJ.c new file mode 100644 index 000000000..d80a01f11 --- /dev/null +++ b/src/files/lang/jap-final/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\n≠ヘミマ艨焉マ≡エ⇔=ネメθ⊇∃≫у┗∂ン゚マロハ£∈ばぱト√∨ワリ≧d∨¬モヨヒマ縲マぅうヨメ℃マ≠∈ラリナ=ネメ┨刀劇ヨ∀ムわナ∨ツあΧ∈⇒∩√>梟キkl∵ヒみチδいナ⇔⊇∃⊇m=ヘミマ艨モぎ≫テ∀メ♭タ≫⌒メ∈せпマぎ≒ム†∃≒∃⊇ツ\n\n|ヨヒマ縲マセ\n\n瘁焉モュマゆeメあΧ∈⇒⊇⇔タ∨=ヘミマ艢エぎ≫テ∀∵♭タ≫┳∂Σモュ⇔ぎ≪∃∵≒≠桙氈ニ≫メÅツ∃∋∀かエ⇔⌒≠」うモΣ♭モ∃チ┳♭Τ≪エ⇔⊇≫メÅ∩≒死ツ\n\n|しじ操セ翌トδも∈ロてヌ≡\n\nぅう′メャ辜ャ轣マモ翌トδも∵uト√⇔⊇≫ツοリ∧√モロてナ⇔⊇∃⊇メ♭÷ルマ縲d$轢∈宴ロナ<ロてトヌ⇔チ√ツw∈べニ≫θタ∃νツ∀∃≫♭⊆∽⊂ツ\n\n|しじ逐セ┳レ∈νツ∽\n\nムメが┳∩モ≠」うメワ゚ハ∈┳レマ宦エ⇔⊇≫ツ♭タ≫Åツワチメ┳レ∈νツ≫メÅツ′メヒメた⌒烙ネハラニ≫≡⊂マツ\n\n|しじ凍セсァmメメネ#マ∈ぴψヌ≡\n\nノワ゚d繧オメ⊇≫キべхリマモсァmメロママメ艫ロ┰∵⊆≫ツテ√モwメみマニ∝ツマモ⊇∩∃⊇ツ∃∃≒テメメネ#ママモワ$ムラdラ∀ロヨ∈ニ≫δい∵⊆≫∩≒Åツテ√∈ぴψナр操窶ワ縲∈ぼ⊂メÅツ\n\n|しじ楳セχャδカ∈「ヌ≡\n\nヨヒマ縲マメヤニワメ刋ハマ≧ヌ巣掾マぽ∵ムミマリメ揀レρΖ∈f栫ニ≫∨⊥マヨナ∨ミ÷<∵ぜるト√⇔⊇≫ツテ√モ=奄о゚≧ムマ刀ンワリ≧dメみマ≫掾マ≠マ「ト√∃ツ√†∃≒∃⊇ツd=d∈エ⇔刋ハメ♀ミ∈タ磨竅メÅツ\n\n|しじ斧セ」な∈栫饅n\n」、なにエ盾艪メンマレdマ≡√†÷#d縺マ⊆≫ワリ≧dメγぼδマモ」、∵ンハ縺ト√⇔⊇≫≡⊂Åツテ√∈┏ニ≫マモ♂d゚マユ∈エ⇔<チぼδメルマ¢フd゚マメムワ∈ムマワ繧оニ≫ナ∩∃⊇ツ∧⊂ニ√†γぼδモヒεヨ∀γ‡ヒ∵エ⇔」なナ≠」うマご∈煤ス≫テ∀モ∃⊇Å∽⊂ツ\n\nEND\n", + /* 1*/ "ヨヒマ縲マぅう′\n", + /* 2*/ "|ワ竄пbhセ\n\n≠ヘミマ艨焉マ≡エ⇔=ネメθ⊇∃≫у┗∂ン゚マロハ£∈ばぱト√∨ワリ≧d∨¬モヨヒマ縲マぅうヨメ℃マ≠∈ラリナ=ネメ┨刀劇ヨ∀ムわナ∨ツあΧ∈⇒∩√>梟キkl∵ヒみチδいナ⇔⊇∃⊇m=ヘミマ艨モぎ≫テ∀メ♭タ≫⌒メ∈せпマぎ≒ム†∃≒∃⊇ツ\n\n|ヨヒマ縲マセ\n\n瘁焉モュマゆeメあΧ∈⇒⊇⇔タ∨=ヘミマ艢エぎ≫テ∀∵♭タ≫┳∂Σモュ⇔ぎ≪∃∵≒≠桙氈ニ≫メÅツ∃∋∀かエ⇔⌒≠」うモΣ♭モ∃チ┳♭Τ≪エ⇔⊇≫メÅ∩≒死ツ\n\n|しじ操セ翌トδも∈ロてヌ≡\n\nぅう′メャ辜ャ轣マモ翌トδも∵uト√⇔⊇≫ツοリ∧√モロてナ⇔⊇∃⊇メ♭÷ルマ縲d$轢∈宴ロナ<ロてトヌ⇔チ√ツw∈べニ≫θタ∃νツ∀∃≫♭⊆∽⊂ツ\n\n|しじ逐セ┳レ∈νツ∽\n\nムメが┳∩モ≠」うメワ゚ハ∈┳レマ宦エ⇔⊇≫ツ♭タ≫Åツワチメ┳レ∈νツ≫メÅツ′メヒメた⌒烙ネハラニ≫≡⊂マツ\n\n|しじ凍セсァmメメネ#マ∈ぴψヌ≡\n\nノワ゚d繧オメ⊇≫キべхリマモсァmメロママメ艫ロ┰∵⊆≫ツテ√モwメみマニ∝ツマモ⊇∩∃⊇ツ∃∃≒テメメネ#ママモワ$ムラdラ∀ロヨ∈ニ≫δい∵⊆≫∩≒Åツテ√∈ぴψナр操窶ワ縲∈ぼ⊂メÅツ\n\n|しじ楳セ」な∈栫饅n\n」、なにエ盾艪メンマレdマ≡√†÷#d縺マ⊆≫ワリ≧dメγぼδマモ」、∵ンハ縺ト√⇔⊇≫≡⊂Åツテ√∈┏ニ≫マモ♂d゚マユ∈エ⇔<チぼδメルマ¢フd゚マメムワ∈ムマワ繧оニ≫ナ∩∃⊇ツ∧⊂ニ√†γぼδモヒεヨ∀γ‡ヒ∵エ⇔」なナ≠」うマご∈煤ス≫テ∀モ∃⊇Å∽⊂ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\n≠ヘミマ艨焉マ≡エ⇔=ネメθ⊇∃≫у┗∂ン゚マロハ£∈ばぱト√∨ワリ≧d∨¬モヨヒマ縲マぅうヨメ℃マ≠∈ラリナ=ネメ┨刀劇ヨ∀ムわナ∨ツあΧ∈⇒∩√>梟キkl∵ヒみチδいナ⇔⊇∃⊇m=ヘミマ艨モぎ≫テ∀メ♭タ≫⌒メ∈せпマぎ≒ム†∃≒∃⊇ツ\n\n|ヨヒマ縲マセ\n\n瘁焉モュマゆeメあΧ∈⇒⊇⇔タ∨=ヘミマ艢エぎ≫テ∀∵♭タ≫┳∂Σモュ⇔ぎ≪∃∵≒≠桙氈ニ≫メÅツ∃∋∀かエ⇔⌒≠」うモΣ♭モ∃チ┳♭Τ≪エ⇔⊇≫メÅ∩≒死ツ\n\n|しじ操セ┳レ∈νツ∽\n\nムメが┳∩モ≠」うメワ゚ハ∈┳レマ宦エ⇔⊇≫ツ♭タ≫Åツワチメ┳レ∈νツ≫メÅツ′メヒメた⌒烙ネハラニ≫≡⊂マツ\n\n|しじ逐セсァmメメネ#マ∈ぴψヌ≡\n\nノワ゚d繧オメ⊇≫キべхリマモсァmメロママメ艫ロ┰∵⊆≫ツテ√モwメみマニ∝ツマモ⊇∩∃⊇ツ∃∃≒テメメネ#ママモワ$ムラdラ∀ロヨ∈ニ≫δい∵⊆≫∩≒Åツテ√∈ぴψナр操窶ワ縲∈ぼ⊂メÅツ\n\n|しじ凍セ」な∈栫饅n\n」、なにエ盾艪メンマレdマ≡√†÷#d縺マ⊆≫ワリ≧dメγぼδマモ」、∵ンハ縺ト√⇔⊇≫≡⊂Åツテ√∈┏ニ≫マモ♂d゚マユ∈エ⇔<チぼδメルマ¢フd゚マメムワ∈ムマワ繧оニ≫ナ∩∃⊇ツ∧⊂ニ√†γぼδモヒεヨ∀γ‡ヒ∵エ⇔」なナ≠」うマご∈煤ス≫テ∀モ∃⊇Å∽⊂ツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "翌トδも∈ロてヌ≡\n", + /* 6*/ "┳レ∈νツ∽\n", + /* 7*/ "сァmメメネ#マ∈ぴψヌ≡\n", + /* 8*/ "χャδカ∈「ヌ≡\n", + /* 9*/ "」な∈栫饅n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "χャδカ\n", + /* 13*/ "χャδカ\n", + /* 14*/ "χャδカ∈みマ√∨\n", + /* 15*/ "翌トδも∈ロて\n", + /* 16*/ "┳レメご∵ワニ∫リニ\n", + /* 17*/ "┳レメおぁ\n", + /* 18*/ "χャδカメ「\n", + /* 19*/ "ヨヒマ縲マ∵ほト√∨\n", + /* 20*/ "≠ヘミマ艢エ遵私チハ∵わべ∈ゐツ⇔⊇≫エ\n", + /* 21*/ "翌トδもロワ窶∈つづてニ≫∋Å<香騾エ\n", + /* 22*/ "ワリ≧d∵ワ゚ハ∈┳レマ宦エ∨ツ\n", + /* 23*/ "ヤニワマゅ≪ぽ≒∈νツ⇔チ√\n", + /* 24*/ "瘁焉モルナ⊇ロd♀∈\nエ⇔⊇≫≡⊂Åツ\n", + /* 25*/ "ノワ゚d∵艫ロナ⇔⊇≫ルナ⊇の┸∵\nタエ∀⇒モÅツ\n", + /* 26*/ "ナリエ∨ツヴメヤニワメ死ツ⌒ナ⊆√∵瘁焉メみマ死ツ\n", + /* 27*/ "ニ∬マぼエ⇔ナム∈ばぱナ⇔チ√ツ\n", + /* 28*/ "θぬ∃テ∀マ∃エ∨÷瘁焉諷」、∈ナ∩ツ∨≡⊂Åツ\n", + /* 29*/ "ニ∬マに⇒ツ⇔=劇メvマÅニ∋Åエ\n", + /* 30*/ "ミランワ∈ゥぃト√⇔⊇リヌ∋ツ\n", + /* 31*/ "クケヨみてワムハ焉謔テてト√∨\n", + /* 32*/ "≡チ∂エ∨≠ヘミマ艢エ潤テエ¬⌒ラÅ死ツ\n", + /* 33*/ "くΒメロヒ縲∵ぉ∈らエ⇔⊇≫ツロ∬∋Åエ\n", + /* 34*/ "しじメぼマあぃモ∃はu∵ばぱト√∨\n", + /* 35*/ "∧⊂<翌トδもマνツ⇔⌒≒∝∃タオ死ツ\n", + /* 36*/ "テ√∵ノワ゚d∵艫ロナ⇔⊇∨瘁ムツ\n", + /* 37*/ "Ψ∈⇒ツ∃⊇∀死ツ\nル∋∃メ驕諠煤マ∩∩エ⇔⊇≫∝ツ\n", + /* 38*/ "\n", + /* 39*/ "」、∵」なナ⇔ナリエ∨蚕n", + /* 40*/ "♂°ワ゚d∈みマ√∨\n", + /* 41*/ "├ヮモ⊇⊇∩=ヘミマ艢タ準ムミマメ\nネモ∂θικ∈ら∨ヌ≫∝ツマモ⊇∩∋ツ\n", + /* 42*/ "モ項タ準凍帥掾ソ≒テテマ⊇≫∝エ\nら∨ヌ⇔⊇≫メモ=準ワメぶ♭ナキエ\n", + /* 43*/ "♭⌒≠ヘミマ艢÷ミワ゚ム⌒\nヨ∃⊇∀死=テメワd瘁ワ蚕n", + /* 44*/ "ミハ焉マモ÷dd∵∃⊇∀\n⊇⊇メマムツ潤橿ヨ♀ヨナリニタ\n", + /* 45*/ "⊆ッツヴモ┠操<符クメテメ┷∈\nエ∀らエ⇔⊇∨メÅツ\npムミマ∀┳タ∀メマ♀d∃ぁう⊇ツ\np⌒⊂ニ∬ム縲騾メワ♭\n∧√∵οпメ⌒メ∀∃≫蚕n", + /* 46*/ "がメマÅエ\n", + /* 47*/ "怩掾∝蚕n", + /* 48*/ "ナ⇒テ⊇瘁焉ムツ\nワ゚ハ∈νツ∃タオエ\n", + /* 49*/ "レチぁなナ⇔エ\nヴモミ縺⊇⊇∩≒エ\n", + /* 50*/ "ル∋∃<シп♭ム蚕n", + /* 51*/ "♂d゚マユ∵ョャ♭ニ\n", + /* 52*/ "ムだ\n", + /* 53*/ "ンヨフ窶ニロワ窶マミランワm\n", + /* 54*/ "ルマ¢フd゚メムワメムマワ繧оΤ┯\n", + /* 55*/ "γぼδメモマ≠マリて\n", + /* 56*/ "♂d゚マユメムだ∵磨縺リナ∨\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "♂d゚マユ\n", + /* 60*/ "♂d゚マユ\n", + /* 61*/ "♂d゚マユ∈みマ√∨\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/impP.c b/src/files/lang/jap-final/impP.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/jap-final/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_f.c b/src/files/lang/jap-final/imp_str_f.c new file mode 100644 index 000000000..a8f4a5f67 --- /dev/null +++ b/src/files/lang/jap-final/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - R饌ctiver les d馭enses automatiques\n\nIl y a des fusils automatiques situ駸 des points strat馮iques de l'Institut Carrington. Ils sont en ce moment d駸activ駸 mais si vous acc馘ez au panneau de contrle pour les brancher, ils d駻outeront bon nombre d'ennemis.\n\n|Objectif 2: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 3: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - D騁ruire les informations sensibles\n\nLe coffre du bureau de Daniel contient un algorithme utilis il y a des ann馥s pour briser les codes de communications Maian. Il doit 黎re d騁ruit tout prix avant que la dataDyne ou les Skedars s'en emparent. Utilisez le laser pour percer la porte.\n\n|Objectif 5: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 1*/ "INSTITUT CARRINGTON\n", + /* 2*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - R饌ctiver les d馭enses automatiques\n\nIl y a des fusils automatiques situ駸 des points strat馮iques de l'Institut Carrington. Ils sont en ce moment d駸activ駸 mais si vous acc馘ez au panneau de contrle pour les brancher, ils d駻outeront bon nombre d'ennemis.\n\n|Objectif 2: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 3: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 2: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 3: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R饌ctiver les d馭enses automatiques\n", + /* 6*/ "Lib駻er les otages\n", + /* 7*/ "R馗up駻er l'arme exp駻imentale\n", + /* 8*/ "D騁ruire les informations sensibles\n", + /* 9*/ "D駸activer la bombe\n", + /* 10*/ "Obtenir infos sensibles.\n", + /* 11*/ "Garde: \n", + /* 12*/ "Infos sensibles\n", + /* 13*/ "Infos sensibles\n", + /* 14*/ "Infos sensibles obtenues.\n", + /* 15*/ "Fusils automatiques activ駸.\n", + /* 16*/ "Trop d'otages abattus.\n", + /* 17*/ "Otages sauv駸.\n", + /* 18*/ "Informations sensibles d騁ruites.\n", + /* 19*/ "Carrington abattu.\n", + /* 20*/ "Joanna - nous sommes attaqu駸. \n", + /* 21*/ "Branchez les fusils - vite.\n", + /* 22*/ "Les Skedars ont pris des otages. \n", + /* 23*/ "Montez aux bureaux et sauvez-les.\n", + /* 24*/ "Ils utilisent un nouveau syst鑪e de bouclier. \n", + /* 25*/ "Foster travaillait sur une nouvelle arme qui \npeut 黎re utile.\n", + /* 26*/ "Bon sang. Mon bureau... S'ils y ont acc鑚...\n", + /* 27*/ "Allez-y en premier, Joanna, et d騁ruisez les fichiers.\n", + /* 28*/ "Il y a urgence. Ils ont plac une bombe. \n", + /* 29*/ "Trouvez-la et sortez de l'immeuble.\n", + /* 30*/ "Acc鑚 refus - Echec autorisation. \n", + /* 31*/ "Mesures d'urgences lanc馥s.\n", + /* 32*/ "Beau boulot, Joanna. C'est presque fini...\n", + /* 33*/ "La derni鑽e navette vous attend. Faites vite.\n", + /* 34*/ "Objet crucial d騁ruit.\n", + /* 35*/ "Les d馭enses automatiques vont m'aider.\n", + /* 36*/ "Voil sur quoi Foster travaillait.\n", + /* 37*/ "Je dois y aller doucement... Les otages \ncomptent sur moi.\n", + /* 38*/ "Au moins je ne saurai pas s'y je m'y \nprends mal.\n", + /* 39*/ "La bombe a explos...\n", + /* 40*/ "Vous recevez un Devastator.\n", + /* 41*/ "Pr黎e, Joanna? Nous ne pouvons pas faire attendre la d駘馮ation maian. Le Pr駸ident non plus, bien sr.\n", + /* 42*/ "Moi pr黎e? Pardon? Je suis pr黎e depuis une demi-heure! C'est moi qui vous attends!\n", + /* 43*/ "Vous savez ce que c'est, Joanna: il fallait que je me coiffe, que j'arrange mon costume...\n", + /* 44*/ "Vous avez combien de miroirs chez vous? Nerveux?\n", + /* 45*/ "Tr鑚. J'attends ce moment depuis si longtemps. L'Institut a 騁 fond pour faciliter les contacts entre humains et Maians. Et dans quelques minutes nous serons la Maison Blanche... Le r黐e deviendra alors r饌lit...\n", + /* 46*/ "D'o cela venait-il?\n", + /* 47*/ "Du rez-de-chauss馥...\n", + /* 48*/ "Il y en a qui ne savent pas s'arr黎er. Tout le monde doit 騅acuer!\n", + /* 49*/ "Mettez-vous l'abri! Je vais les retenir! Venez me chercher plus tard!\n", + /* 50*/ "J'esp鑽e juste que vous le pourrez.\n", + /* 51*/ "Il vous faut le r馗epteur.\n", + /* 52*/ "Connexion 騁ablie.\n", + /* 53*/ "D駻ivation syst鑪es de s馗urit.\n", + /* 54*/ "Virus t駘馗harg avec succ鑚.\n", + /* 55*/ "Moteurs du vaisseau activ駸.\n", + /* 56*/ "Connexion au vaisseau perdue.\n", + /* 57*/ "Obtenir r馗epteur.\n", + /* 58*/ "\n", + /* 59*/ "R馗epteur\n", + /* 60*/ "Un r馗epteur\n", + /* 61*/ "R馗epteur obtenu.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_g.c b/src/files/lang/jap-final/imp_str_g.c new file mode 100644 index 000000000..6e6667657 --- /dev/null +++ b/src/files/lang/jap-final/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Geb舫de sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgednnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Vernichten Sie die geheimen Informationen!\n\nIn Daniels Bro steht ein Safe, in dem der Algorithmus aufbewahrt wird, mit dem vor Jahren der Maianische Kom-Code geknackt wurde. Diese Information muss vernichtet werden, bevor dataDyne oder die Skedar darauf zugreifen knnen. Setzen Sie den Laser ein, um sich den Weg durch die Tr zu bahnen.\n\n|5. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 1*/ "CARRINGTON INSTITUT\n", + /* 2*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Geb舫de sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgednnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|2. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|3. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Aktivieren Sie die Verteidigung!\n", + /* 6*/ "Befreien Sie die Geiseln!\n", + /* 7*/ "Finden Sie die Versuchs-Waffe!\n", + /* 8*/ "Vernichten Sie die Informationen!\n", + /* 9*/ "Reprogrammieren Sie die Bombe!\n", + /* 10*/ "Vernichten Sie die Informationen!\n", + /* 11*/ "Geheime Informationen\n", + /* 12*/ "der Wache\n", + /* 13*/ "Geheime Informationen\n", + /* 14*/ "Geheime Informationen aufgenommen\n", + /* 15*/ "Selbstschussanlage aktiviert\n", + /* 16*/ "Es sind zu viele Opfer zu beklagen.\n", + /* 17*/ "Geiseln wurden gerettet.\n", + /* 18*/ "Die geheimen Informationen wurden zerstrt.\n", + /* 19*/ "Carrington wurde eliminiert.\n", + /* 20*/ "Joanna - Wir werden angegriffen!\n", + /* 21*/ "Aktivieren Sie die Selbstschussanlagen - RASCH!\n", + /* 22*/ "Die Skedar haben Geiseln genommen.\n", + /* 23*/ "Dringen Sie zu den Bros vor und retten Sie sie!\n", + /* 24*/ "Sie verwenden eine neuartige Form der Schildtechnologie.\n", + /* 25*/ "Foster hat an einer Waffe gearbeitet, die sich als \nntzlich erweisen knnte.\n", + /* 26*/ "Verdammt! Mein Bro... Wenn Sie die Daten finden...\n", + /* 27*/ "Gehen Sie zuerst dorthin und vernichten Sie die Daten, Jo.\n", + /* 28*/ "Die Dinge berstrzen sich. Sie haben eine Bombe versteckt.\n", + /* 29*/ "Finden Sie sie und schaffen Sie sie aus dem Geb舫de raus!\n", + /* 30*/ "Zugriff verweigert - Keine Zugriffsberechtigung.\n", + /* 31*/ "Notfallprogramm wurde initiiert.\n", + /* 32*/ "Ausgezeichnet, Joanna. Wir haben es fast geschafft...\n", + /* 33*/ "Das letzte Schiff wartet auf Sie. Beeilung!\n", + /* 34*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 35*/ "Die Selbstschussanlagen werden sehr hilfreich sein.\n", + /* 36*/ "Daran hat Foster also gearbeitet.\n", + /* 37*/ "Ich muss vorsichtig sein... Die Geiseln \nverlassen sich auf mich.\n", + /* 38*/ "Wenigstens werde ich es nie erfahren, \nwenn ich einen Fehler gemacht habe.\n", + /* 39*/ "Die Bombe ist detoniert...\n", + /* 40*/ "Sie haben einen Devastator erhalten.\n", + /* 41*/ "Sind Sie fertig, Joanna? Wir knnen die Maianische Delegation nicht warten lassen. Den Pr舖identen natrlich auch nicht.\n", + /* 42*/ "Ob ich fertig bin? Wovon reden Sie? Ich war schon vor einer halben Stunde fertig. SIE haben uns aufgehalten!\n", + /* 43*/ "Sie wissen ja, Joanna; Ich musste mich noch frisieren, und dann musste ich auch noch den passenden Anzug ausw臧len...\n", + /* 44*/ "Man sollte Sie von Spiegeln fernhalten. Nervs?\n", + /* 45*/ "Sehr sogar. Auf diesen Moment habe ich schon seit Jahren gewartet. Kontakt, friedlicher Kontakt zwischen Menschen und Maianern. Fr diesen Zweck wurde das Institut gegrndet. In wenigen Minuten sind wir im Wei゚en Haus, und die Zusammenkunft wird endlich stattfinden...\n", + /* 46*/ "Woher kam das?\n", + /* 47*/ "Es war im Erdgeschoss...\n", + /* 48*/ "Sieht so aus, als wsste jemand nicht, wann er genug hat. Wir mssen die Leute hier rausschaffen!\n", + /* 49*/ "Bringen Sie sich in Sicherheit! Ich halte sie auf; Sie knnen sp舩er zurckkommen und mich abholen!\n", + /* 50*/ "Zumindest hoffe ich, dass Sie das knnen.\n", + /* 51*/ "Sie bentigen das Data Uplink-Ger舩.\n", + /* 52*/ "Verbindung wurde hergestellt.\n", + /* 53*/ "Sicherheitssystem wird umgangen.\n", + /* 54*/ "Virus wurde erfolgreich kopiert.\n", + /* 55*/ "Der Antrieb des Schiffs wurde aktiviert.\n", + /* 56*/ "Verbindung wurde unterbrochen.\n", + /* 57*/ "Erlangen Sie das Data Uplink-Ger舩!\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink-Ger舩\n", + /* 60*/ "Ein Data Uplink-Ger舩\n", + /* 61*/ "Data Uplink-Ger舩 aufgenommen\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_i.c b/src/files/lang/jap-final/imp_str_i.c new file mode 100644 index 000000000..d31e9e8dd --- /dev/null +++ b/src/files/lang/jap-final/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Distruggi le informazioni riservate\n\nNell'ufficio di Daniel si trova una cassaforte che custodisce l'algoritmo che a suo tempo lui stesso us per decifrare il codice di comunicazione Maian. Devi distruggerlo prima che cada nelle mani della dataDyne o degli Skedar. Usa il laser per aprire un varco attraverso la porta.\n\n|Obiettivo 5: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanandosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanadosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 2: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 3: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanadosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva le difese automatiche\n", + /* 6*/ "Libera gli ostaggi\n", + /* 7*/ "Recupera l'arma sperimentale\n", + /* 8*/ "Distruggi le informazioni riservate\n", + /* 9*/ "Disattiva la bomba\n", + /* 10*/ "Procurati informazioni riservate\n", + /* 11*/ "Guardia:\n", + /* 12*/ "Informazioni riservate \n", + /* 13*/ "Informazioni riservate\n", + /* 14*/ "Prese informazioni riservate\n", + /* 15*/ "Attivate armi automatiche\n", + /* 16*/ "Uccisi troppi ostaggi\n", + /* 17*/ "Salvati gli ostaggi\n", + /* 18*/ "Distrutte informazioni riservate\n", + /* 19*/ "Carrington stato ucciso\n", + /* 20*/ "Joanna! Ci attaccano!\n", + /* 21*/ "Riattiva le armi! Presto!\n", + /* 22*/ "Gli Skedar hanno degli ostaggi!\n", + /* 23*/ "Corri negli uffici e salvali!\n", + /* 24*/ "Usano una nuova forma di tecnologia scudo.\n", + /* 25*/ "Foster lavorava ad una nuova arma \nche potrebbe tornare utile.\n", + /* 26*/ "Dannazione! Il mio ufficio... se entrano...\n", + /* 27*/ "Jo, va sul luogo e distruggi i file!\n", + /* 28*/ "La situazione disperata! Hanno messo una bomba!\n", + /* 29*/ "Trovala e allontanala dall'edificio!\n", + /* 30*/ "ACCESSO NEGATO - Autorizzazione non concessa\n", + /* 31*/ "Sono state adottate misure d'emergenza.\n", + /* 32*/ "Bel lavoro, Joanna. Ce l'abbiamo quasi fatta!\n", + /* 33*/ "L'ultima navetta ti sta aspettando! Presto!\n", + /* 34*/ "Distrutto strumento essenziale alla missione.\n", + /* 35*/ "La difesa automatica mi aiuter a venirne fuori!\n", + /* 36*/ "Ecco a cosa stava lavorando Foster!\n", + /* 37*/ "Devo andarci piano... Gli ostaggi \ncontano su di me.\n", + /* 38*/ "Cos almeno non sapr se sto facendo \nqualcosa che non va.\n", + /* 39*/ "La bomba esplosa...\n", + /* 40*/ "Hai trovato un Devastatore.\n", + /* 41*/ "Sei pronta, Joanna? Non possiamo far aspettare la delegazione Maian o il Presidente, naturalmente!\n", + /* 42*/ "Se sono pronta?! Sta scherzando? Ero gi pronta mezz'ora fa. Ci ha trattenuto lei!\n", + /* 43*/ "Ma lo sai com', Joanna... Dovevo assicurarmi di avere i capelli in ordine e poi... il vestito...\n", + /* 44*/ "Dovrebbero tenerla lontana dallo specchio! Nervoso?\n", + /* 45*/ "S, molto. Sono anni che aspetto questo momento. L'istituto stato fondato proprio per i contatti, i rapporti d'amicizia tra gli umani e i Maian... e tra pochi minuti saremo alla Casa Bianca... e finalmente arriver il grande momento...\n", + /* 46*/ "Da dove viene questo rumore?\n", + /* 47*/ "Dal pianterreno... Sicuro!\n", + /* 48*/ "C' qualcuno che non capisce quando ora di finirla. Dobbiamo tirar fuori tutti di qui!\n", + /* 49*/ "Si metta in salvo! Me ne occupo io! Pu tornare a prendermi pi tardi!\n", + /* 50*/ "O almeno, lo spero!\n", + /* 51*/ "Ti serve il Connettore Dati!\n", + /* 52*/ "Connessione avvenuta\n", + /* 53*/ "Sistemi di sicurezza superati\n", + /* 54*/ "Il virus stato scaricato.\n", + /* 55*/ "I motori della navetta si sono accesi.\n", + /* 56*/ "Connessione alla navetta interrotta.\n", + /* 57*/ "Procurati Connettore Dati.\n", + /* 58*/ "\n", + /* 59*/ "C. Dati\n", + /* 60*/ "Connettore Dati\n", + /* 61*/ "Preso Connettore Dati.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_s.c b/src/files/lang/jap-final/imp_str_s.c new file mode 100644 index 000000000..ec9b06cd2 --- /dev/null +++ b/src/files/lang/jap-final/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Autom疸icas\n\nHay armas autom疸icas situadas en lugares estrat馮icos por todo el Instituto Carrington. En este momento est疣 inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudar疣 a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Cuatro: - Destruir Informacin Sensible\n\nEn la oficina de Daniel hay una caja fuerte donde se guardan los algoritmos que us para descifrar los cdigos de comunicacin Maian hace unos aos. Deben ser destruidos antes de que dataDyne o los Skedar se hagan con ellos. Usa el l疽er para abrir la puerta.\n\n|Objetivo Cinco: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 1*/ "INSTITUTO CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Autom疸icas\n\nHay armas autom疸icas situadas en lugares estrat馮icos por todo el Instituto Carrington. En este momento est疣 inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudar疣 a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Cuatro: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Dos: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Tres: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar defensas autom疸icas\n", + /* 6*/ "Liberar a los rehenes\n", + /* 7*/ "Recuperar arma experimental\n", + /* 8*/ "Destruir informacin sensible\n", + /* 9*/ "Desactivar bomba\n", + /* 10*/ "Obt駭 informacin sensible.\n", + /* 11*/ "Guarda:\n", + /* 12*/ "Informacin sensible\n", + /* 13*/ "Informacin sensible\n", + /* 14*/ "Informacin sensible obtenida.\n", + /* 15*/ "Arma autom疸ica activada.\n", + /* 16*/ "Demasiados rehenes muertos.\n", + /* 17*/ "Los rehenes han sido salvados.\n", + /* 18*/ "La informacin sensible ha sido destruida.\n", + /* 19*/ "Carrington ha muerto.\n", + /* 20*/ "Joanna, nos atacan.\n", + /* 21*/ "Activa las armas, deprisa.\n", + /* 22*/ "Los Skedar han tomado rehenes.\n", + /* 23*/ "Sube a las oficinas y s疝valos.\n", + /* 24*/ "Est疣 usando una nueva forma de tecnologa de escudo.\n", + /* 25*/ "Foster estaba trabajando en una nueva arma que \npodra ser til.\n", + /* 26*/ "Maldicin. Mi oficina... Si logran acceder...\n", + /* 27*/ "Ve all primero, Joanna, y destruye los ficheros.\n", + /* 28*/ "Las cosas van muy mal. Han puesto una bomba.\n", + /* 29*/ "Encu駭trala y s當ala del edificio.\n", + /* 30*/ "Acceso denegado: autorizacin fallida.\n", + /* 31*/ "Las medidas de emergencia se han activado.\n", + /* 32*/ "Bien hecho, Joanna. Estamos casi a salvo...\n", + /* 33*/ "La ltima nave te est esperando. Deprisa.\n", + /* 34*/ "Objeto crtico de la misin destruido.\n", + /* 35*/ "Las autodefensas me ayudar疣 de veras.\n", + /* 36*/ "As que esto es en lo que Foster estaba trabajando.\n", + /* 37*/ "Debo de ir con cuidado... Los prisioneros \ncuentan conmigo.\n", + /* 38*/ "Bien, al menos no sabr si estoy \nhaciendo algo mal.\n", + /* 39*/ "La bomba ha sido detonada...\n", + /* 40*/ "Has obtenido un Devastador.\n", + /* 41*/ "ソPreparada, Joanna? No podemos hacer esperar a la delegacin Maian. Ni al Presidente, por supuesto.\n", + /* 42*/ "ソPreparada? ソQu quieres decir? Llevo preparada desde hace media hora. \n。T nos has entretenido!\n", + /* 43*/ "Pero ya sabes cmo va, Joanna... Tengo que estar seguro de que mi pelo est bien, y tambi駭 estaba el traje...\n", + /* 44*/ "Deberan alejarte de los espejos. ソNervioso?\n", + /* 45*/ "Mucho. Llevo esperando este momento desde hace bastantes aos. El contacto, amigable, entre Humanos y Maian es para lo que se fund el Instituto. Y en unos minutos estaremos en la Casa Blanca, y ocurrir finalmente...\n", + /* 46*/ "ソDe dnde proviene ese ruido?\n", + /* 47*/ "Parece la planta baja...\n", + /* 48*/ "Parece que alguien no sabe cu疣do retirarse. 。Tenemos que sacar a todo el mundo fuera!\n", + /* 49*/ "。Largo! Les mantendr alejados... 。Puedes volver y recogerme luego!\n", + /* 50*/ "Al menos, espero que puedas.\n", + /* 51*/ "Necesitas el Conector de Datos.\n", + /* 52*/ "Se ha realizado la conexin.\n", + /* 53*/ "Saltando sistemas de seguridad.\n", + /* 54*/ "El virus ha sido descargado con 騙ito.\n", + /* 55*/ "Los motores de la nave han sido activados.\n", + /* 56*/ "La conexin con la nave se ha cortado.\n", + /* 57*/ "Obt駭 el Conector de Datos.\n", + /* 58*/ "\n", + /* 59*/ "C. Datos\n", + /* 60*/ "Un Conector de Datos\n", + /* 61*/ "Conector de Datos obtenido.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/junE.c b/src/files/lang/jap-final/junE.c similarity index 100% rename from src/files/lang/junE.c rename to src/files/lang/jap-final/junE.c diff --git a/src/files/lang/junJ.c b/src/files/lang/jap-final/junJ.c similarity index 100% rename from src/files/lang/junJ.c rename to src/files/lang/jap-final/junJ.c diff --git a/src/files/lang/junP.c b/src/files/lang/jap-final/junP.c similarity index 100% rename from src/files/lang/junP.c rename to src/files/lang/jap-final/junP.c diff --git a/src/files/lang/jun_str_f.c b/src/files/lang/jap-final/jun_str_f.c similarity index 100% rename from src/files/lang/jun_str_f.c rename to src/files/lang/jap-final/jun_str_f.c diff --git a/src/files/lang/jun_str_g.c b/src/files/lang/jap-final/jun_str_g.c similarity index 100% rename from src/files/lang/jun_str_g.c rename to src/files/lang/jap-final/jun_str_g.c diff --git a/src/files/lang/jun_str_i.c b/src/files/lang/jap-final/jun_str_i.c similarity index 100% rename from src/files/lang/jun_str_i.c rename to src/files/lang/jap-final/jun_str_i.c diff --git a/src/files/lang/jun_str_s.c b/src/files/lang/jap-final/jun_str_s.c similarity index 100% rename from src/files/lang/jun_str_s.c rename to src/files/lang/jap-final/jun_str_s.c diff --git a/src/files/lang/lamE.c b/src/files/lang/jap-final/lamE.c similarity index 100% rename from src/files/lang/lamE.c rename to src/files/lang/jap-final/lamE.c diff --git a/src/files/lang/lamJ.c b/src/files/lang/jap-final/lamJ.c similarity index 100% rename from src/files/lang/lamJ.c rename to src/files/lang/jap-final/lamJ.c diff --git a/src/files/lang/lamP.c b/src/files/lang/jap-final/lamP.c similarity index 100% rename from src/files/lang/lamP.c rename to src/files/lang/jap-final/lamP.c diff --git a/src/files/lang/lam_str_f.c b/src/files/lang/jap-final/lam_str_f.c similarity index 100% rename from src/files/lang/lam_str_f.c rename to src/files/lang/jap-final/lam_str_f.c diff --git a/src/files/lang/lam_str_g.c b/src/files/lang/jap-final/lam_str_g.c similarity index 100% rename from src/files/lang/lam_str_g.c rename to src/files/lang/jap-final/lam_str_g.c diff --git a/src/files/lang/lam_str_i.c b/src/files/lang/jap-final/lam_str_i.c similarity index 100% rename from src/files/lang/lam_str_i.c rename to src/files/lang/jap-final/lam_str_i.c diff --git a/src/files/lang/lam_str_s.c b/src/files/lang/jap-final/lam_str_s.c similarity index 100% rename from src/files/lang/lam_str_s.c rename to src/files/lang/jap-final/lam_str_s.c diff --git a/src/files/lang/leeE.c b/src/files/lang/jap-final/leeE.c similarity index 100% rename from src/files/lang/leeE.c rename to src/files/lang/jap-final/leeE.c diff --git a/src/files/lang/jap-final/leeJ.c b/src/files/lang/jap-final/leeJ.c new file mode 100644 index 000000000..208097f5c --- /dev/null +++ b/src/files/lang/jap-final/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nヨヒマ縲マぅう′♭メわ栫メm<オ∈んエ∨≠ヘミマ艨モ>浴クゃリナ∨ン÷ワリ≧dメ黽メm♭ロ≒∝√メき∀∃エ⇔⊇≫テ∀マΨ♯⊇∨ツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|モ′ワセ\n\n≠ヘミマ艢エ\ndモdメぢエ⇔⊇≫黽∈Β∽∩≒トエ⇔⊇≫エム縲騾メワ♭d∨¬∈らエ⇔⊇∨嫡アメムミマメ£窶ラ゚d⌒c∃∋Åツd∨¬∵∧¬≒メマぢ≪っ∠メ∈み艨エ⇔≡ツ∧メ黽∈ぢエ宦艨シツ\n\n|しじ操セεロd♀lキはu∈ばぱ\n\n黽モεロd♀♭ぎ≒√⇔∪≪≠魔潤ソ≒メム∵ッィ♭⊆≫ツεロd♀メlキはu∈ばぱナ÷モ′ワ∨¬∵黽マ♀ハヨマナ≠タ≪っ⊥≫≡⊂マヌム†∃≒∃⊇ツ\n\n|しじ逐セ私チハメ騾ハ焉クラツ\n\n♀ハヨマロワ窶モρケ∃≒翌ト♭ルマ縲dト√⇔⊇≫メÅ∵<普モムマ″ハ≠∩≒メΡ┏lキ∵⊆≪<ツいナ⇔⊇∃⊇≡⊂Åツ私チハ∈にフ∽ニリ轣マ⊆≫dユルマ縲d∈窿ナ⇔騾ハ焉クラチメÅツ∧⊂ニ√†モ′ワ∨¬モ黽マ♀ハヨマナぢ≪っ∠テ∀∵♭タ≫Å∽⊂ツ\n\n|しじ凍セ艨劇ロワ窶マミランワヌ≡\n\nモ′ワ∀ちマ÷ワ゚dハ£メ⊆≫艨劇d∈なにスすヌ≡ツ∧⊂ニ√†ぽモ艨劇ロワ窶マミランワナ=テメ∵♪テマユ∩エ⇔⊇≫∩∈烙ネハラ♭タ≫♭⊆∽⊂ツリ∨ワ゚dハ£マモワリ≧dメ┨驍⌒浴ト√≫モÅツ∧メ∵⊆√†÷ムミマ┬∵ワリ≧dヨメ氓べ∈ナ∩ツ≫テ∀∵♭タ≫Å∽⊂ツ\n\n|しじ楳セてbロワ窶∈ばぱヌ≡\n\nムマ″ハ≠∩≒οリメγぼルdワ∈ぬねト√⇔ナリ⊂∀≠艪メぢエ宦痰怐謔ナ⇔ナリ⊂ぃい゚∵⊆≫ツヵメ⊂¬マてbロワ窶∈ばぱナ÷モマ≠マ∈┏トヌ⇔ナリ⊃ツ\n\n|しじ斧セムマ″ハ≠∈l普ヌ≡\n\nムマ″ハ≠∈l普ニ√†=テメ黽メぢエ宦痺ロqモÅツ\n\nEND\n", + /* 1*/ "ワリ≧d黽\n", + /* 2*/ "|ワ竄пbhセ\n\nヨヒマ縲マぅう′♭メわ栫メm<オ∈んエ∨≠ヘミマ艨モ>浴クゃリナ∨ン÷ワリ≧dメ黽メm♭ロ≒∝√メき∀∃エ⇔⊇≫テ∀マΨ♯⊇∨ツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|モ′ワセ\n\n≠ヘミマ艢エ\ndモdメぢエ⇔⊇≫黽∈Β∽∩≒トエ⇔⊇≫エム縲騾メワ♭d∨¬∈らエ⇔⊇∨嫡アメムミマメ£窶ラ゚d⌒c∃∋Åツd∨¬∵∧¬≒メマぢ≪っ∠メ∈み艨エ⇔≡ツ∧メ黽∈ぢエ宦艨シツ\n\n|しじ操セεロd♀lキはu∈ばぱ\n\n黽モεロd♀♭ぎ≒√⇔∪≪≠魔潤ソ≒メム∵ッィ♭⊆≫ツεロd♀メlキはu∈ばぱナ÷モ′ワ∨¬∵黽マ♀ハヨマナ≠タ≪っ⊥≫≡⊂マヌム†∃≒∃⊇ツ\n\n|しじ逐セ艨劇ロワ窶マミランワヌ≡\n\nモ′ワ∀ちマ÷ワ゚dハ£メ⊆≫艨劇d∈なにスすヌ≡ツ∧⊂ニ√†ぽモ艨劇ロワ窶マミランワナ=テメ∵♪テマユ∩エ⇔⊇≫∩∈烙ネハラ♭タ≫♭⊆∽⊂ツリ∨ワ゚dハ£マモワリ≧dメ┨驍⌒浴ト√≫モÅツ∧メ∵⊆√†÷ムミマ┬∵ワリ≧dヨメ氓べ∈ナ∩ツ≫テ∀∵♭タ≫Å∽⊂ツ\n\n|しじ凍セてbロワ窶∈ばぱヌ≡\n\nムマ″ハ≠∩≒οリメγぼルdワ∈ぬねト√⇔ナリ⊂∀≠艪メぢエ宦痰怐謔ナ⇔ナリ⊂ぃい゚∵⊆≫ツヵメ⊂¬マてbロワ窶∈ばぱナ÷モマ≠マ∈┏トヌ⇔ナリ⊃ツ\n\n|しじ楳セムマ″ハ≠∈l普ヌ≡\n\nムマ″ハ≠∈l普ニ√†=テメ黽メぢエ宦痺ロqモÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nヨヒマ縲マぅう′♭メわ栫メm<オ∈んエ∨≠ヘミマ艨モ>浴クゃリナ∨ン÷ワリ≧dメ黽メm♭ロ≒∝√メき∀∃エ⇔⊇≫テ∀マΨ♯⊇∨ツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|モ′ワセ\n\n≠ヘミマ艢エ\ndモdメぢエ⇔⊇≫黽∈Β∽∩≒トエ⇔⊇≫エム縲騾メワ♭d∨¬∈らエ⇔⊇∨嫡アメムミマメ£窶ラ゚d⌒c∃∋Åツd∨¬∵∧¬≒メマぢ≪っ∠メ∈み艨エ⇔≡ツ∧メ黽∈ぢエ宦艨シツ\n\n|しじ操セεロd♀lキはu∈ばぱ\n\n黽モεロd♀♭ぎ≒√⇔∪≪≠魔潤ソ≒メム∵ッィ♭⊆≫ツεロd♀メlキはu∈ばぱナ÷モ′ワ∨¬∵黽マ♀ハヨマナ≠タ≪っ⊥≫≡⊂マヌム†∃≒∃⊇ツ\n\n|しじ逐セ艨劇ロワ窶マミランワヌ≡\n\nモ′ワ∀ちマ÷ワ゚dハ£メ⊆≫艨劇d∈なにスすヌ≡ツ∧⊂ニ√†ぽモ艨劇ロワ窶マミランワナ=テメ∵♪テマユ∩エ⇔⊇≫∩∈烙ネハラ♭タ≫♭⊆∽⊂ツリ∨ワ゚dハ£マモワリ≧dメ┨驍⌒浴ト√≫モÅツ∧メ∵⊆√†÷ムミマ┬∵ワリ≧dヨメ氓べ∈ナ∩ツ≫テ∀∵♭タ≫Å∽⊂ツ\n\n|しじ凍セムマ″ハ≠∈l普ヌ≡\n\nムマ″ハ≠∈l普ニ√†=テメ黽メぢエ宦痺ロqモÅツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "εロd♀lキはu∈ばぱ\n", + /* 6*/ "私チハメ騾ハ焉クラツ\n", + /* 7*/ "艨劇ロワ窶マミランワヌ≡\n", + /* 8*/ "てbロワ窶∈ばぱヌ≡\n", + /* 9*/ "ムマ″ハ≠∈l普ヌ≡\n", + /* 10*/ "εロd♀∵リエ∨\n", + /* 11*/ "私チハメ騾ハ焉諢ラ⊇∨\n", + /* 12*/ "モ′ワ∵ほト√∨\n", + /* 13*/ "艨隙∈Η∨\n", + /* 14*/ "モ℃d゚dロて\n", + /* 15*/ "私チハメワリ≧d∈ュ⇔ほナ∨\n", + /* 16*/ "≠ヘミマ艢<テロd♀∈⊥⇔≡ツ\nmマ√∃⊇∋Åツ\n", + /* 17*/ "私チハメ騾ハ焉クサ∋Å≡ツ∧⊂ナ∨≒mマ√≫∩≒ツ\n", + /* 18*/ "ィ、ツヒみチぢ≪っ⊥∨≡ツ私チハ♭う∪⊂ツ\n", + /* 19*/ "≠ヘミマ艢<ニモヤÅエ∨∩⊇タ\n", + /* 20*/ "ト⊆テ√∈ツタエ∀マ⇒∩≒蚕n", + /* 21*/ "AR34ム∈ゐツ宦エ∨\n", + /* 22*/ "ト⊆∞ヒマぼテ⊂ツ\nラ⊇⇔⊇≫モ℃d゚d♭=ヘ≪⊆⊃けマぼエ⇔⇔ツ\n", + /* 23*/ "てbモ轢dロワ窶∵ばぱト√∨\n", + /* 24*/ "Ψ∈⇒ツ⇔=ヘミマ艢エ潤⊂⌒瘁焉クシ≒ヌ∨ル∨⊇蚕n", + /* 25*/ "ムマ″ハ≠∈l普ナ∨\n", + /* 26*/ "けマぼエ⇔=ヘミマ艢ツひ≪メφュ∈烙ネハラニ≫≡ツ\nト⊆Β♭う∪⊂ツ\n", + /* 27*/ "モ′ワエ純吹フチ√∨メムツ\nεロd♀lキはu∈ぱニ∝ムツ\n", + /* 28*/ "ト⊆⇔=セ縺モ私チハメ騾ハ焉ムツ\n", + /* 29*/ "テメロマ∵艨劇ロワ窶Å∝\nワリ≧dメワ゚dハ£⌒⊆≫ナツ\n", + /* 30*/ "テメけメムマ″ハ≠∈l普ナ⇔ナリ⊃†\nテメモヴ∨¬メ⌒メÅ∝ツ\n", + /* 31*/ "ト⊆=ワエ∀ヒマす⌒⊂蚕n", + /* 32*/ "メメヌ蚕n♪⊂∂≒<⊇轣メ≡⊂ム蚕n", + /* 33*/ "∪ヤトナ¶≪ム=セ烙ヒマツ\nヴメテ∀モゃ⊃⇔⊇≫∝≡ムツ\n", + /* 34*/ "ミマ゚モエ純堰驕ノ∀━エ⇔⊇∨∝ツ\n⊆√∩≒諠潟轣諱ヒ∩⊥∃∩エ∨ナ蚕n", + /* 35*/ "∧⊂=セ掾ノ¬モムツ死氏⌒\nワリ≧d∩≒モラ驕焉縺ホ∩エ∨蚕n", + /* 36*/ "ヰ∨∝ツ瘁焉゚エ\nヴ∵ヤ縲マ∃≫∩≒<堰驕ホト⊇エ\n", + /* 37*/ "ユレマ♀=⊂ナ⇔死タ\n", + /* 38*/ "ヴモ窿ト√∨ÅツÅエ∨死ツ\n≠ヘミマ艢÷瘁焉ソ≒x艨クぎ≫メ≡ツ\n", + /* 39*/ "ヒdddエエエ\n", + /* 40*/ "項≧黽∩≒メ陪∈に≫∃∋⇔\n⌒¬∽∋梶ロ⇔ツ∃∋⇔ヨム∃メ蚕n", + /* 41*/ "騾タ\n", + /* 42*/ "Ζ死純、≒√∃⊇エエ\n", + /* 43*/ "モ′ワタ潤⊂ナ∨メタ\n", + /* 44*/ "♪テヨぼチメタ\n", + /* 45*/ "xモマ驕瘁ホタオツ⇒⊇⇔タ⇔エ\n", + /* 46*/ "ロ⊇♭=テメリ∈フ√≡⊂エ\n", + /* 47*/ "私チハメ騾ハ焉モハラト√⇔⊇リニ\nεロd♀∵リÅδいm\n", + /* 48*/ "しじメぼマあぃモ∃はu∵ばぱト√∨\n", + /* 49*/ "、磨縲盾ヘu∈ばぱ♭タリヌ∋\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "轢ハラワ\n", + /* 53*/ "轢ハラワ\n", + /* 54*/ "ユレマ♀メ轢ハラワ∈みマ√∨\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/leeP.c b/src/files/lang/jap-final/leeP.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/jap-final/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_f.c b/src/files/lang/jap-final/lee_str_f.c new file mode 100644 index 000000000..4f1edeef8 --- /dev/null +++ b/src/files/lang/jap-final/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Ouvrir les portes du hangar\n\nLe syst鑪e d'accostage est d'habitude contrl en auto: il a d 黎re d騅i depuis le pont. Ouvrez les portes en vous servant des commandes au-dessus du hangar et Elvis pourra accomplir son accostage.\n\n|Objectif 3: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 4: - Saboter les syst鑪es de propulsion\n\nLe plan d'assaut du croiseur risque d'馗houer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arr黎e.\n\n|Objectif 5: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Saboter les syst鑪es de propulsion\n\nLe plan d'assaut du croiseur risque d'馗houer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arr黎e.\n\n|Objectif 4: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Annuler le syst鑪e de bouclier\n", + /* 6*/ "Ouvrir les portes du hangar\n", + /* 7*/ "Acc馘er aux syst鑪es de navigation\n", + /* 8*/ "Saboter les syst鑪es de propulsion\n", + /* 9*/ "Contrler le pont\n", + /* 10*/ "Boucliers du vaisseau baiss駸.\n", + /* 11*/ "Portes du hangar ouvertes.\n", + /* 12*/ "Elvis abattu.\n", + /* 13*/ "Infos de navigation r馗up駻馥s.\n", + /* 14*/ "Ascenseur activ.\n", + /* 15*/ "Skedars du hangar abattus.\n", + /* 16*/ "Joanna! Baisse les boucliers \net nous t'aiderons.\n", + /* 17*/ "Ouvre les portes du hangar pour que l'on puisse accoster.\n", + /* 18*/ "OK. Nous y sommes. Je te retrouve dans le hangar.\n", + /* 19*/ "Ca me fait plaisir de te voir, Joanna. \n", + /* 20*/ "Prends 軋. C'est utile, tu verras...\n", + /* 21*/ "Fusil d'assaut AR34 obtenu.\n", + /* 22*/ "Il faut monter. Je prends cet ascenseur. \nPrends l'autre.\n", + /* 23*/ "Moteurs coup駸.\n", + /* 24*/ "Attention Joanna! Ils sont en col鑽e je crois...\n", + /* 25*/ "Pont captur.\n", + /* 26*/ "Vas-y, Joanna. Je s馗urise le p駻im鑼re. \nOn se retrouve plus tard.\n", + /* 27*/ "Je dois abaisser les boucliers pour faire entrer \nElvis. J'ai besoin d'aide...\n", + /* 28*/ "Seules les portes de hangar sont sur le chemin.\n", + /* 29*/ "Cette machine contient les cartes stellaires skedars.\n", + /* 30*/ "Si nous contrlons le pont, le vaisseau sera notre merci.\n", + /* 31*/ "Il est temps de monter...\n", + /* 32*/ "Oohhh... Dites-moi que ce n'est pas vrai.\n", + /* 33*/ "Et si. Regardez donc qui est avec vous, ma ch鑽e.\n", + /* 34*/ "Vous! Vous ne vous 黎es pas enfuie? Nous avions perdu votre trace...\n", + /* 35*/ "Leurrer les Skedars 騁ait plus difficile. Vous et Mr. Carrington avez pu vous en rendre compte.\n", + /* 36*/ "Attendez ici! Je vais cr馥r une diversion. Cela vous donnera l'occasion de partir. Faites vite ou nous mourrons.\n", + /* 37*/ "Pourquoi faites-vous tout 軋, Cassandra?\n", + /* 38*/ "Les Skedars m'ont utilis馥. Vous 黎es ma seule chance de me venger.\n", + /* 39*/ "Aaaaaahhhhhhh!!!\n", + /* 40*/ "C'est la premi鑽e fois que je vois une plan鑼e depuis l'espace... C'est magnifique.\n", + /* 41*/ "Hein?\n", + /* 42*/ "Je... Je ne le crois pas!\n", + /* 43*/ "Elvis? Qu'est-ce qu'il y a?\n", + /* 44*/ "O vas-tu?\n", + /* 45*/ "Nous devons descendre la surface! Suis-moi!\n", + /* 46*/ "Il faut sortir d'ici!\n", + /* 47*/ "Portes hangar ferm馥s - boucliers actifs.\n", + /* 48*/ "Objet crucial d騁ruit.\n", + /* 49*/ "Munitions 駱uis馥s - panneaux ne peuvent 黎re d騁ruits.\n", + /* 50*/ "Obtenir collier de De Vries.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Collier\n", + /* 53*/ "Collier de De Vries\n", + /* 54*/ "Collier de De Vries obtenu.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_g.c b/src/files/lang/jap-final/lee_str_g.c new file mode 100644 index 000000000..a38c4b6ed --- /dev/null +++ b/src/files/lang/jap-final/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - ヨffnen Sie die Hangartore!\n\nDas Andock-System wird im Normalfall automatisch gesteuert. Es muss von der Brcke aus auf manuelle Bedienung umgestellt worden sein. ヨffnen Sie die Tore mit Hilfe der lokalen Kontrollinstrumente, um Elvis das Andocken zu ermglichen.\n\n|3. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|4. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu bernehmen, knnte schief gehen, wenn der Kommandant den vorgegebenen Kurs 舅dert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|5. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHIFF\n", + /* 2*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|3. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu bernehmen, knnte schief gehen, wenn der Kommandant den vorgegebenen Kurs 舅dert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|4. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|3. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Setzen Sie den Schild au゚er Betrieb!\n", + /* 6*/ "ヨffnen Sie die Hangartore!\n", + /* 7*/ "Nehmen Sie Einblick in die Sternenkarte!\n", + /* 8*/ "Sabotieren Sie die Antriebssysteme!\n", + /* 9*/ "Entern Sie die Brcke!\n", + /* 10*/ "Die Schilde wurden heruntergefahren.\n", + /* 11*/ "Die Hangartore wurden geffnet.\n", + /* 12*/ "Elvis wurde eliminiert.\n", + /* 13*/ "Navigationsinformation wurde erlangt.\n", + /* 14*/ "Aufzug wurde aktiviert.\n", + /* 15*/ "Alle Skedar im Hangarbereich wurden eliminiert.\n", + /* 16*/ "Joanna! Fahr die Schilde runter! Dann \nknnen wir dir helfen.\n", + /* 17*/ "Du musst die Hangartore ffnen, sonst knnen wir nicht andocken!\n", + /* 18*/ "Okay, wir sind drin. Wir treffen uns im Hangar.\n", + /* 19*/ "Es ist schn dich zu sehen, Joanna.\n", + /* 20*/ "Nimm das - das kannst du sicher gut gebrauchen...\n", + /* 21*/ "AR34 erhalten\n", + /* 22*/ "Wir sollten nach oben gehen. Ich nehme diesen Aufzug; \nnimm du den anderen.\n", + /* 23*/ "Die Maschinen wurden unbrauchbar gemacht.\n", + /* 24*/ "Vorsicht Joanna! Ich glaube, sie sind jetzt sauer...\n", + /* 25*/ "Die Brcke wurde eingenommen.\n", + /* 26*/ "Du gehst voraus, Jo. Ich sichere diesen Teil des Schiffes. \nWir treffen uns sp舩er.\n", + /* 27*/ "Ich muss die Schilde runterfahren, damit Elvis \nlanden kann. Ich brauche jede Hilfe, die ich kriegen kann.\n", + /* 28*/ "Jetzt sind nur noch die Hangartore im Weg.\n", + /* 29*/ "In dieser Maschine werden die Sternenkarten gespeichert.\n", + /* 30*/ "Wenn wir die Brcke einnehmen, gehrt das Schiff uns.\n", + /* 31*/ "Wir sollten nach oben gehen...\n", + /* 32*/ "Oohhh... Ich hoffe, ich bin nicht da, wo ich befrchte zu sein.\n", + /* 33*/ "Es ist sogar noch schlimmer als das, Sch舩zchen. Und sieh nur, wer dir Gesellschaft leistet.\n", + /* 34*/ "Sie! Ich dachte, Sie w舐en entkommen. Wir konnten keine Spur von Ihnen finden.\n", + /* 35*/ "Ihr konntet mich zwar nicht finden, die Skedar konnten es sehr wohl. Das drfte dir und Mr. Carrington auch aufgefallen sein.\n", + /* 36*/ "Bleib da stehen! Ich werde sie ablenken. Das verschafft dir eine Chance, um hier rauszukommen. Nimm sie wahr, oder...\n", + /* 37*/ "Warum tun Sie das, Cassandra?\n", + /* 38*/ "Die Skedar haben mich benutzt. Du bietest mir die Mglichkeit, Rache zu nehmen.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. Das ist das erste Mal, dass ich einen anderen Planeten vom Weltall aus sehe. Wunderschn!\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "Ich... Ich glaube das nicht!\n", + /* 43*/ "Elvis? Was ist das?\n", + /* 44*/ "Wohin gehst du?\n", + /* 45*/ "Wir mssen die Oberfl臘he erreichen! Folge mir!\n", + /* 46*/ "Wir mssen hier raus!\n", + /* 47*/ "Hangartore verriegelt - Schilde sind noch aktiv.\n", + /* 48*/ "Wichtiges Objekt zerstrt.\n", + /* 49*/ "Die Konsolen knnen ohne Munition nicht zerstrt werden.\n", + /* 50*/ "Erlangen Sie De Vries Halskette!\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Halskette\n", + /* 53*/ "Cassandra De Vries Halskette\n", + /* 54*/ "De Vries Halskette aufgenommen\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_i.c b/src/files/lang/jap-final/lee_str_i.c new file mode 100644 index 000000000..a1124b6b1 --- /dev/null +++ b/src/files/lang/jap-final/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Apri le porte dell'hangar\n\nIl sistema di attracco normalmente comandato in automatico e deve quindi essere disattivato dal ponte. Apri le porte azionando i comandi collocati sopra all'hangar, in modo che Elvis possa portare a termine la manovra di atterraggio.\n\n|Obiettivo 3: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 4: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave pu fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 5: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 1*/ "ASTRONAVE D'ASSALTO SKEDAR\n", + /* 2*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave pu fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 4: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il sistema scudo\n", + /* 6*/ "Apri le porte dell'hangar\n", + /* 7*/ "Accedi al sistema di navigazione\n", + /* 8*/ "Sabotaggio al sistema motore\n", + /* 9*/ "Assumi il controllo del ponte\n", + /* 10*/ "Abbassati gli scudi dell'astronave.\n", + /* 11*/ "Aperte le porte dell'hangar.\n", + /* 12*/ "Elvis stato ucciso.\n", + /* 13*/ "Recuperate informazioni di navigazione.\n", + /* 14*/ "Attivato l'ascensore.\n", + /* 15*/ "Uccisi tutti gli Skedar nell'hangar.\n", + /* 16*/ "Avanti, Joanna! Disattiva gli scudi \ncos potremo aiutarti!\n", + /* 17*/ "Devi aprire le porte dell'hangar affinch possiamo attraccare!\n", + /* 18*/ "Bene, ci siamo! Ci vediamo nell'hangar.\n", + /* 19*/ "Vedo che stai bene, Joanna!\n", + /* 20*/ "Ecco, tieni! Ti sar utile!\n", + /* 21*/ "Preso il fucile d'assalto AR34.\n", + /* 22*/ "ネ ora di salire, forza! Io prendo quest'ascensore, \ntu prendi quell'altro.\n", + /* 23*/ "I motori sono stati disattivati.\n", + /* 24*/ "Attenta, Joanna! Mi sembrano leggermente irritati...\n", + /* 25*/ "Assunto controllo del ponte.\n", + /* 26*/ "Va avanti tu, Jo! Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 27*/ "Devo disattivare quegli scudi per far entrare Elvis. \nMi serve aiuto!\n", + /* 28*/ "Ora mi restano solo le porte dell'hangar.\n", + /* 29*/ "Questa macchina contiene la mappa astronomica Skedar.\n", + /* 30*/ "Se riusciamo a prendere il controllo del ponte, \nl'astronave sar nostra.\n", + /* 31*/ "ネ ora di salire...\n", + /* 32*/ "Ops... Sono sicuramente nel posto sbagliato al momento sbagliato.\n", + /* 33*/ "E c' di peggio, immagino! Guarda un po' chi c' qui!!!\n", + /* 34*/ "Lei! Pensavo che fosse riuscita a squagliarsela. ネ sparita senza lasciare traccia!!!\n", + /* 35*/ "Non mi avete trovato VOI! Ma dagli Skedar non si scappa, come avrete sicuramente notato tu e Carrington!\n", + /* 36*/ "Prendi questo e aspetta l! Se riesco a distrarli, avrai la possibilit di uscire di qua! Forza, usalo o moriremo entrambe!\n", + /* 37*/ "Perch lo fa, Cassandra?\n", + /* 38*/ "Gli Skedar mi hanno usata, Joanna e tu sei la mia unica possibilit di vendetta!\n", + /* 39*/ "Aaaaargh!!!\n", + /* 40*/ "Ehi! ネ la prima volta che vedo un altro pianeta dallo spazio! ネ fantastico!\n", + /* 41*/ "Eeeeeh?\n", + /* 42*/ "Non... non ci posso credere!\n", + /* 43*/ "Elvis? Che roba ?\n", + /* 44*/ "Che fai? Dove vai?\n", + /* 45*/ "Dobbiamo raggiungere la superficie! Dai, vieni!\n", + /* 46*/ "Dobbiamo uscire di qua!\n", + /* 47*/ "Porte hangar bloccate - Scudi ancora attivi.\n", + /* 48*/ "Distrutto strumento essenziale alla missione.\n", + /* 49*/ "Finite le munizioni - Impossibile distruggere quadro comandi.\n", + /* 50*/ "Collana di De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collana\n", + /* 53*/ "Collana di De Vries\n", + /* 54*/ "Presa collana di De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_s.c b/src/files/lang/jap-final/lee_str_s.c new file mode 100644 index 000000000..be7bf3c60 --- /dev/null +++ b/src/files/lang/jap-final/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Abrir Puertas del Hangar\n\nNormalmente el sistema de atraque se controla de forma autom疸ica: debe ser anulado desde el puente. Abre las puertas usando los controles locales sin tener en cuenta el hangar, y Elvis podr terminar el ciclo de aterrizaje.\n\n|Objetivo Tres: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Cuatro: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debera salir mal si el Comandante altera el curso establecido. Manipula los motores para que as la nave se pare.\n\n|Objetivo Cinco: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 1*/ "NAVE DE ASALTO SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debera salir mal si el Comandante altera el curso establecido. Manipula los motores para que as la nave se pare.\n\n|Objetivo Cuatro: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar sistemas de escudo\n", + /* 6*/ "Abrir puertas del hangar\n", + /* 7*/ "Acceder a los sistemas de navegacin\n", + /* 8*/ "Sabotear los motores\n", + /* 9*/ "Ganar el control del puente\n", + /* 10*/ "Los escudos de la nave han sido bajados.\n", + /* 11*/ "Las puertas del hangar han sido abiertas.\n", + /* 12*/ "Elvis ha muerto.\n", + /* 13*/ "La informacin de navegacin ha sido recuperada.\n", + /* 14*/ "El ascensor ha sido activado.\n", + /* 15*/ "Todos los Skedar del hangar han muerto.\n", + /* 16*/ "Espera, Joanna. Baja los escudos y \nte podremos ayudar.\n", + /* 17*/ "Tienes que abrir las puertas del hangar \npara que podamos atracar.\n", + /* 18*/ "Vale, estamos dentro. Te ver en el hangar.\n", + /* 19*/ "Me alegro de verte, Joanna.\n", + /* 20*/ "Toma esto: lo encontrar疽 til...\n", + /* 21*/ "Rifle de asalto AR34 recibido.\n", + /* 22*/ "Es hora de avanzar. Yo tomar este ascensor; \nt toma el otro.\n", + /* 23*/ "Los motores han sido desactivados.\n", + /* 24*/ "。Cuidado, Joanna! Creo que les hemos hecho enfadar...\n", + /* 25*/ "El puente ha sido capturado.\n", + /* 26*/ "Ve delante, Joanna. Asegurar el permetro. \nNos vemos luego.\n", + /* 27*/ "Tengo que conseguir bajar esos escudos para \nmeter a Elvis. Necesito toda la ayuda que pueda obtener.\n", + /* 28*/ "Ahora slo las puertas del hangar nos molestan.\n", + /* 29*/ "Esta m痃uina contiene los mapas estelares Skedar.\n", + /* 30*/ "Si controlamos el puente, entonces la nave ser nuestra.\n", + /* 31*/ "Es hora de avanzar...\n", + /* 32*/ "Oohhh... Preferira no estar donde creo que estoy.\n", + /* 33*/ "Y es peor que eso, querida. Slo mira a qui駭 tienes por compaa.\n", + /* 34*/ "。T! Crea que habas escapado. No encontramos ningn rastro tuyo.\n", + /* 35*/ "No pudisteis encontrarme. Pero no me esconda de los Skedar, como t y el Sr. Carrington descubristeis.\n", + /* 36*/ "Eso es. 。Espera aqu! Crear una distraccin; te dar la oportunidad de escapar. レsala o moriremos ambas.\n", + /* 37*/ "ソPor qu haces esto, Cassandra?\n", + /* 38*/ "Los Skedar me usaron, Joanna. T eres mi mejor baza para vengarme.\n", + /* 39*/ "。。。Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Guau. ノsta es la primera vez que veo otro planeta desde el espacio. Es precioso.\n", + /* 41*/ "ソHmmmm?\n", + /* 42*/ "No... 。No puedo creerlo!\n", + /* 43*/ "ソElvis? ソQu pasa?\n", + /* 44*/ "ソDnde vas?\n", + /* 45*/ "。Tenemos que bajar a la superficie! 。Sgueme!\n", + /* 46*/ "。Tenemos que salir de aqu!\n", + /* 47*/ "Puertas del hangar cerradas - escudos todava activos.\n", + /* 48*/ "Objeto crtico de la misin destruido.\n", + /* 49*/ "Municin agotada - las consolas no pueden ser destruidas.\n", + /* 50*/ "Obt駭 el collar de De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collar\n", + /* 53*/ "Collar de De Vries\n", + /* 54*/ "Recogiste el collar de De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/lenE.c b/src/files/lang/jap-final/lenE.c similarity index 100% rename from src/files/lang/lenE.c rename to src/files/lang/jap-final/lenE.c diff --git a/src/files/lang/lenJ.c b/src/files/lang/jap-final/lenJ.c similarity index 100% rename from src/files/lang/lenJ.c rename to src/files/lang/jap-final/lenJ.c diff --git a/src/files/lang/lenP.c b/src/files/lang/jap-final/lenP.c similarity index 100% rename from src/files/lang/lenP.c rename to src/files/lang/jap-final/lenP.c diff --git a/src/files/lang/len_str_f.c b/src/files/lang/jap-final/len_str_f.c similarity index 100% rename from src/files/lang/len_str_f.c rename to src/files/lang/jap-final/len_str_f.c diff --git a/src/files/lang/len_str_g.c b/src/files/lang/jap-final/len_str_g.c similarity index 100% rename from src/files/lang/len_str_g.c rename to src/files/lang/jap-final/len_str_g.c diff --git a/src/files/lang/len_str_i.c b/src/files/lang/jap-final/len_str_i.c similarity index 100% rename from src/files/lang/len_str_i.c rename to src/files/lang/jap-final/len_str_i.c diff --git a/src/files/lang/len_str_s.c b/src/files/lang/jap-final/len_str_s.c similarity index 100% rename from src/files/lang/len_str_s.c rename to src/files/lang/jap-final/len_str_s.c diff --git a/src/files/lang/lipE.c b/src/files/lang/jap-final/lipE.c similarity index 100% rename from src/files/lang/lipE.c rename to src/files/lang/jap-final/lipE.c diff --git a/src/files/lang/jap-final/lipJ.c b/src/files/lang/jap-final/lipJ.c new file mode 100644 index 000000000..efb97af94 --- /dev/null +++ b/src/files/lang/jap-final/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\nぉモゆeメы∵Ψ♯∩√∃⊇≡⊂マ=タ≫Åツレチマ♀∈おぁナ∃ツ√†∃≒∃⊇ツぬはニ≫テ∀♭≠オじ∈ワd<マす⊥≫テ∀∵♭タ≫Å∽⊂∵>オン°マ⊇≫メモィナ⊇Å∽⊂ツヒみマ窿ニ≫∋Åツヵぴメξぺマ掾ニ≫┤xメ腐磨クュ⇔ヱナ≪=ネメメΚヨ∈にぺ∀ナ⇔⊇∃⊇∩∈=゚チせどニ≫メÅツン∵シ⊇ツロ⊇♭チ√ツ\n\n|しじ操セ♂d゚℃dワ∈ばぱヌ≡\n\nヵぴ÷モミ斧早メ烽о∵みナ∨ュ∈≠ロ≒メ♂d゚℃dワ∩≒ヱナ≒∃チ⇔モ∃≒∃⊇ツ♂d゚℃dワ∵ぜヨト√⇔⊇≫=メ♀ミモ=セ∧≒チハラト√⇔⊇≫ツ♂d゚マユ∈ヨナ⇔=橿ミ∈ルマ縲dナ⇔⊇≫ルマ¢フd゚マメムワ∈え≪テル=橿ミメハラ∈モニメÅツ\n\n|しじ逐セ麾ユ£ン∈烙ネハラヌ≡\n\n≠ヘ艢レマ∩≒メ#d縺マモ≦麾ユ£ンマ掾ニ≫⌒メ∵⊆≫ツf档掾メげk∃♪∵レマ£∀ナ⇔氓コヨト√⇔⊇≫∧⊂Åツテメ麾ユ£ン∈оナぁナ÷アワヨヒマ♭烙ネハラニ≫メÅツ⌒ナマ♀メ栫ソ∵ぜヨト√⇔⊇∨≒=ネメΚげ∈≡チ烙ネハラニ≫テ∀ツ\n\n|しじ凍セ蛟ノd∈ヨヌ≡\n\nсァ÷ワ゚ハメ蛟ノd∈みナ=ネ√∈エ⇔iヮワ∈∂≪ェ黶ニメÅツぬは♭タ∨≒<香サ♭ぼてニ≫ョャ∵⊆≫ツ⊇√モにば≒√⇔ナリ⊂∩≒∃ツ\n\n|しじ楳セсァ=メユd♀ヨdみ\n\nリ⌒∃チ>ツげロэ∵♪テ∩メсァ=ぼ∝√≫♭⊆∽⊂ツ∧メo゚モ≦ゥぃト√∨ルvモ√∃⊇≡⊂マハラト√⇔⊇≫∩≒>ミd♭ユd♀ヨd∈みナ⇔mマ≫メÅツュ⇔メユd♀ヨd∵痺ワ∃∝ツ♭モ∃⊇Å∽⊂ナ=橿ミマモiヮワ⌒⊇≫Å∽⊂ツ\n\n|しじ斧セп。メΚヨ∈おぁヌ≡\n\nсァ=マエ∨≒≠オじ∈≠ヒト√≫掾マニ∬マヤ%dマ≫メÅツ∨¬モ>ツk∵Κタ⇔⊇≫テ∀マΨ♯⊇∨≪=ワナチモぉ∵ηナ⇔チ≫メ∈に√†=ニ∬マツk∈「ナ≡⊂∀ニ≫Å∽⊂ツ」≪ヶナ⇔か⊂∵ワ¢d♂ニ∃ぼて∵χャÅツ\n\nEND\n", + /* 1*/ "モミ斧操巡ラなモミ\n", + /* 2*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\nぉモゆeメы∵Ψ♯∩√∃⊇≡⊂マ=タ≫Åツレチマ♀∈おぁナ∃ツ√†∃≒∃⊇ツぬはニ≫テ∀♭≠オじ∈ワd<マす⊥≫テ∀∵♭タ≫Å∽⊂∵>オン°マ⊇≫メモィナ⊇Å∽⊂ツヒみマ窿ニ≫∋Åツ∧メメΚヨ∈にぺ∀ナ⇔⊇∃⊇∩∈≡チせどニ≫メÅツン∵シ⊇ツロ騾ツ\n\n|しじ操セ麾ユ£ン∈烙ネハラヌ≡\n\n≠ヘ艢レマ∩≒メ#d縺マモ≦麾ユ£ンマ掾ニ≫⌒メ∵⊆≫ツf档掾メげk∃♪∵レマ£∀ナ⇔氓コヨト√⇔⊇≫∧⊂Åツテメ麾ユ£ン∈оナぁナ÷アワヨヒマ♭烙ネハラニ≫メÅツ⌒ナマ♀メ栫ソ∵ぜヨト√⇔⊇∨≒=ネメΚげ∈≡チ烙ネハラニ≫テ∀ツ\n\n|しじ逐セ蛟ノd∈ヨヌ≡\n\nсァ÷ワ゚ハメ蛟ノd∈みナ=ネ√∈エ⇔iヮワ∈∂≪ェ黶ニメÅツぬは♭タ∨≒<香サ♭ぼてニ≫ョャ∵⊆≫ツ⊇√モにば≒√⇔ナリ⊂∩≒∃ツ\n\n|しじ凍セсァ=メユd♀ヨdみ\n\nリ⌒∃チ>ツげロэ∵♪テ∩メсァ=ぼ∝√≫♭⊆∽⊂ツ∧メo゚モ≦ゥぃト√∨ルvモ√∃⊇≡⊂マハラト√⇔⊇≫∩≒>ミd♭ユd♀ヨd∈みナ⇔mマ≫メÅツュ⇔メユd♀ヨd∵痺ワ∃∝ツ♭モ∃⊇Å∽⊂ナ=橿ミマモiヮワ⌒⊇≫Å∽⊂ツ\n\n|しじ楳セп。メΚヨ∈おぁヌ≡\n\nсァ=マエ∨≒≠オじ∈≠ヒト√≫掾マニ∬マヤ%dマ≫メÅツ∨¬モ>ツk∵Κタ⇔⊇≫テ∀マΨ♯⊇∨≪=ワナチモぉ∵ηナ⇔チ≫メ∈に√†=ニ∬マツk∈「ナ≡⊂∀ニ≫Å∽⊂ツ」≪ヶナ⇔か⊂∵ワ¢d♂ニ∃ぼて∵χャÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\nぉモゆeメы∵Ψ♯∩√∃⊇≡⊂マ=タ≫Åツレチマ♀∈おぁナ∃ツ√†∃≒∃⊇ツぬはニ≫テ∀♭≠オじ∈ワd<マす⊥≫テ∀∵♭タ≫Å∽⊂∵>オン°マ⊇≫メモィナ⊇Å∽⊂ツン∵シ⊇ツロ⊇♭チ√ツ\n\n|しじ操セ蛟ノd∈ヨヌ≡\n\nсァ÷ワ゚ハメ蛟ノd∈みナ=ネ√∈エ⇔iヮワ∈∂≪ェ黶ニメÅツぬは♭タ∨≒<香サ♭ぼてニ≫ョャ∵⊆≫ツ⊇√モにば≒√⇔ナリ⊂∩≒∃ツ\n\n|しじ逐セсァ=メユd♀ヨdみ\n\nリ⌒∃チ>ツげロэ∵♪テ∩メсァ=ぼ∝√≫♭⊆∽⊂ツ∧メo゚モ≦ゥぃト√∨ルvモ√∃⊇≡⊂マハラト√⇔⊇≫∩≒>ミd♭ユd♀ヨd∈みナ⇔mマ≫メÅツュ⇔メユd♀ヨd∵痺ワ∃∝ツ♭モ∃⊇Å∽⊂ナ=橿ミマモiヮワ⌒⊇≫Å∽⊂ツ\n\n|しじ凍セп。メΚヨ∈おぁヌ≡\n\nсァ=マエ∨≒≠オじ∈≠ヒト√≫掾マニ∬マヤ%dマ≫メÅツ∨¬モ>ツk∵Κタ⇔⊇≫テ∀マΨ♯⊇∨≪=ワナチモぉ∵ηナ⇔チ≫メ∈に√†=ニ∬マツk∈「ナ≡⊂∀ニ≫Å∽⊂ツ」≪ヶナ⇔か⊂∵ワ¢d♂ニ∃ぼて∵χャÅツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "蛟ノd∈ヨヌ≡\n", + /* 10*/ "♂d゚℃dワ∈ばぱヌ≡\n", + /* 11*/ "麾ユ£ン∈烙ネハラヌ≡\n", + /* 12*/ "сァ=メユd♀ヨdみ\n", + /* 13*/ "п。メΚヨ∈おぁヌ≡\n", + /* 14*/ "ルマ¢フd゚レd焉メ腐磨メばぱ\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "蛟ノd\n", + /* 18*/ "蛟ノd\n", + /* 19*/ "蛟ノd∈みマ√∨\n", + /* 20*/ "♀ミヨルマ縲dヨメミランワ∵レロト√∨\n", + /* 21*/ "ろゎヨルマ縲dヨメミランワ∵レロト√∨\n", + /* 22*/ "iヮルマ縲dヨメミランワ∵レロト√∨\n", + /* 23*/ "ルマ¢フd゚メムワ∵ンハ縺ト√∨\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "♂d゚マユ\n", + /* 27*/ "♂d゚マユ\n", + /* 28*/ "♂d゚マユ∈みマ√∨\n", + /* 29*/ "сァ=マムナ∨\n", + /* 30*/ "♂d゚マユ∵ムだト√∨\n", + /* 31*/ "♂d゚マユメムだ∵で磨縺ノ\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "ユd♀ヨdヲ\n", + /* 35*/ "ユd♀ヨdヲ\n", + /* 36*/ "сァ=メユd♀ヨd∈みマ√∨\n", + /* 37*/ "∪掾モ栫タ\n", + /* 38*/ "テ≒=ネ√モヤメ宦エ\n", + /* 39*/ "νツ⇔<ヒツ⇔チ√エ\n", + /* 40*/ "べ∨∃⊇♭エ\n", + /* 41*/ "が⇔テエ∨≠焉エ\n", + /* 42*/ "′nマムなにエ\n", + /* 43*/ "ニ∬マヶト∃タオ÷ム゚ム浴マ⊆⊂∧エ\n", + /* 44*/ "≡dナ=ネエ¬∵∧メΨ∃≒エ\n", + /* 45*/ "トエト∀宦クヶヌ蚕n", + /* 46*/ "°≫掾マロ∵∃タオエ\n", + /* 47*/ "蛟ノd∈゚エ∨テ∀∵なゃナ∨\n", + /* 48*/ "メムワモよマンハ縺ト√⇔⊇リニ\n", + /* 49*/ "ルマ¢フd゚メムワメンハ繖ラリ\n", + /* 50*/ "ヰ∨∩=セ∧∩エ∨∃ツ\n", + /* 51*/ "∪⊇=セ掾モ死準ミd∈∃≒ヌエ\n", + /* 52*/ "テテマモの┸モぷ¬テルΡ┏Åツも∈ψ⊥∽ツ\n", + /* 53*/ "⌒⊂茶ャ∀か∝∃⊇エ盾焉クψ⊥≫∋Åツ\n", + /* 54*/ "≡∽ナ⊇=モiヮ∈ユ†ヌ⇔⌒≒∪⊂\n", + /* 55*/ "ル∋∃ぉ∈らエ⇔∨∋Å\n", + /* 56*/ "しじメぼマあぃモ∃┳Σ∵ほト√∨\n", + /* 57*/ "сァ=ヨメd縺謔ケぜ♭タリヌ∋\n", + /* 58*/ "∪⊇=テ⊇⇒モ騾dオ∃⊇ツムÅエ\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "ユd♀ヨdィ▽\n", + /* 62*/ "ユd♀ヨdィ▽\n", + /* 63*/ "ヤ%dメユd♀ヨd∈みマ√∨\n", + /* 64*/ "マ♀∵ほト√∨\n", + /* 65*/ "テテ∩≒ぁ⇔⊇エ⇔チ√エ\n", + /* 66*/ "麾ユ£ン∵ヒ、ナ∨\n", + /* 67*/ "麾ユ£ン∵フ驕ナ∨\n", + /* 68*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "アワヨヒマ\n", + /* 72*/ "アワヨヒマ\n", + /* 73*/ "アワヨヒマ∈みマ√∨\n", + /* 74*/ "ワヨヒ艪п諤゚dハ縺クハラナ∨\n", + /* 75*/ "゚dハ縲「揩ケど純ィ驛黹∃ナ\n", + /* 76*/ "ワヨヒ艪пメハラ∵ん∝√∨\n", + /* 77*/ "蛟ノd∈ヨナ∨\n", + /* 78*/ "ユd∋÷ロヒd=ソツ∧⊂∧⊂―nテテマ∃≒÷蛟ノd∵⊆≫∩⌒蚕n", + /* 79*/ "揀ャ∵フ∵エ⇔タ⇔⊇≫≡⊂Åツ\n麾ユ£ンモぞ⊇エ\n", + /* 80*/ "モ烙ミルdメマ∪⊇死ツ\nсァ=モテメぞチムツ\n", + /* 81*/ "≡dナテテÅ=ヘミマ艢エ\nロ∵∃⊇∀みム√マ∃≫エ\n", + /* 82*/ "ヤムエセみマ≫∋オ∃⊇エ\n", + /* 83*/ "テテメ謔モ∩タ\n", + /* 84*/ "∪=セ掾モ蚕n", + /* 85*/ "テ⊇⇒÷ワ$ムÅエ\n", + /* 86*/ "ミd∈エ\n", + /* 87*/ "がÅエ\n", + /* 88*/ "ろゎロワ窶∵ヤd°dd♀ナ∨\n", + /* 89*/ "⌒⊂c⇒メぶマ♭ムd縺クロエ∨\n", + /* 90*/ "テメけマムニ≫マモ\nァ∈ぱニナ∩∃⊇ツ\npモハメョメ⊇轣マ\ndラ∈⇒ツ⇔∪⊇∨ツ\np」ばナ⇔ムニ≫∋Åツ\n", + /* 91*/ "ュチ└∃⊇∝ツ∀テ∽♭\n」ィモ♪テマ⊆≫メタ\n", + /* 92*/ "テメルマ窶艨メmトツ\n", + /* 93*/ "ユ香ケ=ホ∩∃∩ヨフd縺オ∃⊇ツ\n", + /* 94*/ "モハマモiヮワ∵メ≠ヒメ≠ヒ⊇≫ツ\npが♭⌒べ¬リチ≫∋オ∃チ⇔\nゥ∩マыニ≫∋Å=サ⊇∃ツ\n", + /* 95*/ "モ⊇モ⊇ツ\nマヤル縲°モ⊆エ⇔タ\n", + /* 96*/ "⊂∋タ潤テメルマ窶艨∵蚕n", + /* 97*/ "∃香マタ\n", + /* 98*/ "ルム瘁モべ∨√≫メ∵ヨム≒ナ⊇ツ\n", + /* 99*/ "∃マ≡エ準モ∧⊂マ死ツ\niヮワマ烙ラハ⇔∂∽⊂∩ナ≒蚕n", + /*100*/ "み∈ヒ驕フエ\n∧テ∩≒フ√∃ト⊇エ\n", + /*101*/ "ckがメ轣タ潤テテモ\nャ寉オモミ∃∋Åエエ\npツげメみだタ∈ナ≒∃⊇メ∩エ\n", + /*102*/ "がΞ⌒か∝ヌ∃⊇♭エ\nトエト∀d=d∈磨竅メ≡エ\n", + /*103*/ "ムdワ縲マ│┌マ°∨≒\n゚≧♭モアリ∃⊇エ\n", + /*104*/ "⊃⊃=ワ¬∽∋チテ∀マ∃≫♭ナキ⊂≡ツ\nヴ∵ャ寉オメ┤xマыナ⇔÷モムミマ∈\n∈ュ∋Åエ⇔テ∀∈ムツ\n", + /*105*/ "翌トiヮロワ窶∈ばぱナ∨\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lipP.c b/src/files/lang/jap-final/lipP.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/jap-final/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_f.c b/src/files/lang/jap-final/lip_str_f.c new file mode 100644 index 000000000..433df94df --- /dev/null +++ b/src/files/lang/jap-final/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - D騁ruire les archives informatiques\n\nToute information sur le crash et les 駘駑ents r馗up駻駸 d騁enue par le Secteur 51 doit 黎re effac馥 de leurs fichiers. Le terminal est gard dans une pi鐵e ferm馥 en haut du couloir principal. Installez un virus gr稍e au r馗epteur et d騁ruisez le terminal. Si le virus infecte d'autres terminaux, leur r駸eau sera corrompu.\n\n|Objectif 2: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la pr駸ence de caissons dans lesquels des 馗hantillons organiques sont maintenus de tr鑚 basses temp駻atures. Il pense que ceux-ci servent geler des corps avant de les op駻er ou de les diss駲uer. Trouvez cette zone et confirmez la mort des trois autres passagers de l'appareil.\n\n|Objectif 3: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 4: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 5: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la pr駸ence de caissons dans lesquels des 馗hantillons organiques sont maintenus de tr鑚 basses temp駻atures. Il pense que ceux-ci servent geler des corps avant de les op駻er ou de les diss駲uer. Trouvez cette zone et confirmez la mort d'au moins un des trois passagers de l'appareil.\n\n|Objectif 2: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 3: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 4: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. La mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 2: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 3: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtenir et utiliser l'uniforme de labo\n", + /* 10*/ "D騁ruire les archives informatiques\n", + /* 11*/ "Trouver les preuves de la conspiration\n", + /* 12*/ "Acc馘er au labo d'autopsie\n", + /* 13*/ "Sauver le rescap du crash\n", + /* 14*/ "Archives de recherche d騁ruites.\n", + /* 15*/ "Obtenir uniforme de labo.\n", + /* 16*/ "Laborantin: \n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme labo\n", + /* 19*/ "Uniforme labo obtenu.\n", + /* 20*/ "Acc鑚 syst鑪e contrle des portes refus.\n", + /* 21*/ "Acc鑚 syst鑪e contrle 馗lairage refus.\n", + /* 22*/ "Acc鑚 syst鑪e contrle s馗urit refus.\n", + /* 23*/ "Virus t駘馗harg dans la console.\n", + /* 24*/ "Obtenir r馗epteur.\n", + /* 25*/ "Laborantin: \n", + /* 26*/ "R馗epteur\n", + /* 27*/ "R馗epteur\n", + /* 28*/ "R馗epteur obtenu.\n", + /* 29*/ "Acc鑚 laboratoire: succ鑚.\n", + /* 30*/ "R馗epteur connect.\n", + /* 31*/ "Connexion r馗epteur coup馥.\n", + /* 32*/ "Obtenir carte medlab 2.\n", + /* 33*/ "Garde: \n", + /* 34*/ "Carte medlab 2\n", + /* 35*/ "Carte medlab 2\n", + /* 36*/ "Carte medlab 2 obtenue.\n", + /* 37*/ "Qui 黎es-vous?\n", + /* 38*/ "H! Mais c'est mes fringues!\n", + /* 39*/ "Au...au secours!\n", + /* 40*/ "Ne me tuez pas!\n", + /* 41*/ "Oh, mon Dieu! Une arme!\n", + /* 42*/ "Il y a un intrus dans le complexe.\n", + /* 43*/ "Donnez-moi mes v黎ements, sinon...!\n", + /* 44*/ "OK. Tu l'auras voulu, poulette!\n", + /* 45*/ "Donnez-moi mes fringues.\n", + /* 46*/ "Je n'ai pas beaucoup de temps!!!\n", + /* 47*/ "L'ennemi a d騁ect le costume.\n", + /* 48*/ "Virus d駛 t駘馗harg.\n", + /* 49*/ "Lancement t駘馗hargement virus.\n", + /* 50*/ "Enfin vous voil.\n", + /* 51*/ "Mais, vous n'黎es pas... ALEEEERTE!\n", + /* 52*/ "Armes interdites! Rangez votre arme.\n", + /* 53*/ "Je ne le r駱鑼erai pas: l稍hez votre arme!\n", + /* 54*/ "Bon. J'appelle la s馗urit.\n", + /* 55*/ "Tout le monde vous attendait...\n", + /* 56*/ "Personnel crucial abattu.\n", + /* 57*/ "Acc鑚 au labo d'autopsie impossible.\n", + /* 58*/ "H! Ce n'est pas Harry. C'est un intrus!\n", + /* 59*/ "Obtenir carte salle d'op駻ation.\n", + /* 60*/ "Garde: \n", + /* 61*/ "Carte salle d'op駻ation\n", + /* 62*/ "Carte salle d'op駻ation\n", + /* 63*/ "Carte salle d'op駻ation obtenue.\n", + /* 64*/ "Elvis a 騁 abattu.\n", + /* 65*/ "Sortez de l, bon Dieu!!\n", + /* 66*/ "Caisson 駘ev.\n", + /* 67*/ "Caisson abaiss.\n", + /* 68*/ "Equipement crucial d騁ruit.\n", + /* 69*/ "Obtenir scanner rayons X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner rayons X\n", + /* 72*/ "Scanner rayons X\n", + /* 73*/ "Scanner rayons X obtenu.\n", + /* 74*/ "Cible scanner accroch馥.\n", + /* 75*/ "ID cible confirm馥 - origine extraterr.\n", + /* 76*/ "Cible scanner perdue.\n", + /* 77*/ "Costume port.\n", + /* 78*/ "Les douches... Il faut convaincre quelqu'un \nde se s駱arer de son uniforme...\n", + /* 79*/ "La temp駻ature tombe... La salle de \ncryog駭isation est proche.\n", + /* 80*/ "L'air est recycl par ici... Le labo\n d'autopsie est par l.\n", + /* 81*/ "Le voil, Joanna! Faites vite!\n", + /* 82*/ "Quitter cette zone maintenant.\n", + /* 83*/ "Vous avez le droit d'黎re ici, vous?\n", + /* 84*/ "Nom de D...\n", + /* 85*/ "C'est une espionne!\n", + /* 86*/ "Pr騅enez les autres...\n", + /* 87*/ "Imposteur!\n", + /* 88*/ "Surcharge syst鑪es d'馗lairage.\n", + /* 89*/ "Entr馥 suppl駑entaire aux labos cr鳬e.\n", + /* 90*/ "Vous ne pourrez trouver un moyen d'investir \nla zone de recherche, croyez-moi. \nLa seule possibilit reste une cloison \nque j'ai rep駻馥 dans une salle apr鑚 \nl'entrept. Essayez de la faire sauter.\n", + /* 91*/ "Pas de probl鑪e. Et o sont \nles explosifs?\n", + /* 92*/ "Dans cette caisse.\n", + /* 93*/ "H h. Terrible.\n", + /* 94*/ "Au fait, l'entrept est bourr de vigiles. \nBien que ce ne soit pas votre genre, essayez \nde vous faire discr鑼e plutt que de buter \ntout le monde.\n", + /* 95*/ "Entendu. Autre chose, maestro?\n", + /* 96*/ "Cette caisse...\n", + /* 97*/ "Oui?\n", + /* 98*/ "Elle n'aime pas qu'on lui tire dessus.\n", + /* 99*/ "Parfait. Bon... On va dire que \nlui il m'駭erve...\n", + /*100*/ "Levez les mains et 馗artez-vous de \nl'extraterrestre.\n", + /*101*/ "Qu'est-ce que vous foutez ici? \nCette salle doit 黎re scell馥! \nNe connaissez-vous pas les consignes \nd'une autopsie?\n", + /*102*/ "Ne me faites pas r駱騁er, Docteur. Et \n騁eignez-moi ce laser tout de suite.\n", + /*103*/ "Le Directeur Easton en sera inform, \nmademoiselle.\n", + /*104*/ "Mais j'y compte bien, mon cher! \nJe me suis amus馥 dans sa jolie base et \nmaintenant je vole son joujou.\n", + /*105*/ "D馭enses automatiques neutralis馥s.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_g.c b/src/files/lang/jap-final/lip_str_g.c new file mode 100644 index 000000000..8f0b0ef16 --- /dev/null +++ b/src/files/lang/jap-final/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Lschen Sie die Aufzeichnungen!\n\nJegliche Informationen, welche die Area 51-Techniker aus dem Flugzeugwrack extrahieren konnten, muss aus ihren Datenbanken gelscht werden. Das Hauptterminal befindet sich in einem versperrten Raum am Ende eines der Korridore. Installieren Sie mit Hilfe des Data Uplink-Ger舩s einen Virus, zerstren Sie anschlie゚end das Terminal. Wenn der Virus in andere Terminals kopiert wird, ist mit hilfreichen Nebeneffekten zu rechnen.\n\n|2. Ziel: - Finden Sie einen Beweis fr die Verschwrung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Krper cryogenisiert, um sie in weiterer Folge fr Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|3. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|4. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|5. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 1*/ "AREA 51 - MEDI-LABORS\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Finden Sie einen Beweis fr die Verschwrung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Krper cryogenisiert, um sie in weiterer Folge fr Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|2. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|3. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|4. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|2. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|3. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Verkleiden Sie sich als Labortechniker!\n", + /* 10*/ "Vernichten Sie die Aufzeichnungen!\n", + /* 11*/ "Finden Sie den Beweis!\n", + /* 12*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 13*/ "Retten Sie den ワberlebenden!\n", + /* 14*/ "Aufzeichnungen zerstrt.\n", + /* 15*/ "Finden Sie die Laborkleidung!\n", + /* 16*/ "eines Technikers\n", + /* 17*/ "Laborkleidung\n", + /* 18*/ "Laborkleidung eines Technikers\n", + /* 19*/ "Laborkleidung aufgenommen\n", + /* 20*/ "Zugriff auf den Trffnungsmechanismus verweigert\n", + /* 21*/ "Zugriff auf die Beleuchtungskontrollen verweigert\n", + /* 22*/ "Zugriff auf das Sicherheitssystem verweigert\n", + /* 23*/ "Virus wurde installiert.\n", + /* 24*/ "Finden Sie das Data Uplink-Ger舩!\n", + /* 25*/ "des Labortechnikers\n", + /* 26*/ "Data Uplink-Ger舩\n", + /* 27*/ "Data Uplink-Ger舩\n", + /* 28*/ "Data Uplink-Ger舩 aufgenommen\n", + /* 29*/ "Zutritt zum Labor erfolgreich durchgefhrt\n", + /* 30*/ "Verbindung hergestellt\n", + /* 31*/ "Verbindung abgebrochen\n", + /* 32*/ "Erlangen Sie die Schlsselkarte fr Medlab 2.\n", + /* 33*/ "der Wache\n", + /* 34*/ "Medlab 2-Schlsselkarte\n", + /* 35*/ "Medlab 2-Schlsselkarte\n", + /* 36*/ "Medlab 2-Schlsselkarte aufgenommen\n", + /* 37*/ "Wer sind Sie?\n", + /* 38*/ "Hey - Sie haben meine Ausrstung.\n", + /* 39*/ "Hilfe! Hilfe!\n", + /* 40*/ "Nicht schie゚en!\n", + /* 41*/ "Oh nein, eine Waffe!\n", + /* 42*/ "Es befindet sich ein Eindringling im Komplex.\n", + /* 43*/ "Geben Sie mir meine Ausrstung zurck, oder...!\n", + /* 44*/ "Na gut, Sie betteln ja frmlich darum!\n", + /* 45*/ "Geben Sie mir meine Ausrstung.\n", + /* 46*/ "Ich habe nicht viel Zeit!!!\n", + /* 47*/ "Der Feind hat die Tarnung durchschaut.\n", + /* 48*/ "Der Virus wurde bereits installiert.\n", + /* 49*/ "Virusinstallation initiiert.\n", + /* 50*/ "Sie haben es bis hierher geschafft.\n", + /* 51*/ "Hey, Sie sind nicht... ALARM! ALARM!\n", + /* 52*/ "Waffen sind hier nicht erlaubt. Legen Sie Ihre Waffe ab.\n", + /* 53*/ "Ich sage es nur einmal: Legen Sie die Waffe ab!\n", + /* 54*/ "Na gut, ich rufe die Security.\n", + /* 55*/ "Alle haben nur auf Sie gewartet...\n", + /* 56*/ "Wichtige Person eliminiert.\n", + /* 57*/ "Zugang zum Autopsie-Labor kann nicht erfolgen.\n", + /* 58*/ "Hey, das ist nicht Harry. Es ist ein Eindringling.\n", + /* 59*/ "Erlangen Sie die Schlsselkarte zum OP!\n", + /* 60*/ "der Wache\n", + /* 61*/ "OP-Schlsselkarte\n", + /* 62*/ "OP-Schlsselkarte\n", + /* 63*/ "OP-Schlsselkarte aufgenommen.\n", + /* 64*/ "Elvis wurde eliminiert.\n", + /* 65*/ "Mach, dass du hier rauskommst!\n", + /* 66*/ "Abwehreinheit wurde hochgefahren.\n", + /* 67*/ "Abwehreinheit wurde heruntergefahren.\n", + /* 68*/ "Wichtige Ausrstung wurde zerstrt.\n", + /* 69*/ "Finden Sie den Rntgen-Scanner.\n", + /* 70*/ "\n", + /* 71*/ "Rntgen-Scanner\n", + /* 72*/ "Rntgen-Scanner\n", + /* 73*/ "Rntgen-Scanner aufgenommen\n", + /* 74*/ "Scanner-Ziel erfasst\n", + /* 75*/ "Ziel-ID best舩igt - extraterrestrischer Ursprung.\n", + /* 76*/ "Scanner-Erfassung unterbrochen\n", + /* 77*/ "Verkleidung wurde getragen.\n", + /* 78*/ "Die Duschen... Wenn ich jemanden berzeugen kann, \nsich von seiner Uniform zu trennen...\n", + /* 79*/ "Die Temperatur f舁lt... Du musst \nin der N臧e des Cryo-Raums sein.\n", + /* 80*/ "Die Luft riecht, als ob sie stark gefiltert worden ist.\n Das Autopsie-Labor muss nahe sein.\n", + /* 81*/ "Da ist er, Jo! Rasch, oder du kommst zu sp舩!\n", + /* 82*/ "Verlassen Sie sofort dieses Gebiet!\n", + /* 83*/ "Drfen Sie sich hier aufhalten?\n", + /* 84*/ "Was zum...\n", + /* 85*/ "Ein Spion!\n", + /* 86*/ "Warnt die anderen!\n", + /* 87*/ "Betrger!\n", + /* 88*/ "Beleuchtungssystem berladen.\n", + /* 89*/ "Alternativer Zugang zu den medizinischen Labors erschaffen\n", + /* 90*/ "Das Problem ist, dass es keine Mglichkeit gibt, \nsich in die Forschungsabteilung zu schleichen. \nAber ich habe im Raum hinter den Lagerr舫men \neine brchige Stelle an der Wand markiert. \nAn dieser Stelle kannst du Sprengkrper anbringen, \num ein Loch in die Wand zu sprengen.\n", + /* 91*/ "Klingt nicht sehr problematisch. Wo \nfinde ich die Sprengkrper?\n", + /* 92*/ "In dieser Kiste.\n", + /* 93*/ "Reizend. Wirklich reizend.\n", + /* 94*/ "Ganz nebenbei: Die Lagerr舫me sind voller \nWachen. Es mag vielleicht nicht deinem Naturell \nentsprechen, aber du solltest dich eher \nanschleichen, als alles in die Luft zu jagen.\n", + /* 95*/ "Aber klar. Hast du noch weitere Perlen der Weisheit?\n", + /* 96*/ "Diese Kiste...\n", + /* 97*/ "Ja?\n", + /* 98*/ "Sie mag es nicht, wenn man auf sie schie゚t.\n", + /* 99*/ "Gro゚artig! Wenn ich jetzt noch mein Verlangen \nunterdrcken knnte, dich zu verpfeifen...\n", + /*100*/ "H舅de hoch und weg von dem Alien!\n", + /*101*/ "Was, zum Henker, glauben Sie hier zu tun? \nDieser Raum sollte versiegelt sein! \nWissen Sie gar nichts ber den Vorgang \nder Autopsie?\n", + /*102*/ "Fordern Sie es nicht heraus, Doktor. Und \nschalten Sie diesen Laser ab!\n", + /*103*/ "Direktor Easton wird ber diesen Vorfall \ninformiert werden, junge Dame.\n", + /*104*/ "Natrlich wird er darber informiert werden, \nSie Trottel. Immerhin bin ich gerade in seine \ngeheime Basis eingedrungen und stehle das Alien.\n", + /*105*/ "Automatische Verteidigung wurde deaktiviert.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_i.c b/src/files/lang/jap-final/lip_str_i.c new file mode 100644 index 000000000..795428fe6 --- /dev/null +++ b/src/files/lang/jap-final/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Distruggi i file di ricerca nel PC\n\nLe informazioni che i tecnici dell'Area 51 sono riusciti ad ottenere dai resti del disastro devono essere eliminate dalla loro banca dati. Il terminale centrale si trova in una stanza chiusa a chiave in fondo al corridoio principale. Installa un virus tramite il Connettore Dati e poi distruggi anche il computer. Se il virus viene propagato anche agli altri terminali potrebbe avere effetti formidabili.\n\n|Obiettivo 2: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unit di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unit possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unit e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 3: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 4: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 5: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 1*/ "AREA 51 - LABORATORI MEDICI\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unit di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unit possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unit e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 2: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 3: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 4: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 2: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 3: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Procurati travestimento da tecnico\n", + /* 10*/ "Distruggi i file nel PC\n", + /* 11*/ "Trova le prove della cospirazione\n", + /* 12*/ "Entra nel laboratorio autopsie\n", + /* 13*/ "Salva il sopravvissuto al disastro\n", + /* 14*/ "Distrutti file di ricerca\n", + /* 15*/ "Procurati camice\n", + /* 16*/ "Tecnico di laboratorio:\n", + /* 17*/ "Camice\n", + /* 18*/ "Camice\n", + /* 19*/ "Preso camice\n", + /* 20*/ "Negato accesso al sistema comando porte\n", + /* 21*/ "Negato accesso al sistema comando luci\n", + /* 22*/ "Negato accesso al sistema comando sicurezza\n", + /* 23*/ "Scaricato il virus\n", + /* 24*/ "Procurati Connettore Dati.\n", + /* 25*/ "Tecnico di laboratorio:\n", + /* 26*/ "C. Dati\n", + /* 27*/ "Connettore Dati\n", + /* 28*/ "Preso Connettore Dati.\n", + /* 29*/ "Accesso laboratorio: riuscito.\n", + /* 30*/ "Connettore Dati connesso.\n", + /* 31*/ "Connessione Connettore Dati interrotta.\n", + /* 32*/ "Procurati tessera lab.2\n", + /* 33*/ "Guardia:\n", + /* 34*/ "Tessera lab.2\n", + /* 35*/ "Tessera lab.2 \n", + /* 36*/ "Presa tessera lab.2\n", + /* 37*/ "Chi diavolo sei?\n", + /* 38*/ "Ehi, hai rubato il mio camice!\n", + /* 39*/ "Aiuto, aiuto!!!\n", + /* 40*/ "Non spararmi!\n", + /* 41*/ "Oh, maledizione! Una pistola!\n", + /* 42*/ "C' un intruso nel complesso!\n", + /* 43*/ "Ridammi il camice, altrimenti...\n", + /* 44*/ "Bene, l'hai voluto tu!\n", + /* 45*/ "Ridammi indietro il camice!\n", + /* 46*/ "Non ho molto tempo!!!\n", + /* 47*/ "Il nemico ha scoperto il travestimento.\n", + /* 48*/ "Il virus gi stato scaricato.\n", + /* 49*/ "Scaricamento virus in corso...\n", + /* 50*/ "Bene, finalmente sei qui!\n", + /* 51*/ "Ehi, ma tu non sei... SICUREZZA ALL'ERTA!\n", + /* 52*/ "Non sono ammesse pistole qui: posa quell'arma!\n", + /* 53*/ "Non fartelo ripetere: posa l'arma!\n", + /* 54*/ "Benissimo, chiamer la sicurezza!\n", + /* 55*/ "Ti stavamo giusto aspettando...\n", + /* 56*/ "Ucciso personale essenziale alla missione.\n", + /* 57*/ "Non puoi accedere al laboratorio.\n", + /* 58*/ "Ehi, non Harry! ネ un intruso!!!\n", + /* 59*/ "Procurati chiave sala operatoria.\n", + /* 60*/ "Guardia:\n", + /* 61*/ "Chiave sala operatoria\n", + /* 62*/ "Chiave sala operatoria\n", + /* 63*/ "Presa chiave sala operatoria.\n", + /* 64*/ "Elvis stato ucciso.\n", + /* 65*/ "Porta il tuo muso fuori di qua!\n", + /* 66*/ "Alzata unit di contenimento.\n", + /* 67*/ "Abbassata unit di contenimento.\n", + /* 68*/ "Distrutto strumento essenziale alla missione.\n", + /* 69*/ "Procurati scanner a raggi X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner a raggi X\n", + /* 72*/ "Scanner a raggi X\n", + /* 73*/ "Preso scanner a raggi X.\n", + /* 74*/ "Localizzato obiettivo scanner\n", + /* 75*/ "Obiettivo identificato: extraterrestre\n", + /* 76*/ "Perso obiettivo scanner\n", + /* 77*/ "Indossato il travestimento\n", + /* 78*/ "Le docce... Se riuscissi a convincere \nqualcuno a cedermi il camice...\n", + /* 79*/ "La temperatura sta scendendo: devi essere \nvicino alla sala criogena.\n", + /* 80*/ "Qui c' un forte ricircolo d'aria: devi essere \nvicino al laboratorio autopsie.\n", + /* 81*/ "Eccolo, Jo! Fa presto o sar troppo tardi!\n", + /* 82*/ "Abbandona subito quest'area.\n", + /* 83*/ "Che diavolo ci fai qua?\n", + /* 84*/ "Santo...\n", + /* 85*/ "ネ una spia, dannazione!\n", + /* 86*/ "Avverti gli altri...\n", + /* 87*/ "Impostore!\n", + /* 88*/ "Sistema di illuminazione in sovraccarico\n", + /* 89*/ "Creato ingresso alternativo ai laboratori\n", + /* 90*/ "Il tuo problema che non esiste nessun \nmodo per infiltrarsi nel reparto ricerca. \nL'unica possibilit un sottile tratto \ndi muro che ho contrassegnato nella stanza \ndietro ai magazzini. Lo potrai abbattere \ncon un po' di esplosivo.\n", + /* 91*/ "Non mi pare si tratti di un problema! \nDov' l'esplosivo?\n", + /* 92*/ "In quella cassa!\n", + /* 93*/ "Fantastico... veramente!\n", + /* 94*/ "Ah, a proposito... i magazzini brulicano \ndi guardie. Magari contro la tua natura, \nma cerca di insinuarti in mezzo a loro, \npiuttosto che far saltar per aria tutto!\n", + /* 95*/ "Certamente! Altri consigli illuminanti?\n", + /* 96*/ "Quella cassa...\n", + /* 97*/ "Allora?\n", + /* 98*/ "Meglio non sparargli contro...\n", + /* 99*/ "Bravo ragazzo! Cercher di resistere \nal piacere di denunciarti alle forze \ndi sicurezza della base...\n", + /*100*/ "Mani in alto e sta lontano dall'alieno.\n", + /*101*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /*102*/ "Non se lo faccia ripetere, Dottore! \nSpenga subito quel laser!\n", + /*103*/ "Il direttor Easton lo verr \na sapere, signorina!\n", + /*104*/ "Certo che lo verr a sapere, idiota! \nSono riuscita ad entrare nella sua base \nsegretissima e ora sto anche rubando il \nsuo alieno. E non lo deve venire a \nsapere?! Fammi ridere!!!\n", + /*105*/ "Disattivate difese automatiche\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_s.c b/src/files/lang/jap-final/lip_str_s.c new file mode 100644 index 000000000..8dc2741e8 --- /dev/null +++ b/src/files/lang/jap-final/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Destruir Registros Cientficos del Ordenador\n\nCualquier informacin y objetos que los t馗nicos del チrea 51 hayan sido capaces de sacar de los restos del choque deben ser suprimidos de sus bases de datos. La terminal del banco principal est en una habitacin cerrada en el corredor principal. Instala un virus usando el Conector de Datos, y destruye la propia terminal. Si el virus es instalado en otras terminales, producir efectos beneficiosos.\n\n|Objetivo Dos: - Localizar Evidencias de Conspiracin\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras org疣icas a temperaturas extremadamente bajas. ノl cree que se pueden usar para congelar cuerpos criog駭icamente antes de la ciruga o la diseccin. Encuentra este 疵ea y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Tres: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Cuatro: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Cinco: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 1*/ "チREA 51 - LABORATORIOS MノDICOS\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Localizar Evidencias de Conspiracin\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras org疣icas a temperaturas extremadamente bajas. ノl cree que se pueden usar para congelar cuerpos criog駭icamente antes de la ciruga o la diseccin. Encuentra este 疵ea y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Dos: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Tres: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Cuatro: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Dos: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Tres: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtener y usar el disfraz de t馗nico\n", + /* 10*/ "Destruir registros del ordenador\n", + /* 11*/ "Localizar evidencias de conspiracin\n", + /* 12*/ "Acceder al laboratorio de autopsias\n", + /* 13*/ "Rescatar al Superviviente del impacto\n", + /* 14*/ "Registros cientficos destruidos.\n", + /* 15*/ "Obt駭 ropas de laboratorio.\n", + /* 16*/ "T馗nico:\n", + /* 17*/ "Ropas lab.\n", + /* 18*/ "Ropas de laboratorio\n", + /* 19*/ "Ropas de laboratorio obtenidas.\n", + /* 20*/ "Acceso al sistema de control de puertas denegado.\n", + /* 21*/ "Acceso al sistema de control de luces denegado.\n", + /* 22*/ "Acceso al sistema de control de seguridad denegado.\n", + /* 23*/ "Virus descargado en la consola.\n", + /* 24*/ "Obt駭 el Conector de Datos.\n", + /* 25*/ "T馗nico:\n", + /* 26*/ "C. Datos\n", + /* 27*/ "Conector de Datos\n", + /* 28*/ "Conector de Datos obtenido.\n", + /* 29*/ "Has accedido al laboratorio con 騙ito.\n", + /* 30*/ "Conector de Datos en marcha.\n", + /* 31*/ "Conexin perdida.\n", + /* 32*/ "Obt駭 llave magn騁ica del lab. 2.\n", + /* 33*/ "Guarda:\n", + /* 34*/ "Llave del lab. 2\n", + /* 35*/ "Llave magn騁ica del lab. 2\n", + /* 36*/ "Llave magn騁ica del lab. 2 obtenida.\n", + /* 37*/ "ソY t qui駭 eres?\n", + /* 38*/ "Hey. Tienes mis ropas.\n", + /* 39*/ "。Socorro, socorro!\n", + /* 40*/ "。No me dispares!\n", + /* 41*/ "。Oh, Dios mo, un arma!\n", + /* 42*/ "Hay un intruso en el complejo.\n", + /* 43*/ "Dame mis ropas... 。o ver疽!\n", + /* 44*/ "Vale. 。T lo has querido!\n", + /* 45*/ "Dame mis ropas.\n", + /* 46*/ "。。。No tengo mucho tiempo!!!\n", + /* 47*/ "El enemigo ha descubierto el disfraz.\n", + /* 48*/ "El virus ya ha sido descargado.\n", + /* 49*/ "Iniciando descarga del virus.\n", + /* 50*/ "As que por fin has llegado.\n", + /* 51*/ "Hey, t no eres... 。ALERTA, SEGURIDAD!\n", + /* 52*/ "No se permiten armas aqu. Deja tu arma.\n", + /* 53*/ "No te lo dir de nuevo. Tira tu arma.\n", + /* 54*/ "Vale. Estoy llamando a seguridad.\n", + /* 55*/ "Todos te est疣 esperando...\n", + /* 56*/ "Ha muerto personal crtico de la misin.\n", + /* 57*/ "No puedes acceder al laboratorio de autopsias.\n", + /* 58*/ "Hey, 駸e no es Harry. Es un intruso.\n", + /* 59*/ "Obt駭 llave magn騁ica del quirfano.\n", + /* 60*/ "Guarda:\n", + /* 61*/ "Llave del quirfano\n", + /* 62*/ "Llave magn騁ica del quirfano\n", + /* 63*/ "Llave magn騁ica del quirfano obtenida.\n", + /* 64*/ "Elvis ha muerto.\n", + /* 65*/ "。Salgamos de aqu!\n", + /* 66*/ "Contenedor subido.\n", + /* 67*/ "Contenedor bajado.\n", + /* 68*/ "Equipo crtico de la misin destruido.\n", + /* 69*/ "Obt駭 Esc疣er de Rayos-X.\n", + /* 70*/ "\n", + /* 71*/ "Esc疣er de Rayos-X\n", + /* 72*/ "Esc疣er de Rayos-X\n", + /* 73*/ "Esc疣er de Rayos-X obtenido.\n", + /* 74*/ "Sujeto de escaneo adquirido.\n", + /* 75*/ "ID. del sujeto confirmada - Origen E.T.\n", + /* 76*/ "Conexin del esc疣er perdida.\n", + /* 77*/ "El disfraz ha sido usado.\n", + /* 78*/ "Las duchas... Ahora, si pudiera convencer a alguien \npara irme con su uniforme...\n", + /* 79*/ "La temperatura est bajando... Debes de estar \ncerca de la sala de criogenizacin.\n", + /* 80*/ "El aire est fuertemente reciclado aqu: debo\n estar cerca del laboratorio de autopsias.\n", + /* 81*/ "。Ah est, Joanna! 。Deprisa o ser tarde!\n", + /* 82*/ "Salga de este 疵ea.\n", + /* 83*/ "ソDebe estar dentro?\n", + /* 84*/ "Por t...\n", + /* 85*/ "。Es una espa!\n", + /* 86*/ "Avisa a los otros...\n", + /* 87*/ "。Impostora!\n", + /* 88*/ "Sistemas de luz sobrecargados.\n", + /* 89*/ "Creada entrada alternativa a los laboratorios.\n", + /* 90*/ "El problema que tienes es que no hay ningn \nmodo de entrar en la seccin de desarrollo. \nEl nico camino disponible es una parte \nd饕il del muro que he marcado en la \nhabitacin tras los almacenes. Puede ser \ndestruida con explosivos.\n", + /* 91*/ "No me parece un problema. ソDnde\nest疣 esos explosivos?\n", + /* 92*/ "En esa caja.\n", + /* 93*/ "Bien. Muy bien.\n", + /* 94*/ "Eso s, los almacenes est疣 repletos de \nguardas. Puede ir contra tu naturaleza, \npero intenta evitarlos antes de hacer \nsaltar todo por los aires.\n", + /* 95*/ "Ciertamente. ソAlguna otra perla de sabidura?\n", + /* 96*/ "Esa caja...\n", + /* 97*/ "ソS?\n", + /* 98*/ "No le gusta que le disparen.\n", + /* 99*/ "Genial. Ahora, si slo pudiera luchar contra \nel impulso de informar de 駘 a Seguridad...\n", + /*100*/ "Levantad las manos y alejaos del\naliengena.\n", + /*101*/ "ソQu demonios te crees que est疽 haciendo? \n。Esto se supone que es una sala sellada! \nソNo sabes nada acerca de los procedimientos \nde autopsia?\n", + /*102*/ "No me haga repetrselo, doctor. Y \napague ese l疽er.\n", + /*103*/ "El Director Easton se enterar de esto, \njovencita.\n", + /*104*/ "Por supuesto que va a enterarse, idiota. \nHe logrado entrar en su base ultra-secreta, \ny ahora le estoy robando su aliengena.\n", + /*105*/ "Defensas Autom疸icas Desactivadas.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/lueE.c b/src/files/lang/jap-final/lueE.c similarity index 100% rename from src/files/lang/lueE.c rename to src/files/lang/jap-final/lueE.c diff --git a/src/files/lang/jap-final/lueJ.c b/src/files/lang/jap-final/lueJ.c new file mode 100644 index 000000000..22550fb26 --- /dev/null +++ b/src/files/lang/jap-final/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\n┨ふマテ√モゆeマ∀エ⇔く噤メпルÅ≡ツみム√マ∃≫掾マ÷マ♀∈おぁニ≫メÅツγぼδメmマモχャ∃はu∵⊆≪=ネ√モ縲マ縲ムdワ縲マメみマモト∃⊇♭⌒≒⊇∨⊇ツヵぴメハロヘマ♭モ>ウぶメワ$ムメνツ∵Η≒√≫モÅツぽモ┤xメiヮワマぬはナ⇔⊇≫∵∃ツ\n\n|しじ操セd≧dロワ窶∈」ばヌ≡\n\nテメd≧dロワ窶マ≠艪メマ♀メワ窶ワγぼモにば≒√>ァxメεクべ¥ハ縺マべ¬ぺ∀ト√∨メÅツぉメ桙气刀メφュ∈せぜニ≫∨⊥マモ=テメd≧dロワ窶メルマ縲d蛟ハ縺ク」ィ♭」ばニ≫ョャ∵⊆≫ツサ≒チ∧√モ≠フメムマルマ¢フd゚マ宦リ√∨≡⊂∃リ轣マ⊆≫モÅツ\n\n|しじ逐セρΖマユ∈ンハ縺ヌ≡\n\nモミ斧早メxフンラロヘマモ≧ュョ┸∃♪∵ンハ縺タ∃⊇≡⊂マ∃エ⇔⊇≫ツ⇒リ≪ゆeメρΖロワ窶⌒≠ァ∵xフマエ∨ンπ♭⊃∃チ∃エ⇔ナリ⊂メÅツテ√∈栫閨ノ⊥マ≠氓ぞチメ$¥ミマ窶艨マ<マΖマユ∈ンハ縺ナ⇔∪チョャ∵⊆≫ツ\n\n|しじ凍セεクべ¥ハ縺クばぱヌ≡\n\nd≧dロワ窶∈ばぱナ⇔⌒≠ヒマ⊇≫εクべ¥ハ縺ネメ⌒メ∵≠ヒ∃ヨリÅツぃい∃≪テ√∈ばぱナ⇔∪チメÅツゆe∵みナ∨ΓΔ♭モxヒマ秩ヒ⊆エ∨∵=ワ⊂ォナ⊆≫ぃい゚⌒⊆≫ツ\n\n|しじ楳セ私チハモミヨムヌ≡\n\nぁ∩≒リ∀⌒マ≫メモ羅曹レ轣ホメ♭≦私チハモミヨモモ℃d゚d∈エ⇔ムニ≫メ∵≡⊇Å∽⊂ツゆeメワ$ム∩≒メマ≡√†÷モ℃d゚d∈て∩ニマモユd♀ヨd∵ョャ♭<ロэs∩≒゚⊂テ∀∵♭タ≫∧⊂Åツ\n\n|しじ斧セ┻ぶメワ$ム∀ホ焉ヌ≡\n\nゆeメワ$ムモ┤xメiヮワマぬはナ⇔⊇≫∨⊥≠オじモミ∩≒θタチフ√≫テ∀モッィÅツナ∨∵エ⇔ぉメぶ∩≒ぽ∈に⇒ツ≫ョャ∵⊆≫ツ私チハモミモ逐ミd⊆≫∵≠ロモ∧メ⊇√∩マ⊇≫∀メテ∀Åツケ∃∵≒∧√ルヒメモ∃⊇ツ\n\nEND\n", + /* 1*/ "モミ斧操盾昧ァ", + /* 2*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\n┨ふマテ√モゆeマ∀エ⇔く噤メпルÅ≡ツみム√マ∃≫掾マ÷マ♀∈おぁニ≫メÅツγぼδメmマモχャ∃はu∵⊆≪=ネ√モ縲マ縲ムdワ縲マメみマモト∃⊇♭⌒≒⊇∨⊇ツヵぴメハロヘマ♭モ>ウぶメワ$ムメνツ∵Η≒√≫モÅツぽモ┤xメiヮワマぬはナ⇔⊇≫∵∃ツ\n\n|しじ操セd≧dロワ窶∈」ばヌ≡\n\nテメd≧dロワ窶マ≠艪メマ♀メワ窶ワγぼモにば≒√>ァxメεクべ¥ハ縺マべ¬ぺ∀ト√∨メÅツぉメ桙气刀メφュ∈せぜニ≫∨⊥マモ=テメd≧dロワ窶メルマ縲d蛟ハ縺ク」ィ♭」ばニ≫ョャ∵⊆≫ツサ≒チ∧√モ≠フメムマルマ¢フd゚マ宦リ√∨≡⊂∃リ轣マ⊆≫モÅツ\n\n|しじ逐セρΖマユ∈ンハ縺ヌ≡\n\nモミ斧早メxフンラロヘマモ≧ュョ┸∃♪∵ンハ縺タ∃⊇≡⊂マ∃エ⇔⊇≫ツ⇒リ≪ゆeメρΖロワ窶⌒≠ァ∵xフマエ∨ンπ♭⊃∃チ∃エ⇔ナリ⊂メÅツテ√∈栫閨ノ⊥マ≠氓ぞチメ$¥ミマ窶艨マ<マΖマユ∈ンハ縺ナ⇔∪チョャ∵⊆≫ツ\n\n|しじ凍セ私チハモミヨムヌ≡\n\nぁ∩≒リ∀⌒マ≫メモ羅曹レ轣ホメ♭≦私チハモミヨモモ℃d゚d∈エ⇔ムニ≫メ∵≡⊇Å∽⊂ツゆeメワ$ム∩≒メマ≡√†÷モ℃d゚d∈て∩ニマモユd♀ヨd∵ョャ♭<ロэs∩≒゚⊂テ∀∵♭タ≫∧⊂Åツ\n\n|しじ楳セ┻ぶメワ$ム∀ホ焉ヌ≡\n\nゆeメワ$ムモ┤xメiヮワマぬはナ⇔⊇≫∨⊥≠オじモミ∩≒θタチフ√≫テ∀モッィÅツナ∨∵エ⇔ぉメぶ∩≒ぽ∈に⇒ツ≫ョャ∵⊆≫ツ私チハモミモ逐ミd⊆≫∵≠ロモ∧メ⊇√∩マ⊇≫∀メテ∀Åツケ∃∵≒∧√ルヒメモ∃⊇ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\n┨ふマテ√モゆeマ∀エ⇔く噤メпルÅ≡ツみム√マ∃≫掾マ÷マ♀∈おぁニ≫メÅツγぼδメmマモχャ∃はu∵⊆≪=ネ√モ縲マ縲ムdワ縲マメみマモト∃⊇♭⌒≒⊇∨⊇ツヵぴメハロヘマ♭モ>ウぶメワ$ムメνツ∵Η≒√≫モÅツぽモ┤xメiヮワマぬはナ⇔⊇≫∵∃ツ\n\n|しじ操セd≧dロワ窶∈」ばヌ≡\n\nテメd≧dロワ窶マ≠艪メマ♀メワ窶ワγぼモにば≒√>ァxメεクべ¥ハ縺マべ¬ぺ∀ト√∨メÅツぉメ桙气刀メφュ∈せぜニ≫∨⊥マモ=テメd≧dロワ窶メルマ縲d蛟ハ縺ク」ィ♭」ばニ≫ョャ∵⊆≫ツサ≒チ∧√モ≠フメムマルマ¢フd゚マ宦リ√∨≡⊂∃リ轣マ⊆≫モÅツ\n\n|しじ逐セ私チハモミヨムヌ≡\n\nぁ∩≒リ∀⌒マ≫メモ羅曹レ轣ホメ♭≦私チハモミヨモモ℃d゚d∈エ⇔ムニ≫メ∵≡⊇Å∽⊂ツゆeメワ$ム∩≒メマ≡√†÷モ℃d゚d∈て∩ニマモユd♀ヨd∵ョャ♭<ロэs∩≒゚⊂テ∀∵♭タ≫∧⊂Åツ\n\n|しじ凍セ┻ぶメワ$ム∀ホ焉ヌ≡\n\nゆeメワ$ムモ┤xメiヮワマぬはナ⇔⊇≫∨⊥≠オじモミ∩≒θタチフ√≫テ∀モッィÅツナ∨∵エ⇔ぉメぶ∩≒ぽ∈に⇒ツ≫ョャ∵⊆≫ツ私チハモミモ逐ミd⊆≫∵≠ロモ∧メ⊇√∩マ⊇≫∀メテ∀Åツケ∃∵≒∧√ルヒメモ∃⊇ツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "d≧dロワ窶∈」ばヌ≡\n", + /* 10*/ "ρΖマユ∈ンハ縺ヌ≡\n", + /* 11*/ "εクべ¥ハ縺クばぱヌ≡\n", + /* 12*/ "私チハモミヨムヌ≡\n", + /* 13*/ "┻ぶメワ$ム∀ホ焉ヌ≡\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "み≪カ⊂、\n", + /* 17*/ "み≪カ⊂、\n", + /* 18*/ "み≪カ⊂、∈みマ√∨\n", + /* 19*/ "εクべ¥ハ縺クばぱナ∨\n", + /* 20*/ "ュ⇔メεクべ¥ハ縺クばぱナ∨\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "ρΖマユ\n", + /* 24*/ "ρΖマユ\n", + /* 25*/ "ρΖマユ∈みマ√∨\n", + /* 26*/ "ρΖマユ∵ナチンハ縺ト√∨\n", + /* 27*/ "ρΖマユ∵ナチンハ縺ト√⇔⊇リヌ∋\n", + /* 28*/ "ミマ窶艨謔ホぱト√∨\n", + /* 29*/ "ミマ窶艨諛ヒ、ナ∨\n", + /* 30*/ "ミマ窶艨諛フ驕ナ∨\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "ユd♀ヨd\n", + /* 34*/ "ユd♀ヨd\n", + /* 35*/ "モ℃d゚dメユd♀ヨd∈みマ√∨\n", + /* 36*/ "モ℃d゚dヨメミランワレロセ\nユd♀ヨd∵ョャ\n", + /* 37*/ "ユd♀ヨdど閠ィ、セモ℃d゚dロてラリ\n", + /* 38*/ "モ℃d゚d窿ぃい\n", + /* 39*/ "私チハモミヨムナ∨\n", + /* 40*/ "┻ぶメワ$ム∀ホ焉ナ∨\n", + /* 41*/ "d≧dロワ窶∵」ばト√∨\n", + /* 42*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 43*/ "ムマd縺諢ラ⊇∨\n", + /* 44*/ "ムマd縺諷吹ト√∨\n", + /* 45*/ "ミランワ∵レロト√∨\n", + /* 46*/ "」ィ∵ンハ縺ト√∨\n", + /* 47*/ "ムなに準ンヨフ窶ニロワ窶ロて\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "」ィ\n", + /* 51*/ "」ィ\n", + /* 52*/ "」ィ∈みマ√∨\n", + /* 53*/ "d≧dロワ窶メルマ縲dモ\n∧メxフ=ソナ≒ツ\n", + /* 54*/ "⊆√∵ミマ窶艨ムツ♭⌒=コ∋∃マ゙⊇∀\nー驕フ⌒ワ∩∃⊇∝蚕n", + /* 55*/ "私チハモミヨメモ℃d゚dモ\nテメムマd縺メユテ⊂ムツ\n", + /* 56*/ "モd≠ネマ縲≧dラ=テ¬≒≠ヘ艢レマÅツ\nヤモiヮワメ紙ア♭ぞチマ⊇≫∩≒\nべ⇒∃≡エ\n", + /* 57*/ "モ℃d゚dメルマ縲dはu∵ばぱト√∨\n", + /* 58*/ "≠ヘミマ艢ツテメΓΔモモミ斧早マ\nыナ∨ゆeメワ$ム∵みtナ∨⌒メÅツ\n", + /* 59*/ "テテ∵ぉメム#ムマ縺ツ┤xメミメ\n⊆リ≪∝√⇔⊇∃⊇#d縺ツ\n", + /* 60*/ "テメァ∈ηばニ≫メÅツ\nナ∩ナwワマモΨ∈⇒ツ∽ツ\n", + /* 61*/ "テメ$¥ミマ窶艨觸n┤xメムマρΖヮ♭⊆≫ツ\npチ√∬√⌒wワマモΨ∈⇒ツ∽ツ\n", + /* 62*/ "がタ潤テ√死エ\n", + /* 63*/ "テ√∵氏メマ♀Åツ\nΧイ∈んエ⇔⊇≫≡⊂Åツ\np瘁焉モcρ≪メ窶ワ縺クウ⊃\nニ∬マf栫クリ⊥≫≡⊂Åツ\n", + /* 64*/ "♭⌒=ホ死タ\n", + /* 65*/ "レ└モタ純シナ∩=゚∽ナ⊇ツ\n♭モ<香サ♭チ√∨リ⊃ツ\n", + /* 66*/ "操逗逐ハロヘマ腐摩ツ\nモミ斧早マムラリツ\n", + /* 67*/ "モd≠ネマ縲≧dラ=テエ¬Åエ\n", + /* 68*/ "⊆∃∨∵≠ヘ艢レマタ\nヴモ⇔エタ≪蚕n", + /* 69*/ "⇔エタ≪♪⊂ナ∨エ⇔タ\n", + /* 70*/ "⊆∃∨メkモ°∨∋Å∀━エ⇔⊇∨∝ツ\nテ∋∃∂≪ぶ♭=゚チΚタ⇔テ√∨∝ムツ\n", + /* 71*/ "ぉメ¢マ焉クおエ⇔∂エ∨∋Åエ\n", + /* 72*/ "ヴメ¢マ烙タ\n", + /* 73*/ "∧⊂∩≠ァモテ⊇⇒マべ∨√∨∩エ∨メ∩蚕n∃∋∃≒┤xメiヮワ∈⌒エ∀ユ⊂∩タ\n", + /* 74*/ "∝∩エ∨∝ツ⌒⊂≡ナリナキツ\nシпホ焉タ∨テ∀∈繞怐ニ≫∝ツ\n", + /* 75*/ "オせどメΣk∵ツナト√∨遵氓唐奄梶ヌ≡\n", +}; diff --git a/src/files/lang/jap-final/lueP.c b/src/files/lang/jap-final/lueP.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/jap-final/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/jap-final/lue_str_f.c b/src/files/lang/jap-final/lue_str_f.c new file mode 100644 index 000000000..55cdb911a --- /dev/null +++ b/src/files/lang/jap-final/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Installer D駻oute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont prot馮馥s par des mouchards, ce qui neutralisera notre connexion d鑚 que vous entrerez dans la base. Pour y rem馘ier, placez un D駻oute-Comms sur l'antenne satellite pr鑚 de l'entr馥.\n\n|Objectif 3: - D駸activer robots Interceptors\n\nUne fois le radar coup, les robots Interceptors vous poseront un probl鑪e. D騁ruisez un maximum d'unit駸 au sol. Notre derni鑽e photo satellite en r騅鑞e deux mais il risque d'y en avoir plus.\n\n|Objectif 4: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 5: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Installer D駻oute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont prot馮馥s par des mouchards, ce qui neutralisera notre connexion d鑚 que vous entrerez dans la base. Pour y rem馘ier, placez un D駻oute-Comms sur l'antenne satellite pr鑚 de l'entr馥.\n\n|Objectif 3: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 4: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 3: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Couper le radar d'interception\n", + /* 10*/ "Installer D駻oute-Comms sur antenne\n", + /* 11*/ "D駸activer robots Interceptors\n", + /* 12*/ "Acc馘er l'ascenseur du hangar\n", + /* 13*/ "Contacter l'espion de l'IC\n", + /* 14*/ "Obtenir grenades.\n", + /* 15*/ "Dr. Caroll: \n", + /* 16*/ "Grenade\n", + /* 17*/ "Une grenade\n", + /* 18*/ "Grenade obtenue.\n", + /* 19*/ "Robot Interceptor d駸activ.\n", + /* 20*/ "Tous robots Interceptors d駸activ駸.\n", + /* 21*/ "Obtenir D駻oute-Comms.\n", + /* 22*/ "Dr. Caroll: \n", + /* 23*/ "D駻oute-Comms\n", + /* 24*/ "D駻oute-Comms\n", + /* 25*/ "D駻oute-Comms obtenu.\n", + /* 26*/ "Mouchard de communication plac correctement.\n", + /* 27*/ "Mouchard de communication mal plac.\n", + /* 28*/ "Antenne d騁ruite.\n", + /* 29*/ "Antenne lev馥.\n", + /* 30*/ "Antenne baiss馥.\n", + /* 31*/ "Obtenir carte d'ascenseur.\n", + /* 32*/ "Dr. Caroll: \n", + /* 33*/ "Carte d'ascenseur\n", + /* 34*/ "Carte d'ascenseur\n", + /* 35*/ "Carte d'ascenseur obtenue.\n", + /* 36*/ "Acc鑚 ascenseur refus - carte requise.\n", + /* 37*/ "Carte accept馥 - ascenseur op駻ationnel.\n", + /* 38*/ "Ascenseur op駻ationnel.\n", + /* 39*/ "Hangar p駭騁r.\n", + /* 40*/ "Agent de l'IC contact.\n", + /* 41*/ "Radar d'interception coup.\n", + /* 42*/ "Objet crucial d騁ruit.\n", + /* 43*/ "Porte principale ouverte.\n", + /* 44*/ "Porte principale ferm馥.\n", + /* 45*/ "Acc鑚 refus.\n", + /* 46*/ "Explosif plac.\n", + /* 47*/ "Intrus d騁ect - syst鑪es s馗urit branch駸.\n", + /* 48*/ "Obtenir explosif.\n", + /* 49*/ "Dr. Caroll: \n", + /* 50*/ "Explosifs\n", + /* 51*/ "Explosifs\n", + /* 52*/ "Explosifs obtenus.\n", + /* 53*/ "Le radar d'interception est contrl depuis \nce bunker.\n", + /* 54*/ "Voil l'antenne, mais... Je ne peux pas lancer \nun mouchard si haut!\n", + /* 55*/ "L'ascenseur du hangar est derri鑽e \ncette grande porte.\n", + /* 56*/ "Attention ne pas descendre n'importe qui, Agent Dark - \nvous vous approchez de ma position.\n", + /* 57*/ "Terminaux d'acc鑚 ascenseur d騁ruits.\n", + /* 58*/ "Regardez Joanna: notre agent infiltr \ndans le Secteur 51 a pu nous faire \nparvenir ceci.\n", + /* 59*/ "C'est votre point d'entr馥: un h駘iport \nabandonn en bordure de la base.\n", + /* 60*/ "L'ascenseur vers les hangars et le \npoint de rendez-vous est derri鑽e ce \nmur. Attention aux gardes.\n", + /* 61*/ "Voici l'antenne de communication. Fixez \nun D駻oute-Comms et nous pourrons vous \nparler dans la base. Encore une fois, \nfaites attention la s馗urit.\n", + /* 62*/ "Oh, mon Dieu!\n", + /* 63*/ "Voici notre ami. Il ne semble pas bless \nbien qu'il n'ait pas encore repris ses \nesprits. De toute 騅idence, les chirurgiens \nont presque achev leurs pr駱arations \net vont bientt entamer la dissection.\n", + /* 64*/ "Mais qui est...?\n", + /* 65*/ "Des questions? Non? Bon. En route \nvers le hangar.\n", + /* 66*/ "Agent Dark, Journal de mission, H: 10:28. \nJe suis sur le point d'acc馘er au \nSecteur 51.\n", + /* 67*/ "Agent Dark! Par ici!\n", + /* 68*/ "Vous voil, vous! Je pensais \nque...\n", + /* 69*/ "Que quoi?\n", + /* 70*/ "Que vous 騁iez mort. Vous devez \navoir une bonne 騁oile pour 黎re \nencore en vie.\n", + /* 71*/ "Je m'occupais de votre boulot mal fait.\n", + /* 72*/ "Mal quoi?\n", + /* 73*/ "Vous vouliez peut-黎re que ce garde vous \ndescende? Tr鑚 bien. Je peux en appeler un \nautre si vous voulez...\n", + /* 74*/ "Bon, bon. Laissez tomber. Je pr騅iens \nl'Institut de notre rencontre.\n", + /* 75*/ "Objet 騁ranger d騁ect - s馗urit alert馥.\n", +}; diff --git a/src/files/lang/jap-final/lue_str_g.c b/src/files/lang/jap-final/lue_str_g.c new file mode 100644 index 000000000..9bf3c166c --- /dev/null +++ b/src/files/lang/jap-final/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhrmechanismen geschtzt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, mssen Sie einen Antennenzugang an der Satellitenschssel installieren.\n\n|3. Ziel: - Setzen Sie die Abfang-Roboter au゚er Kraft!\n\nAuch wenn das Radar deaktiviert ist, stellen die Abfang-Roboter eine ernsthafte Gefahr dar. Besch臈igen Sie so viele Einheiten, wie mglich. Unser letztes Satellitenphoto zeigt zwei Maschinen, aber es knnen sich noch weitere Roboter am Gel舅de befinden.\n\n|4. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|5. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 1*/ "AREA 51 - UMGEBUNG\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhrmechanismen geschtzt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, mssen Sie einen Antennenzugang an der Satellitenschssel installieren.\n\n|3. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|4. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|3. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Schalten Sie die Radar-Funktion ab!\n", + /* 10*/ "Installieren Sie den Antennen-Zugang!\n", + /* 11*/ "Setzen Sie die Roboter au゚er Kraft!\n", + /* 12*/ "Betreten Sie den Hangar-Aufzug!\n", + /* 13*/ "Kontaktieren Sie unseren Agenten!\n", + /* 14*/ "Erlangen Sie die Granaten!\n", + /* 15*/ "Dr. Carolls\n", + /* 16*/ "Granate\n", + /* 17*/ "Eine Granate\n", + /* 18*/ "Granate aufgenommen\n", + /* 19*/ "Abfang-Roboter au゚er Kraft gesetzt\n", + /* 20*/ "Alle Abfang-Roboter wurden au゚er Kraft gesetzt.\n", + /* 21*/ "Erlangen Sie den Antennenzugang.\n", + /* 22*/ "Dr. Carolls\n", + /* 23*/ "Antennenzugang\n", + /* 24*/ "Antennenzugang\n", + /* 25*/ "Antennenzugang aufgenommen\n", + /* 26*/ "Antennenzugang wurde korrekt platziert.\n", + /* 27*/ "Antennenzugang wurde nicht korrekt platziert.\n", + /* 28*/ "Antenne wurde zerstrt.\n", + /* 29*/ "Antenne wurde hochgefahren.\n", + /* 30*/ "Antenne wurde heruntergefahren.\n", + /* 31*/ "Finden Sie die Schlsselkarte fr den Aufzug!\n", + /* 32*/ "Dr. Carolls\n", + /* 33*/ "Schlsselkarte\n", + /* 34*/ "Schlsselkarte\n", + /* 35*/ "Schlsselkarte aufgenommen\n", + /* 36*/ "Zutritt zum Aufzug verweigert - Schlsselkarte wird bentigt.\n", + /* 37*/ "Schlsselkarte akzeptiert - Aufzug ist einsatzbereit.\n", + /* 38*/ "Der Aufzug ist einsatzbereit.\n", + /* 39*/ "Hangar wurde betreten.\n", + /* 40*/ "Agent wurde kontaktiert.\n", + /* 41*/ "Radar-Funktion wurde abgeschaltet.\n", + /* 42*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 43*/ "Haupttor wurde geffnet.\n", + /* 44*/ "Haupttor wurde geschlossen.\n", + /* 45*/ "Zugriff verweigert\n", + /* 46*/ "Sprengkrper wurde platziert.\n", + /* 47*/ "Eindringling - ワberwachungssystem online\n", + /* 48*/ "Erlangen Sie die Sprengs舩ze!\n", + /* 49*/ "Dr. Carolls\n", + /* 50*/ "Sprengs舩ze\n", + /* 51*/ "Sprengs舩ze\n", + /* 52*/ "Sprengs舩ze aufgenommen\n", + /* 53*/ "Die Radar-Funktion wird von diesem Bunker aus \ngesteuert.\n", + /* 54*/ "Da ist die Antenne, aber... Ich kann den ワberbrcker \nnicht so hoch hinaufwerfen.\n", + /* 55*/ "Der Aufzug ist auf der anderen Seite \ndieses Tores.\n", + /* 56*/ "Hoffe, du hast keinen nervsen Zeigefinger, Agent Dark - \nDu n臧erst dich meiner Position.\n", + /* 57*/ "Zugang zu den Terminals wurde zerstrt.\n", + /* 58*/ "Okay, Joanna, sehen Sie sich das an. Unser \nMann in der Basis konnte uns diese Information \nzuspielen.\n", + /* 59*/ "Hier gelangen Sie ins Innere; ein verlassenes Helipad \nam Rande der Basis.\n", + /* 60*/ "Der Aufzug zu den Hangars und der \nTreffpunkt befinden sich hinter dieser Mauer. \nAchten Sie auf die Wachen!\n", + /* 61*/ "Da ist die Kommunikationsantenne. \nInstallieren Sie den Antennenzugang, damit wir \nmit Ihnen kommunizieren knnen. Nochmals: \nAchten Sie auf Feindbewegungen!\n", + /* 62*/ "Oh nein!\n", + /* 63*/ "Da ist unser Freund. Es scheint, als w舐e er \nunversehrt, obwohl er bis jetzt noch nicht \nwieder bei Bewusstsein ist. Sieht so aus, als \nh舩ten die Chirurgen die ersten Tests bereits \nabgeschlossen. Wahrscheinlich beginnen sie gleich \nmit der Sektion.\n", + /* 64*/ "Aber wer war...?\n", + /* 65*/ "Noch Fragen? Nein? Gut. Machen Sie sich auf \nden Weg zum Hangar.\n", + /* 66*/ "Agent Dark Missions-Logbuch, 10.28 Uhr. Entgegen \nmeiner inneren Stimme betrete ich nun die \nArea 51.\n", + /* 67*/ "Agent Dark! Hier drben!\n", + /* 68*/ "Da bist du ja! Ich habe mich schon gefragt, \nob...\n", + /* 69*/ "Ob was?\n", + /* 70*/ "Ob du entdeckt worden bist. Ehrlich gesagt: \nWenn das deine Art ist zu arbeiten, dann wundert \nes mich, dass du bis jetzt berlebt hast.\n", + /* 71*/ "Ich musste ja die Lcher in deiner Abwehr stopfen.\n", + /* 72*/ "Die Lcher in meiner Abwehr?\n", + /* 73*/ "Verzeihung, ich wusste nicht, dass du es bevorzugen \nwrdest, wenn er auf dich geschossen h舩te. Aber wenn \ndu mchtest, kann ich ein paar Wachen rufen.\n", + /* 74*/ "Okay, okay, vergiss es. Ich lasse das Institut wissen, \ndass wir uns gefunden haben.\n", + /* 75*/ "Fremdkrper erfasst - Security wurde alarmiert.\n", +}; diff --git a/src/files/lang/jap-final/lue_str_i.c b/src/files/lang/jap-final/lue_str_i.c new file mode 100644 index 000000000..f54152979 --- /dev/null +++ b/src/files/lang/jap-final/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Disattiva gli intercettatori di terra\n\nSebbene il radar d'intercettazione aerea sia disattivato, gli intercettatori di terra continueranno ad essere un problema. Eliminane quanti pi possibile: la nostra ultima foto satellitare ne mostrava due a terra, ma potrebbero essercene anche altri.\n\n|Obiettivo 4: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 5: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 1*/ "AREA 51 - ESTERNO\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 4: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 3: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Disattiva radar d'intercettazione aerea\n", + /* 10*/ "Piazza una cimice sull'antenna\n", + /* 11*/ "Disattiva gli intercettatori di terra\n", + /* 12*/ "Penetra nell'ascensore dell'hangar\n", + /* 13*/ "Mettiti in contatto con l'agente segreto\n", + /* 14*/ "Procurati granate.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granata\n", + /* 17*/ "Granata\n", + /* 18*/ "Presa una granata.\n", + /* 19*/ "Disattivato l'intercettatore\n", + /* 20*/ "Disattivati tutti gli intercettatori\n", + /* 21*/ "Procurati cimice\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Cimice\n", + /* 24*/ "Cimice\n", + /* 25*/ "Presa cimice\n", + /* 26*/ "Cimice piazzata correttamente\n", + /* 27*/ "Cimice in posizione errata\n", + /* 28*/ "L'antenna stata distrutta.\n", + /* 29*/ "Alzata l'antenna\n", + /* 30*/ "Abbassata l'antenna\n", + /* 31*/ "Procurati tessera ascensore\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Tessera ascensore\n", + /* 34*/ "Tessera ascensore\n", + /* 35*/ "Presa tessera ascensore\n", + /* 36*/ "Negato accesso ascensore - Serve tessera\n", + /* 37*/ "Tessera valida - Ascensore in funzione\n", + /* 38*/ "L'ascensore in funzione.\n", + /* 39*/ "Raggiunto l'hangar\n", + /* 40*/ "Incontrato l'agente segreto\n", + /* 41*/ "Disattivato radar d'intercettazione aerea\n", + /* 42*/ "Distrutto strumento essenziale alla missione\n", + /* 43*/ "Aperto cancello principale\n", + /* 44*/ "Chiuso cancello principale\n", + /* 45*/ "Accesso negato\n", + /* 46*/ "Piazzato esplosivo\n", + /* 47*/ "Allarme intrusione - Sistema di sicurezza operativo\n", + /* 48*/ "Procurati esplosivo\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Esplosivo\n", + /* 51*/ "Esplosivo\n", + /* 52*/ "Preso esplosivo\n", + /* 53*/ "Il radar d'intercettazione aerea \ncomandato da quel bunker!\n", + /* 54*/ "Ecco l'antenna, ma... non posso mica lanciare \nuna cimice fin lass!\n", + /* 55*/ "L'ascensore dell'hangar oltre \nquel portone.\n", + /* 56*/ "Vacci piano con quel grilletto, Agente Dark: \nti stai avvicinando alla mia postazione.\n", + /* 57*/ "Distrutti i terminali di accesso all'ascensore\n", + /* 58*/ "Bene, Joanna, guarda qua! Il nostro \nagente nell'Area 51 riuscito a \nprocurarci questo!\n", + /* 59*/ "Questo il tuo punto d'ingresso: un \neliporto deserto ai margini della base.\n", + /* 60*/ "L'ascensore per gli hangar e il punto \nd'incontro sono oltre quel muro: \nattenzione a queste guardie!\n", + /* 61*/ "Qui c' un'antenna di comunicazione: \nattaccaci una cimice in modo che possiamo \nrimanere in contatto mentre sei dentro la \nbase. Ripeto, attenta alle guardie!\n", + /* 62*/ "Oh, maledizione!\n", + /* 63*/ "Ecco il nostro amico: sembra illeso \nfisicamente, sebbene non abbia ancora \nripreso conoscenza. A prima vista \nsembra che i chirurghi abbiano finito \ni loro esami preliminari e che stiano \nper iniziare il sezionamento.\n", + /* 64*/ "Ma chi era...\n", + /* 65*/ "Qualche domanda? No! Benissimo. Forza! \nVa nell'hangar!\n", + /* 66*/ "Missione dell'Agente Dark, ore 10.28. \nAnche se stento a crederci sto per \nentrare nell'Area 51.\n", + /* 67*/ "Agente Dark! Da questa parte!\n", + /* 68*/ "Eccoti, finalmente! Stavo iniziando \na chiedermi se...\n", + /* 69*/ "Se cosa?!\n", + /* 70*/ "Se magari non t'eri gi fatto scoprire! \nE francamente se questo il modo in cui \nlavori, sono sorpresa che tu abbia \nresistito per pi di cinque minuti!\n", + /* 71*/ "Stavo solo cercando di coprirti le spalle!\n", + /* 72*/ "Le MIE spalle?\n", + /* 73*/ "Scusa, non m'ero accorto che volevi \nche ti sparasse. Posso chiamare \nqualche altra guardia se vuoi!\n", + /* 74*/ "Va bene, va bene. Lascia perdere! \nComunicher all'istituto che ci \nsiamo incontrati.\n", + /* 75*/ "Rilevato oggetto strano - Sicurezza allertata\n", +}; diff --git a/src/files/lang/jap-final/lue_str_s.c b/src/files/lang/jap-final/lue_str_s.c new file mode 100644 index 000000000..a9fe8e183 --- /dev/null +++ b/src/files/lang/jap-final/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterr疣eas del チrea 51 est疣 protegidas de dispositivos de escucha, lo que significa que nuestra conexin se romper tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parablica cercana a la entrada.\n\n|Objetivo Tres: - Desactivar Robots Interceptores en tierra\n\nIncluso con el radar interceptor a駻eo apagado, los propios robots interceptores ser疣 un problema. Destruye tantas unidades en tierra como sea posible; nuestra ltima foto de sat駘ite muestra dos en tierra, pero quiz haya m疽.\n\n|Objetivo Cuatro: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 1*/ "チREA 51 - EXTERIOR\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterr疣eas del チrea 51 est疣 protegidas de dispositivos de escucha, lo que significa que nuestra conexin se romper tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parablica cercana a la entrada.\n\n|Objetivo Tres: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cuatro: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Tres: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Apagar el radar interceptor a駻eo\n", + /* 10*/ "Colocar disp. de com. en antena\n", + /* 11*/ "Desac. todos los robots interceptores\n", + /* 12*/ "Acceder al ascensor del hangar\n", + /* 13*/ "Contactar con el espa del IC\n", + /* 14*/ "Obt駭 granadas.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granada\n", + /* 17*/ "Una granada\n", + /* 18*/ "Granada obtenida.\n", + /* 19*/ "Robot interceptor desactivado.\n", + /* 20*/ "Todos los robots interceptores est疣 desactivados.\n", + /* 21*/ "Obt駭 controlador de comunicaciones.\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Control com.\n", + /* 24*/ "Controlador de comunicaciones\n", + /* 25*/ "Controlador de comunicaciones obtenido.\n", + /* 26*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 27*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 28*/ "La antena ha sido destruida.\n", + /* 29*/ "Antena elevada.\n", + /* 30*/ "Antena bajada.\n", + /* 31*/ "Obt駭 llave magn騁ica del ascensor.\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Llave del ascensor\n", + /* 34*/ "Llave magn騁ica del ascensor\n", + /* 35*/ "Llave magn騁ica del ascensor obtenida\n", + /* 36*/ "Acceso al ascensor denegado - llave magn騁ica requerida.\n", + /* 37*/ "Llave magn騁ica aceptada - ascensor operativo.\n", + /* 38*/ "El ascensor est completamente operativo.\n", + /* 39*/ "Has accedido al hangar.\n", + /* 40*/ "Has encontrado al agente del IC.\n", + /* 41*/ "Radar interceptor a駻eo apagado.\n", + /* 42*/ "Objeto crtico de la misin destruido.\n", + /* 43*/ "La puerta principal ha sido abierta.\n", + /* 44*/ "La puerta principal ha sido cerrada.\n", + /* 45*/ "Acceso denegado.\n", + /* 46*/ "El explosivo ha sido colocado.\n", + /* 47*/ "Intruso detectado - sistema de seguridad activo.\n", + /* 48*/ "Obt駭 explosivos.\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Explosivos\n", + /* 51*/ "Explosivos\n", + /* 52*/ "Explosivos obtenidos.\n", + /* 53*/ "El radar interceptor a駻eo es controlado desde \nese bnker.\n", + /* 54*/ "Ah est la antena, pero... 。no puedo lanzar un \n'bicho' a esa altura!\n", + /* 55*/ "El ascensor del hangar est al otro lado \nde esa gran puerta.\n", + /* 56*/ "Cuidado con el dedo en el gatillo, Agente Dark. Te est疽 acercando a mi posicin.\n", + /* 57*/ "Terminales de acceso del ascensor destruidos.\n", + /* 58*/ "Vale, Joanna, echa un vistazo a esto. \nNuestro agente en el チrea 51 fue capaz \nde sacar esto para nosotros.\n", + /* 59*/ "ノste es tu punto de entrada. Un helipuerto \ndesierto en el borde de la base.\n", + /* 60*/ "El ascensor que baja a los hangares y el \npunto de encuentro est疣 detr疽 de ese \nmuro... Cuidado con esos guardas.\n", + /* 61*/ "Aqu est la antena de comunicaciones. \nColoca un 'bicho' para que podamos contactar \ncuando est駸 dentro de la base. De nuevo, \ncuidado con el personal hostil.\n", + /* 62*/ "。Oh, Dios mo!\n", + /* 63*/ "Aqu est nuestro amigo. Parece que no \nest fsicamente daado, aunque no ha \nrecuperado la consciencia todava. Por lo \nque parece, los cirujanos casi han hecho \nsus pruebas preliminares y comenzar疣 \npronto con la diseccin.\n", + /* 64*/ "ソPero qu es...?\n", + /* 65*/ "ソAlguna pregunta? No. Bien. Despu駸 \nir疽 al hangar.\n", + /* 66*/ "Informe de Misin del Agente Dark, 10:28 horas. \nContra mi mejor juicio, estoy a punto de \nentrar en el チrea 51.\n", + /* 67*/ "。Agente Dark! 。Aqu!\n", + /* 68*/ "。Aqu est疽! Estaba empezando a \npreguntarme si...\n", + /* 69*/ "ソSi qu?\n", + /* 70*/ "Si habas sido descubierto ya. Y francamente, \nsi as es como trabajas, estoy asombrada de \nque hayas sobrevivido m疽 de cinco minutos.\n", + /* 71*/ "Estaba atando uno de tus cabos sueltos.\n", + /* 72*/ "ソMis cabos sueltos?\n", + /* 73*/ "Lo siento, no pensaba que quisieras que 駘 \nte disparara. Puedo llamar a m疽 guardas \nsi t quieres...\n", + /* 74*/ "Vale, vale, olvdalo. Voy a hacer saber al \nInstituto que hemos contactado.\n", + /* 75*/ "Objeto extrao detectado - seguridad alertada.\n", +}; diff --git a/src/files/lang/jap-final/miscE.c b/src/files/lang/jap-final/miscE.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/jap-final/miscE.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/miscJ.c b/src/files/lang/jap-final/miscJ.c new file mode 100644 index 000000000..057e1d7a4 --- /dev/null +++ b/src/files/lang/jap-final/miscJ.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "モd\n", + /* 1*/ "ハロヘマモ⊆≪リヌ∋\n", + /* 2*/ "\n", + /* 3*/ "しじ ", + /* 4*/ " \n", + /* 5*/ " オ\n", + /* 6*/ " ん\n", + /* 7*/ "⊆∀巣禄n", + /* 8*/ "だぼあい盾オじ∈ヌ竅ナ⇔チÅト⊇\n", + /* 9*/ "∂⊆ツ\n", + /* 10*/ "がÅ=ネメもモタ\n", + /* 11*/ "も∈テエ¬マユツ≫∋オ∃⊇エ\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "ル┳", + /* 22*/ "", + /* 23*/ "Μ", + /* 24*/ "コ", + /* 25*/ "め", + /* 26*/ "", + /* 27*/ "ル┳゚ム£", + /* 28*/ "゚ム£", + /* 29*/ "Μ゚ム£", + /* 30*/ "コ゚ム£", + /* 31*/ "め゚ム£", + /* 32*/ "園゚ム£", + /* 33*/ "カ゚ム£", + /* 34*/ "梟キ゚ム£", + /* 35*/ "」な゚ム£", + /* 36*/ "窶゚ム£", + /* 37*/ "ヤみ゚ム£", + /* 38*/ "噬゚ム£", + /* 39*/ "ク゚ム£", + /* 40*/ "ι゚ム£", + /* 41*/ "ケ゚ム£", + /* 42*/ "゙゚ム£", + /* 43*/ "怩゚ム£", + /* 44*/ "黷ラ゚ム£", + /* 45*/ "ル┳゚ム£セュロフマ縺メm♭く⌒⊇メ♭=劇艪пマく斧ツ━ミ℃モクケマ噤チ≦キべいb⌒クケマ噤サツ\n", + /* 46*/ "゚ム£セ┤┨τ∃ミラロヘマス━ミ℃ナ∩ぷ∨∃⊇∵<刀マみコ⊇ツ\n", + /* 47*/ "Μ゚ム£セΜメ┳£ムd∀チ≒⊇メрツ\n", + /* 48*/ "コ゚ム£セヒpメ┳£ムd∀チ≒⊇メрツ\n", + /* 49*/ "め゚ム£セ宦メwツく⌒ミラロヘマス━ミ℃∵゙⊇ロフマ縲ツ℃ミハ£ナ∨£ムdモ=サ√テメロフマ縺ヘナ∩q⊇∨チ∃チ∃≫テ∀♭⊆∽⊂ツ\n", + /* 50*/ "園゚ム£セ♂d゚≧ムマ刀諤ヨヒマ縲マぅうメモd≠ネマ縺マツニ≫∨⊥マラなナ∨£縲゚ム£メレム¥dツメロフマ縺ヘヲ∃≪>ア∵℃dワ∀∃エ⇔⊇∃⊇メ♭>ア♭モあぃい∃てタ∈ニ≫ツ\n", + /* 51*/ "カ゚ム£セメネ#マメヨマ黷ニ≫∨¬メロフマ縲ツワ竄пb香メネ#マ∈оナ氏タ≠ノ⇒ツ∨メネ#マモヨd£ナ⇔£ムd∵ハ縺タ∃⊇≡⊂マニ≫ツテメロフマ縺クべ⇔†≠ユエ⇔⊇∨メネ#マ∈⊇チ⇒∩ぺ∀ニ∩⌒エ\n", + /* 52*/ "梟キ゚ム£セケマロd♀∈くコマナ∨∵≫ロフマ縲ツロd♀∈ん⊂∀=ニ∬マルナ⊇ロd♀∈оナマ∩∩≫ツ∧メワ竄пaマロd♀∵シツ√†ュチシΧ┻エ\n", + /* 53*/ "」な゚ム£セテメロフマ縺モρケメ¢ワ縲∂翌ト烽焉゚≪⌒<ニタ∃」な∈づテニメネ#マ∈ア∠ツテ√マモ」なпメ艢窒フ┸d♀∈ぷ⇒メネ#マ⌒ユチリ√≫ツ\n", + /* 54*/ "窶゚ム£セテメロフマ縺モ÷゚dハ縺クばぱニ≫テ∀ルvモが⌒ミ⊃⇔⊇∃⊇ツクケマわべτ♭≠ホ⊇∃♪モミ⊃∃⊇ツほト√≫テ∀∈ュチサ√∃⊇メ♭ャ┛Χエ\n", + /* 55*/ "ヤみ゚ム£セテメロフマ縺ワカ゚ム£楳÷メネ#マメヨマ黷ナ⇔⊇≫ツナ∩ナクのはルマ°ハ縺マ∃≫∀<氈諠メ≡⊂Åツケマヤみ♭メナム縺ソ≠フはf∈ナ∩ツ⇔チ≫ツ\n", + /* 56*/ "噬゚ム£セテメロフマ縺モ⊇⌒メ⊇⊥∵θアタツつぁοナ∨†∩≪メ£ムd∂≦⊇メネ#マ∈ぷエ⇔⊇∨≪kb∵磨エ⇔⊇≫£ムd∈へエ⇔チ≫ツ\n", + /* 57*/ "ク゚ム£セテメロフマ縺モ┨ふモq⊇∨チ∃⊇≒ナチ<堰驕フΚタケ∽⊂∀ニ≫ツΦみ∵∧⊂∃∀タÅツわべナ⇔チ≫∵=サ⊇も∈ぁニ∩べ⇒∩ニ≫∀<堰驍氈ニÅ∽⊂エ\n", + /* 58*/ "ι゚ム£セテメロフマ縺モ<噬゚ム£メq⊇ぶ∈にフナ⇔⊇≫ツι゚ム£≒ナチ<・πメワ⊇Φみ∈ほナマぼチツ翼メΗπマ⇒⊇⇔モ=゚≪ョゥナ≡⊂∀ニ≫ツ\n", + /* 59*/ "ケ゚ム£セテメロフマ縺謔ャャ゚dハ縺クス⊥≫∀÷d∵ウ∝≫リ♭エ∀ケ♭ト⊇∩ツ⇔チ≫メ♭黹фエほト√∨∀テ∽♭゚dハ縺モぬ∝≒∃⊇ツ\n", + /* 60*/ "゙゚ム£セテメロフマ縺モワ¢d♀縲d蛟マ∈┥∋♭⊇≫ツ£ムdマニ∬ト⊇⇒⊇⇔ナリ⊂メ♭ぞ凵⌒ナエ⇔⊇∃⊇≪∞ォエ⇔ラ驕フ⌒≧ツ\n", + /* 61*/ "怩゚ム£セテメロフマ縺モ♂d゚≧ムマ刀マ≡エ⇔ラなト√∨=逐縲゚ム£メロd♀≠ネ轢d゚d∈はヮナ⇔⊇≫ツテメ≠ネ轢d゚dモd=dメひ≪マ<マケメ氈メコト∈ぷ⇒ロd♀∈ヌぁニ≫ツナ∩ナンマ÷d=dメてタ∈ワdマ⌒ナ⇔ナリ⊂メÅツ怩゚ム£モワ竄пgヒマロd♀∵シ⊇リホ♭⌒=テメ≠ネ轢d゚d∈く梶ソ≒はヮナ⇔⊇≫ツ\n", + /* 62*/ "黷ラ゚ム£セ黷ラ゚ム£メロフマ縺クべエ∨≪ほナ∨≪ニ≫∀マ♀dÅツテ⊇⇒モ揩メ翼∈ほナ∨Φみメル∈わべナ⇔チ≫ツ\n", + /* 63*/ "≧dラルマ°ハ綵n", + /* 64*/ "ワリ≧d\n", + /* 65*/ "怙「モd≠ネマ綵n", + /* 66*/ "♂d゚≧ムマ\n", + /* 67*/ "ムミマメュナル\n", + /* 68*/ "モムミマメ\n", + /* 69*/ "ヨヒマ縲マぅう\n", + /* 70*/ "§捩ンマ縲\n", + /* 71*/ "§捩ンマ縲エ\n", + /* 72*/ "§捩レd濬n", + /* 73*/ "§捩レd烙エ\n", + /* 74*/ "§捩モワリム£\n", + /* 75*/ "§捩モワリム£エ\n", + /* 76*/ "ヨ\n", + /* 77*/ "ヨエ\n", + /* 78*/ "ロユ÷\n", + /* 79*/ "ロユ÷エ\n", + /* 80*/ "普劇\n", + /* 81*/ "普劇エ\n", + /* 82*/ "噫斧操純ナば\n", + /* 83*/ "噫斧操純ナばエ\n", + /* 84*/ "噫斧操盾ィぁ\n", + /* 85*/ "噫斧操盾ィぁエ\n", + /* 86*/ "噫斧操盾桙歃n", + /* 87*/ "噫斧操盾桙麾エ\n", + /* 88*/ "ε┬┤x\n", + /* 89*/ "ε┬┤xエ\n", + /* 90*/ "θικ┿ヨδ\n", + /* 91*/ "θικ┿ヨδエ\n", + /* 92*/ "ξぺοリ\n", + /* 93*/ "ξぺοリエ\n", + /* 94*/ "%≠ハラ箪n", + /* 95*/ "%≠ハラ逐エ\n", + /* 96*/ "чш\n", + /* 97*/ "чшエ\n", + /* 98*/ "ぅうメ档\n", + /* 99*/ "ぅうメ档エ\n", + /*100*/ "ワリ≧d黽\n", + /*101*/ "ワリ≧d黽エ\n", + /*102*/ "ワリ≧dメ\n", + /*103*/ "ワリ≧dメエ\n", + /*104*/ "モマ♂ニマ\n", + /*105*/ "マ≧\n", + /*106*/ "ュ⇔ツテ\n", + /*107*/ "ツテナ∃⊇\n", + /*108*/ "マ≧\n", + /*109*/ "メネ#マ\n", + /*110*/ "の┸d♀\n", + /*111*/ "驗。\n", + /*112*/ "ヤみ\n", + /*113*/ "゚dハ繙ツテ\n", + /*114*/ "ぎ√ケト⊃\n", + /*115*/ "q⊃\n", + /*116*/ "らδケト⊃\n", + /*117*/ "らδ\n", + /*118*/ "d\n", + /*119*/ "騾ハヨマ\n", + /*120*/ "ハ綵n", + /*121*/ "它ィア\n", + /*122*/ "蛯イセ", + /*123*/ "ほナ∨セ", + /*124*/ "′艪 21\n", + /*125*/ "縲d蛯 20\n", + /*126*/ "ミ烙フミ 19\n", + /*127*/ "dヨd 18\n", + /*128*/ "閧п劇ワ 17\n", + /*129*/ "゙≠ヒd 16\n", + /*130*/ "モd≠ネマ 15\n", + /*131*/ "┓モd≠ネマ 14\n", + /*132*/ "ャモd≠ネマ 13\n", + /*133*/ "モヨワ$d 12\n", + /*134*/ "℃窶マ 11\n", + /*135*/ "£ 10\n", + /*136*/ "♂マ≠ヒワ 9\n", + /*137*/ "ロフd゚d 8\n", + /*138*/ "騾マ゚d 7\n", + /*139*/ "黴ハ縲マ 6\n", + /*140*/ "dレ 5\n", + /*141*/ "モd 4\n", + /*142*/ "メ縲 3\n", + /*143*/ "├$dネラ 2\n", + /*144*/ "$dネラ 1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "羅∈ぎ√\n", + /*149*/ "♭q⊃\n", + /*150*/ "∈ヨd£\n", + /*151*/ "ハ綵n", + /*152*/ "ヤ蛛クほヌ\n", + /*153*/ "ぎ√\n", + /*154*/ "ュロフマ綵n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "テメリ轣マモンハ縺タリヌ∋ツ\n", + /*158*/ "゚dハ ", + /*159*/ "Ηπ ", + /*160*/ "く怎驍劫・ ", + /*161*/ "なキニ≫∀ワ゚d綵n", + /*162*/ "なキヨΧエ\n", + /*163*/ "lン ", + /*164*/ "≦dマ貼n", + /*165*/ "≦dマ箪n", + /*166*/ "≦dマ曾n", + /*167*/ "ンマ゚d\n", + /*168*/ "」ば\n", + /*169*/ "モ′ワ∵ほ√∨\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "\n", + /*181*/ "オヨ\n", + /*182*/ "烙ヒマ≠\n", + /*183*/ "dヌメd♀\n", + /*184*/ "ラムハラワ゚d綵n", + /*185*/ "dヌョ水ッЫn", + /*186*/ "ルマ°ハ縲ロフd゚\n", + /*187*/ "ヨヒマ縲マぅう\n", + /*188*/ "ホをΗπ\n", + /*189*/ "ンハ縲ミハ£\n", + /*190*/ "£ムd操準烽о\n", + /*191*/ "£ムd逐準烽о\n", + /*192*/ "£ムd凍準烽о\n", + /*193*/ "£ムd楳準烽о\n", + /*194*/ "ロフマ縺メ┳ヌ\n", + /*195*/ "操烽оメロフマ繙ヌ\n", + /*196*/ "ロフマ縺メ゚ム£\n", + /*197*/ "dラリ\n", + /*198*/ "d∈メツ≫\n", + /*199*/ "ソ┳ヌ\n", + /*200*/ "dヌ\n", + /*201*/ "ラムハラィ\n", + /*202*/ "├ヮエ\n", + /*203*/ "ラムハラ烽о\n", + /*204*/ "£ムdメル\n", + /*205*/ "ロフマ縺ヘメソ┳q\n", + /*206*/ "£ムdメルメ烽оq\n", + /*207*/ "£ムdロフマ綵n", + /*208*/ "┻ぶロフマ繝瘁畚n", + /*209*/ "DR.SPY", + /*210*/ "BOMBSPY", + /*211*/ "⌒⊂巣ャ£ムニ≫\n", + /*212*/ "\n", + /*213*/ "サ√≫∃\n", + /*214*/ "ヤ∩⊃⊥マ\n", + /*215*/ "ぅbルマ♀\n", + /*216*/ "゙√∽\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/miscP.c b/src/files/lang/jap-final/miscP.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/jap-final/miscP.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_f.c b/src/files/lang/jap-final/misc_str_f.c new file mode 100644 index 000000000..b56f65a20 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_f.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R E U R\n", + /* 1*/ "Pas de briefing pour cette mission\n", + /* 2*/ "\n", + /* 3*/ "Objectif", + /* 4*/ "Succ鑚\n", + /* 5*/ "Incomplet\n", + /* 6*/ "Echec\n", + /* 7*/ "Plus qu'une minute.\n", + /* 8*/ "OBJECTIFS NON ATTEINTS - abandonner mission.\n", + /* 9*/ "Salutations Garde\n", + /* 10*/ "C'est quoi ce flingue?\n", + /* 11*/ "Ne pointe pas 軋 sur moi.\n", + /* 12*/ "Vit/MPS", + /* 13*/ "Hau/M", + /* 14*/ "Dev/D", + /* 15*/ "Ang/D", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELE 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Cool", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Difficile", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "Cool-Sim", + /* 28*/ "Facile-Sim", + /* 29*/ "Normal-Sim", + /* 30*/ "Difficile-Sim", + /* 31*/ "Perfect-Sim", + /* 32*/ "Dark-Sim", + /* 33*/ "Peace-Sim", + /* 34*/ "Armu-Sim", + /* 35*/ "Roket-Sim", + /* 36*/ "Kaze-Sim", + /* 37*/ "Poing-Sim", + /* 38*/ "Proie-Sim", + /* 39*/ "L稍he-Sim", + /* 40*/ "Juge-Sim", + /* 41*/ "Fixe-Sim", + /* 42*/ "Speed-Sim", + /* 43*/ "Tortue-Sim", + /* 44*/ "Venge-Sim", + /* 45*/ "Cool-Sim: c'est le plus facile des simulants. Un excellent choix pour un d饕utant. Il n'est pas tr鑚 malin et vise tr鑚 mal.\n", + /* 46*/ "Facile-Sim: Ce simulant a des capacit駸 de base mais il peut 黎re dangereux.\n", + /* 47*/ "Normal-Sim: Ce simulant a les m麥es capacit駸 que le joueur humain moyen.\n", + /* 48*/ "Difficile-Sim: Ce simulant a les m麥es capacit駸 qu'un bon joueur humain.\n", + /* 49*/ "Perfect-Sim: L'adversaire ultime, le plus intelligent et habile des simulants. Les joueurs choisissent souvent le Perfect-Sim pour am駘iorer leurs capacit駸.\n", + /* 50*/ "Dark-Sim: Prototype de cyborg d騅elopp par la dataDyne pour affronter les agents Carrington. Attention: ce simulant n'est pas humain. Il peut donc faire ce qui est humainement impossible.\n", + /* 51*/ "Peace-Sim: Un scientifique refusant d'utiliser une arme. Il recherche et r馗up鑽e les armes dans le niveau pour que les joueurs ne les utilisent pas. Vous pouvez bien sr lui tirer dessus et il en fera peut-黎re tomber!\n", + /* 52*/ "Armu-Sim: Il cherche toujours la meilleure protection. Si ce simulant perd de l'駭ergie, Il ira chercher un nouveau bouclier. Cela n'a aucun int駻黎 s'il n'y a pas de bouclier dans le niveau!\n", + /* 53*/ "Roket-Sim: Ce simulant adore tout faire sauter. Il pr馭鑽e l'armement explosif plutt que des pistolets ou des automatiques. C'est aussi vrai pour les armes au tir secondaire explosif!\n", + /* 54*/ "Kaze-Sim: Ce simulant ne recule devant rien pour d騁ruire sa cible. Il est tr鑚 aggressif et ne garde jamais ses distances - m麥e s'il tient une grenade! Faites attention quelqu'un qui n'a pas peur de mourir.\n", + /* 55*/ "Poing-Sim: Tout comme le Peace-Sim, ce simulant d騁este les armes mais il est en revanche un adversaire teigneux. Il tentera sans arr黎 d'assommer ou de d駸armer ses adversaires mains nues.\n", + /* 56*/ "Proie-Sim: Ce simulant pr馭鑽e attaquer les faibles pour tuer plus de monde. Il recherche les joueurs neufs et d駸arm駸 ou encore ceux affaiblis par un combat.\n", + /* 57*/ "L稍he-Sim: Ce simulant ne veut pas combattre et pr馭鑽e fuir pour survivre. Il peut attaquer de temps en temps mais seulement si l'adversaire a un armement inf駻ieur au sien. Utilisez une arme puissante ou tirez-lui dessus et il s'enfuira!\n", + /* 58*/ "Juge-Sim: Ce simulant est loyal et il d騁este les m騁hodes du Proie-Sim. Il essaiera de tuer le joueur en t黎e pour arrondir les scores.\n", + /* 59*/ "Fixe-Sim: Si ce simulant choisit une cible, celle-ci doit faire attention! Un Fixe-Sim poursuit un joueur jusqu' la fin de la partie! M麥e tu, il reviendra la charge.\n", + /* 60*/ "Speed-Sim: Ce simulant est un as de la vitesse. Il est plus rapide qu'un joueur humain, il est alors inutile, moins de connatre un raccourci, d'essayer de le semer!\n", + /* 61*/ "Tortue-Sim: Ce simulant porte un g駭駻ateur de bouclier d騅elopp par les scientifiques de la dataDyne. Le g駭駻ateur proj鑼e un bouclier deux fois plus r駸istant qu'un bouclier normal. Malheureusement, il r馘uit les mouvements de l'utilisateur. Le Tortue-Sim porte cet appareil m麥e s'il n'y a aucun bouclier dans le niveau.\n", + /* 62*/ "Venge-Sim: Ce simulant attaquera toujours le dernier joueur l'avoir attaqu ou tu. R馭l馗hissez avant de tirer.", + /* 63*/ "Combat Dark", + /* 64*/ "Myst鑽e skedar", + /* 65*/ "Agent IC", + /* 66*/ "Action dataDyne", + /* 67*/ "Pleurs maians", + /* 68*/ "Conflit extrater.", + /* 69*/ "Institut Carrington", + /* 70*/ "Centre dD", + /* 71*/ "Centre dD X", + /* 72*/ "Recherche dD", + /* 73*/ "Recherche dD X", + /* 74*/ "Extraction dD", + /* 75*/ "Extraction dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Immeuble G5", + /* 81*/ "Immeuble G5 X", + /* 82*/ "Infiltration S-51", + /* 83*/ "Infiltration S-51 X", + /* 84*/ "Sauvetage S-51", + /* 85*/ "Sauvetage S-51 X", + /* 86*/ "Fuite S-51", + /* 87*/ "Fuite S-51 X", + /* 88*/ "Base a駻ienne", + /* 89*/ "Base a駻ienne X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Site du crash", + /* 93*/ "Site du crash X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Sous-marin", + /* 97*/ "Sous-marin X", + /* 98*/ "D馭ense Institut", + /* 99*/ "D馭ense Institut X", + /*100*/ "Croiseur", + /*101*/ "Croiseur X", + /*102*/ "Ruines Skedars", + /*103*/ "Ruines Skedars X", + /*104*/ "G駭駻ique de fin", + /*105*/ "Hasard\n", + /*106*/ "Choisir: tout\n", + /*107*/ "Choisir: rien\n", + /*108*/ "Au hasard\n", + /*109*/ "Armes\n", + /*110*/ "Fonctions\n", + /*111*/ "Ordres\n", + /*112*/ "Pas d'arme\n", + /*113*/ "Choix cible\n", + /*114*/ "Suivre\n", + /*115*/ "Attaquer\n", + /*116*/ "D馭endre\n", + /*117*/ "Tenir\n", + /*118*/ "Normal\n", + /*119*/ "T駘馗harger\n", + /*120*/ "Obtenir mallette\n", + /*121*/ "Marquer PC\n", + /*122*/ "Tu(e) par", + /*123*/ "Tu", + /*124*/ "D饕utant:21\n", + /*125*/ "Stagiaire:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Bleu:18\n", + /*128*/ "Novice:17\n", + /*129*/ "2e classe:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Agent chef:14\n", + /*132*/ "Agent sp.:13\n", + /*133*/ "Expert:12\n", + /*134*/ "V騁駻an:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Dangereux:9\n", + /*137*/ "Mortel:8\n", + /*138*/ "Tueur:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Fatal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "QuasiPerf.:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "MUNI.FLECHETTE", + /*146*/ "MODELE 1.4", + /*147*/ "JM: 201172", + /*148*/ "Sauv. mallette\n", + /*149*/ "D馭. zone\n", + /*150*/ "Tenir zone\n", + /*151*/ "Prendre mallette\n", + /*152*/ "D馗apsuleur\n", + /*153*/ "Prot馮er\n", + /*154*/ "Tous simulants\n", + /*155*/ "MODELE 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Espace insuffisant pour lancer ", + /*158*/ "OBJECTIF:", + /*159*/ "SCORE LIMITE:", + /*160*/ "PRECISION MIN:", + /*161*/ "TIREZ POUR COMMENCER\n", + /*162*/ "PRET!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "CENTRE\n", + /*168*/ "EXPLOS饅n", + /*169*/ "Elvis est mort.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonds", + /*175*/ "Noirs", + /*176*/ "Auburn", + /*177*/ "Rin軋ge bleu", + /*178*/ "Joueur", + /*179*/ "", + /*180*/ "Identifier\n", + /*181*/ "Inutilis", + /*182*/ "Challenges\n", + /*183*/ "Charger jeu pr馘馭ini\n", + /*184*/ "D駑arrage rapide\n", + /*185*/ "R馮lages avanc駸\n", + /*186*/ "Simulateur de combat\n", + /*187*/ "Institut Carrington\n", + /*188*/ "S. 駲uipe\n", + /*189*/ "R馮lages termin駸\n", + /*190*/ "Equipe Joueur 1\n", + /*191*/ "Equipe Joueur 2\n", + /*192*/ "Equipe Joueur 3\n", + /*193*/ "Equipe Joueur 4\n", + /*194*/ "Nombre de Simulants\n", + /*195*/ "Simulants par 駲uipe\n", + /*196*/ "Difficult des Simulants\n", + /*197*/ "Commencer partie\n", + /*198*/ "Quitter\n", + /*199*/ "R馮lages joueur\n", + /*200*/ "R馮lages jeu\n", + /*201*/ "Lancer\n", + /*202*/ "Pr黎!\n", + /*203*/ "Equipe rapide\n", + /*204*/ "Joueurs seulement\n", + /*205*/ "Joueurs et simulants\n", + /*206*/ "Equipes de joueurs\n", + /*207*/ "Joueurs contre simulants\n", + /*208*/ "Equipes joueurs-simulants\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Rejouer mission pr馗馘ente\n", + /*212*/ "Holographe\n", + /*213*/ "Agressif\n", + /*214*/ "Passif\n", + /*215*/ "Perfect Pote\n", + /*216*/ "Furtif\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_g.c b/src/files/lang/jap-final/misc_str_g.c new file mode 100644 index 000000000..d94c82307 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_g.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "Fr diese Mission gibt es kein Briefing.\n", + /* 2*/ "\n", + /* 3*/ "Ziel", + /* 4*/ "erreicht\n", + /* 5*/ "nicht erreicht\n", + /* 6*/ "versagt\n", + /* 7*/ "Noch eine Minute.\n", + /* 8*/ "ZIELERREICHUNG UNGENワGEND - Mission abbrechen.\n", + /* 9*/ "Wachgru゚.\n", + /* 10*/ "Was soll die Waffe?\n", + /* 11*/ "Zielen Sie nicht auf mich!\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Opfer", + /* 22*/ "Leicht", + /* 23*/ "Normal", + /* 24*/ "Schwer", + /* 25*/ "Perfekt", + /* 26*/ "Dark", + /* 27*/ "OpferSim", + /* 28*/ "LeichtSim", + /* 29*/ "NormalSim", + /* 30*/ "SchwerSim", + /* 31*/ "PerfektSim", + /* 32*/ "DarkSim", + /* 33*/ "PazifistSim", + /* 34*/ "SchildSim", + /* 35*/ "RaketenSim", + /* 36*/ "SuizidSim", + /* 37*/ "FaustSim", + /* 38*/ "J臠erSim", + /* 39*/ "FeiglingSim", + /* 40*/ "JustizSim", + /* 41*/ "VendetSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "RacheSim", + /* 45*/ "OpferSim: Der am leichtesten zu besiegende Simulant. Eignet sich daher hervorragend fr Einsteiger. Der Simulant ist nicht sonderlich intelligent und ist zudem ein m葹iger Schtze.\n", + /* 46*/ "LeichtSim: Der Simulant verfgt zwar nur ber Basis-Intelligenz und -F臧igkeiten, ist aber trotzdem nicht ungef臧rlich.\n", + /* 47*/ "NormalSim: Der Simulant verfgt ber das Geschick eines menschlichen Spielers.\n", + /* 48*/ "SchwerSim: Der Simulant verfgt ber das Geschick eines guten menschlichen Spielers.\n", + /* 49*/ "PerfektSim: Der ultimative Gegner. トu゚erst intelligent und unberechenbar. Viele Spieler werden bevorzugt gegen ihn antreten, da sich ihre eigenen F臧igkeiten dadurch st舅dig verbessern.\n", + /* 50*/ "DarkSim: Ein Cyborg-Prototyp, der von dataDyne entwickelt wurde, um gegen das Institut vorzugehen. Beachten Sie, dass dieser Simulant, im Gegensatz zu den anderen, nicht menschlich ist. Daher kann er Dinge tun, die Menschen nicht tun knnen.\n", + /* 51*/ "PazifistSim: Diese Simulanten sind Wissenschaftler, die keine Waffen einsetzen. Sie gehen durch die Level, um herumliegende Waffen einzusammeln, sodass der Spieler sie nicht finden kann. Wenn Sie aber auf sie schie゚en, lassen sie vielleicht die Waffen fallen.\n", + /* 52*/ "SchildSim: Achtet immer auf maximalen Schild-Schutz. Verliert dieser Simulant seinen Schild, zieht er los, um einen neuen zu suchen. Das hat natrlich wenig Sinn, wenn keine Schilde vorhanden sind!\n", + /* 53*/ "RaketenSim: Dieser Simulant liebt es, Dinge in die Luft zu jagen. Er zieht Explosions-Waffen gegenber Pistolen und Automatik-Gewehren vor. Zu ersteren gehren auch Waffen, die eine 'explosive' Sekund舐-Funktion haben.\n", + /* 54*/ "SuizidSim: Dieser Simulant l舖st sich durch nichts aufhalten. Er ist sehr aggressiv und h舁t keine Distanz zum Gegner. Auch nicht, wenn er eine Granate h舁t! Seien Sie 舫゚erst vorsichtig, denn dieser Gegner kennt keine Angst.\n", + /* 55*/ "FaustSim: Dieser Simulant verwendet, 臧nlich wie der PazifistSim, keine Waffen. Kommt es aber zum Kampf, wird er seine F舫ste einsetzen. Er wird st舅dig versuchen, seinen Gegner zu entwaffnen.\n", + /* 56*/ "J臠erSim: Dieser Simulant jagt bevorzugt schw臘here Gegner. Er sucht nach Spielern, die die gerade erst erschienen sind, ber schwache Bewaffnung verfgen oder wenig Energie haben.\n", + /* 57*/ "FeiglingSim: Dieser Simulant wird eher sein Heil in der Flucht suchen, als zu k舂pfen. Er kann zwar hin und wieder attackieren, aber nur, wenn sein Gegner ber eine schwache Waffe verfgt. Ziehen Sie eine st舐kere Waffe, und er wird flchten!\n", + /* 58*/ "JustizSim: Dieser Simulant hat einen starken Gerechtigkeitssinn. Daher verurteilt er die Taktiken des J臠erSim. Er wird immer den st舐ksten Spieler verfolgen, um fr einen gleichm葹igen Score zu sorgen.\n", + /* 59*/ "VendetSim: Hat sich dieser Simulant ein Opfer ausgesucht, sollte der Spieler sehr vorsichtig sein! Ein VendetSim verfolgt diesen Spieler, bis das Spiel vorber ist! Er schreckt eventuell auch nicht vor einem Kamikaze-Angriff zurck.\n", + /* 60*/ "SpeedSim: Diese Simulanten sind unglaublich schnell. In Punkto Geschwindigkeit sind sie jedem Menschen berlegen, daher hat es keinen Sinn, vor ihnen zu flchten. (Es sei denn, Sie kennen eine Abkrzung.)\n", + /* 61*/ "TurtleSim: Dieser Simulant verfgt ber eine von dataDyne entwickelte Schildtechnologie. Der Generator projiziert ein Schutzschild um seinen Tr臠er, der doppelt so stark ist, wie ein normaler Schild. Leider wird dadurch auch die Bewegungsfreiheit eingeschr舅kt, und er kann sich nur langsam bewegen. TurtleSims tragen diesen Schild als Standard-Ausrstung, sogar, wenn es im aktuellen Level keine Schilde gibt.\n", + /* 62*/ "RacheSim: Seien Sie vorsichtig, wenn Sie auf einen RacheSim schie゚en, da er danach nur seinen Bezwinger angreift.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar-Mysterium", + /* 65*/ "CI-Operator", + /* 66*/ "dataDyne Action", + /* 67*/ "Maianische Tr舅en", + /* 68*/ "Alien-Konflikt", + /* 69*/ "Carrington Institut", + /* 70*/ "dD Zentrale", + /* 71*/ "dD Zentrale X", + /* 72*/ "dD Forschung", + /* 73*/ "dD Forschung X", + /* 74*/ "dD Extraktion", + /* 75*/ "dD Extraktion X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5-Building", + /* 81*/ "G5-Building X", + /* 82*/ "A-51 Infiltration", + /* 83*/ "A-51 Infiltration X", + /* 84*/ "A-51 Rettung", + /* 85*/ "A-51 Rettung X", + /* 86*/ "A-51 Flucht", + /* 87*/ "A-51 Flucht X", + /* 88*/ "Sttzpunkt", + /* 89*/ "Sttzpunkt X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Absturzstelle", + /* 93*/ "Absturzstelle X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Tiefsee", + /* 97*/ "Tiefsee X", + /* 98*/ "Verteidigung", + /* 99*/ "Verteidigung X", + /*100*/ "Feindliches Schiff", + /*101*/ "Feindliches Schiff X", + /*102*/ "Skedar Ruinen", + /*103*/ "Skedar Ruinen X", + /*104*/ "End Credits", + /*105*/ "Zuf舁lig\n", + /*106*/ "Alle\n", + /*107*/ "Keine\n", + /*108*/ "Zufallsgenerator\n", + /*109*/ "Waffe\n", + /*110*/ "Funktion\n", + /*111*/ "Befehle\n", + /*112*/ "Keine Waffe\n", + /*113*/ "Zielauswahl\n", + /*114*/ "Folgen\n", + /*115*/ "Attackieren\n", + /*116*/ "Verteidigen\n", + /*117*/ "Halten\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Schnapp den Koffer\n", + /*121*/ "Tag Box\n", + /*122*/ "Besiegt von:", + /*123*/ "Besiegt wurde:", + /*124*/ "Anf舅ger:21\n", + /*125*/ "Azubi:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Normal:18\n", + /*128*/ "Neuling:17\n", + /*129*/ "Soldat:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star-Agent:14\n", + /*132*/ "Spec-Agent:13\n", + /*133*/ "Experte:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Profi:10\n", + /*136*/ "Gef臧rlich:9\n", + /*137*/ "Letal:8\n", + /*138*/ "Tdlich:7\n", + /*139*/ "Verheerend:6\n", + /*140*/ "Zerstrer:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Berserker:3\n", + /*143*/ "Fast Perfekt:2\n", + /*144*/ "Perfekt:1\n", + /*145*/ "DARTMUNI", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Vert. Koffer\n", + /*149*/ "Vert. Hgel\n", + /*150*/ "Halte Hgel\n", + /*151*/ "Erl. Koffer\n", + /*152*/ "Pop Cap\n", + /*153*/ "Beschtze\n", + /*154*/ "Alle Simulanten\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Nicht gengend Platz fr den ", + /*158*/ "ZIELE:", + /*159*/ "SCORE:", + /*160*/ "MIN GENAUIGKEIT:", + /*161*/ "FEUER, UM LOSZULEGEN\n", + /*162*/ "FERTIG!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODIERT\n", + /*169*/ "Elvis wurde eliminiert.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Spieler", + /*179*/ "", + /*180*/ "Identifizieren\n", + /*181*/ "nicht verwendet", + /*182*/ "Challenges\n", + /*183*/ "Laden/Voreinstellung\n", + /*184*/ "Schnellstart\n", + /*185*/ "Erweitertes Setup\n", + /*186*/ "Kampf-Simulator\n", + /*187*/ "Carrington Institut\n", + /*188*/ "Team-Score\n", + /*189*/ "Setup abgeschlossen\n", + /*190*/ "Spieler 1 Team\n", + /*191*/ "Spieler 2 Team\n", + /*192*/ "Spieler 3 Team\n", + /*193*/ "Spieler 4 Team\n", + /*194*/ "Anzahl der Simulanten\n", + /*195*/ "Simulanten pro Team\n", + /*196*/ "Sim-Schwierigkeit\n", + /*197*/ "Start\n", + /*198*/ "Abbrechen\n", + /*199*/ "Spieler-Einstellungen\n", + /*200*/ "Spiel-Einstellungen\n", + /*201*/ "Quick Go\n", + /*202*/ "Fertig!\n", + /*203*/ "Quick-Team\n", + /*204*/ "Nur Spieler\n", + /*205*/ "Spieler und Simulanten\n", + /*206*/ "Spieler-Teams\n", + /*207*/ "Spieler vs. Simulanten\n", + /*208*/ "Spieler-Simulanten-Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Mission wiederholen\n", + /*212*/ "Holografie\n", + /*213*/ "Aggressiv\n", + /*214*/ "Passiv\n", + /*215*/ "Perfekte Kumpels\n", + /*216*/ "Tarnung\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_i.c b/src/files/lang/jap-final/misc_str_i.c new file mode 100644 index 000000000..1de2364e6 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_i.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R E\n", + /* 1*/ "Nessuna informazione per questa missione\n", + /* 2*/ "\n", + /* 3*/ "Obiettivo", + /* 4*/ "Completato\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallito\n", + /* 7*/ "Ancora un minuto.\n", + /* 8*/ "OBIETTIVI FALLITI: interrompi missione!\n", + /* 9*/ "Saluto guardia\n", + /* 10*/ "Cos' quella pistola?\n", + /* 11*/ "Non puntarla a me.\n", + /* 12*/ "v/ms", + /* 13*/ "h/m", + /* 14*/ "i/g", + /* 15*/ "t/g", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "TELESPIA", + /* 19*/ "MODELLO 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Pappa", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Tosto", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "RepPappa", + /* 28*/ "RepFacile", + /* 29*/ "RepNormal", + /* 30*/ "RepTosto", + /* 31*/ "RepPerfect", + /* 32*/ "RepDark", + /* 33*/ "RepPace", + /* 34*/ "RepScudo", + /* 35*/ "RepMissile", + /* 36*/ "RepKaze", + /* 37*/ "RepPugno", + /* 38*/ "RepPreda", + /* 39*/ "RepCodar", + /* 40*/ "RegGiusto", + /* 41*/ "RepLite", + /* 42*/ "RepAgile", + /* 43*/ "RepTarta", + /* 44*/ "RepVendi", + /* 45*/ "RepPappa: ネ il replicante pi facile da battere, un vero pappamolle e quindi il migliore per i principianti. Non molto intelligente e quasi incapace di sparare.\n", + /* 46*/ "RepFacile: ネ dotato di abilit e intelligenza elementari, ma pu rivelarsi pericoloso.\n", + /* 47*/ "RepNormal: Le sue abilit sono come quelle di un giocatore umano medio.\n", + /* 48*/ "RepTosto: Le sue abilit sono come quelle di un giocatore umano bravo.\n", + /* 49*/ "RepPerfect: L'avversario ultimo: il pi intelligente e abile. Da usarsi per un miglioramento continuo delle proprie capacit.\n", + /* 50*/ "RepDark: Prototipo cibernetico sviluppato dalla dataDyne per contrastare gli agenti di Carrington. Ricorda che questo replicante al contrario degli altri non umano, quindi potrebbe avere abilit sovrumane!\n", + /* 51*/ "RepPace: ネ un replicante-scienziato che protesta contro l'uso delle armi. Va in giro per i piani allaricerca di armi per nasconderle in modo che il giocatore non possa usarle. Sparandogli probabile che glienecadano alcune!\n", + /* 52*/ "RepScudo: ネ sempre alla ricerca del massimo scudo protettivo. Se perde energia, andr alla ricerca di unnuovo scudo. Peggio per lui se su quel piano non ci sono scudi!\n", + /* 53*/ "RepMissile: Adora le esplosioni: preferisce le armi che provocano violente deflagrazioni alle pistole convenzionali e alle mitragliatrici. Questo vale anche per le armi con funzioni esplosive secondarie!\n", + /* 54*/ "RepKaze: Il suo scopo distruggere l'avversario ad ogni costo. ネ molto aggressivo e non prende maile distanze... neanche da una granata! Non ha paura di morire e perci molto pericoloso.\n", + /* 55*/ "RepPugno: Come il RepPace anche questo replicante contro l'uso delle armi. Tuttavia non contro la lotta a mani nude:usa i pugni per cercare di stendere o disarmare l'avversario.\n", + /* 56*/ "RepPreda: Preferisce scagliarsi su avversari deboli per vincere facilmente. Cerca avversariprincipianti, muniti di arma meno potente o in cattiva salute.\n", + /* 57*/ "RepCodar: Piuttosto che combattere preferisce cercare scampo nella fuga. Attacca raramente e solo se l'avversario ha un'arma meno potente. Sfoderando un'arma migliore o sparando, scapper!\n", + /* 58*/ "RepGiusto: Ha un forte senso della giustizia e disprezza la strategia del RepPreda. Cerca sempre di colpireil giocatore in vantaggio per pareggiare il risultato.\n", + /* 59*/ "RepLite: Una volta che ha identificato un bersaglio, meglio tenere gli occhi aperti! Un RepLiteinseguir quel giocatore fino alla fine! Serba rancore anche dopo la morte.\n", + /* 60*/ "RepAgile: ネ agilissimo e velocissimo: corre molto pi veloce del giocatore umano, quindi inutile cercare di sfuggirgli a meno che si conosca una scorciatoia!\n", + /* 61*/ "RepTarta: Indossa il prototipo del generatore scudo creato dagli scienziati dataDyne. Il generatore proietta attorno al suo corpo uno scudo protettivo due volte pi potente di uno scudo normale. Questo per lo impedisce nei movimenti, per cui molto lento. Il RepTarta dotato di questo scudo anche se non ci sono scudi su quel piano.\n", + /* 62*/ "RepVendi: Sparando o uccidendo un RepVendi, gli altri attaccheranno l'ultimo giocatore che l'ha attaccato o ucciso.", + /* 63*/ "Lotta Dark", + /* 64*/ "Mistero Skedar", + /* 65*/ "Funzionario CI", + /* 66*/ "Azione dataDyne", + /* 67*/ "Lacrime Maian", + /* 68*/ "Conflitto Alieno", + /* 69*/ "Carrington Institute", + /* 70*/ "QG dataDyne", + /* 71*/ "QG dataDyne X", + /* 72*/ "Ricerca dD", + /* 73*/ "Ricerca dD X", + /* 74*/ "Estrazione dD", + /* 75*/ "Estrazione dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltrazione A51", + /* 83*/ "Infiltrazione A51 X", + /* 84*/ "Salvataggio A51", + /* 85*/ "Salvataggio A51 X", + /* 86*/ "Fuga A51", + /* 87*/ "Fuga A51 X", + /* 88*/ "Base aerea", + /* 89*/ "Base aerea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Luogo del disastro", + /* 93*/ "Luogo del disastro X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Abissi oceanici", + /* 97*/ "Abissi oceanici X", + /* 98*/ "Difesa dell'istituto", + /* 99*/ "Difesa dell'istituto X", + /*100*/ "Astronave Skedar", + /*101*/ "Astronave Skedar X", + /*102*/ "Rovine Skedar", + /*103*/ "Rovine Skedar X", + /*104*/ "Titoli di coda", + /*105*/ "A caso\n", + /*106*/ "Seleziona tutto\n", + /*107*/ "Nessuna selezione\n", + /*108*/ "Non in sequenza\n", + /*109*/ "Inventario\n", + /*110*/ "Funzione\n", + /*111*/ "Ordini\n", + /*112*/ "No armi\n", + /*113*/ "Scegli obiettivo\n", + /*114*/ "Segui\n", + /*115*/ "Attacca\n", + /*116*/ "Difendi\n", + /*117*/ "Fisso\n", + /*118*/ "Normale\n", + /*119*/ "Scarica\n", + /*120*/ "Prendi cassa\n", + /*121*/ "Box\n", + /*122*/ "Eliminato da", + /*123*/ "Eliminato", + /*124*/ "Princip.:21\n", + /*125*/ "Addestr.:20\n", + /*126*/ "Amatore:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novello:17\n", + /*129*/ "Truppa:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Ag.Grado:14\n", + /*132*/ "Ag.Spec:13\n", + /*133*/ "Esperto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Profess.:10\n", + /*136*/ "Pericoloso:9\n", + /*137*/ "Micidiale:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassino:6\n", + /*140*/ "Letale:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invulner.:3\n", + /*143*/ "SemiPerf:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "FRECCE", + /*146*/ "MODELLO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salva cassa\n", + /*149*/ "Difendi colle\n", + /*150*/ "Tieni colle\n", + /*151*/ "Prendi cassa\n", + /*152*/ "Tutti contro 1\n", + /*153*/ "Proteggi\n", + /*154*/ "Tutti replic.\n", + /*155*/ "MODELLO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Spazio insufficiente per il lancio", + /*158*/ "OBIETTIVI:", + /*159*/ "PUNTEGGIO:", + /*160*/ "PRECISIONE IN MIN:", + /*161*/ "SPARA PER INIZIARE\n", + /*162*/ "PRONTI!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "CENTRO\n", + /*168*/ "ESPLOSO\n", + /*169*/ "Elvis morto.\n", + /*170*/ "Modalit 1", + /*171*/ "Modalit 2", + /*172*/ "Modalit 3", + /*173*/ "Modalit 4", + /*174*/ "Biondo", + /*175*/ "Nero", + /*176*/ "Castano", + /*177*/ "Cachet blu", + /*178*/ "Giocat.", + /*179*/ "", + /*180*/ "Identifica\n", + /*181*/ "non in uso", + /*182*/ "Sfide\n", + /*183*/ "Carica/Imposta giochi\n", + /*184*/ "Avvio rapido\n", + /*185*/ "Impostaz. avanzate\n", + /*186*/ "Simulatore lotta\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Punti squadra\n", + /*189*/ "Fine impostazioni\n", + /*190*/ "Squadra 1 giocatore\n", + /*191*/ "Squadra 2 giocatori\n", + /*192*/ "Squadra 3 giocatori\n", + /*193*/ "Squadra 4 giocatori\n", + /*194*/ "Numero di replicanti\n", + /*195*/ "Replicanti per squadra\n", + /*196*/ "Difficolt replicanti\n", + /*197*/ "Avvia gioco\n", + /*198*/ "Esci\n", + /*199*/ "Impostaz. giocatori\n", + /*200*/ "Impostazioni gioco\n", + /*201*/ "Scelta rapida\n", + /*202*/ "Pronti!\n", + /*203*/ "Avvio rapido\n", + /*204*/ "Solo giocatori\n", + /*205*/ "Giocatori e replicanti\n", + /*206*/ "Squadre di giocatori\n", + /*207*/ "Giocatori contro replicanti\n", + /*208*/ "Squadre giocatori-replicanti\n", + /*209*/ "CAPSUSPIA", + /*210*/ "BOMBASPIA", + /*211*/ "Ripeti missione precedente\n", + /*212*/ "Olografia\n", + /*213*/ "Aggressivo\n", + /*214*/ "Passivo\n", + /*215*/ "Amici Perfect\n", + /*216*/ "In incognito\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_s.c b/src/files/lang/jap-final/misc_str_s.c new file mode 100644 index 000000000..8d7328bc3 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_s.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No hay informacin para esta misin\n", + /* 2*/ "\n", + /* 3*/ "Objetivo", + /* 4*/ "Completado\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallado\n", + /* 7*/ "Queda un minuto.\n", + /* 8*/ "OBJETIVOS FALLADOS - abortar misin.\n", + /* 9*/ "Saludos del Guarda\n", + /* 10*/ "ソQu arma es 駸a?\n", + /* 11*/ "No me apuntes con ese arma.\n", + /* 12*/ "v/mps", + /* 13*/ "a/m", + /* 14*/ "x/ー", + /* 15*/ "y/ー", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELO 1.2", + /* 20*/ "GIROSTATO", + /* 21*/ "Muy F當il", + /* 22*/ "F當il", + /* 23*/ "Normal", + /* 24*/ "Difcil", + /* 25*/ "Perfecto", + /* 26*/ "Oscuro", + /* 27*/ "SimMF當il", + /* 28*/ "SimF當il", + /* 29*/ "SimNormal", + /* 30*/ "SimDifci", + /* 31*/ "SimPerfec", + /* 32*/ "SimOscuro", + /* 33*/ "SimPaz", + /* 34*/ "SimEscudo", + /* 35*/ "SimCohete", + /* 36*/ "SimKamika", + /* 37*/ "SimLucha", + /* 38*/ "SimPresa", + /* 39*/ "SimCobard", + /* 40*/ "SimJuez", + /* 41*/ "SimPelea", + /* 42*/ "SimVeloz", + /* 43*/ "SimTortug", + /* 44*/ "SimVengan", + /* 45*/ "SimMF當il: ノste es el simulante m疽 f當il de derrotar, y por lo tanto, la mejor eleccin para los principiantes. No es muy inteligente, y su tiro es bastante pobre.\n", + /* 46*/ "SimF當il: Este simulante tiene inteligencia y habilidades b疽icas; an as puede ser peligroso.\n", + /* 47*/ "SimNormal: Este simulante es tan habilidoso como un jugador humano normal y corriente.\n", + /* 48*/ "SimDifci: Este simulante es tan habilidoso como un buen jugador humano.\n", + /* 49*/ "SimPerfec: El adversario definitivo. El simulante m疽 inteligente y habilidoso. La mayora de jugadores querr疣 usar a SimPerfecto todo el tiempo para mejorar sus habilidades.\n", + /* 50*/ "SimOscuro: Prototipo cibern騁ico desarrollado por dataDyne para contrarrestar las acciones de Carrington. Recuerda que este simulante no es humano. Esto significa que es capaz de hacer cosas que un humano no puede.\n", + /* 51*/ "SimPaz: Estos simulantes son cientficos que protestan contra el uso de armas. Recorren el nivel buscando armas y las recogen para que el jugador no pueda usarlas. Por supuesto, si les disparas un poco... 。no les importar soltarlas!\n", + /* 52*/ "SimEscudo: Siempre busca la m痊ima proteccin de escudo. Si este simulante pierde algo de energa de su escudo, ir en busca de uno nuevo. 。No tiene mucha utilidad si no hay escudos en el nivel!\n", + /* 53*/ "SimCohete: A este simulante le encanta ver cosas explotar. Prefiere armas explosivas antes que las convencionales pistolas o autom疸icas. 。Esto tambi駭 se extiende a las armas que tienen funciones secundarias explosivas!\n", + /* 54*/ "SimKamika: Este simulante no se detendr ante nada para destruir a su blanco. Es muy agresivo y nunca cuida las distancias: 。Incluso cuando lleva una granada! S muy cuidadoso de este adversario que no tiene miedo a morir.\n", + /* 55*/ "SimLucha: Este simulante protesta por el uso de armas al igual que hacen los SimPaz. An as, no tiene reservas a la hora de combatir desarmado. Siempre intentar usar sus puos para atacar o desarmar a su oponente.\n", + /* 56*/ "SimPresa: Este simulante prefiere cebarse en los d饕iles para conseguir muertes f當iles. Buscar jugadores que acaben de salir, tengan un arma inferior, o tengan poca salud.\n", + /* 57*/ "SimCobard: Este simulante no quiere luchar, as que huir para intentar sobrevivir. A veces atacar, pero slo si el oponente tiene un arma inferior. 。Saca un arma mayor o disp疵ale, y saldr corriendo!\n", + /* 58*/ "SimJuez: Este simulante tiene un gran sentido de la justicia y desprecia las t當ticas del SimPresa. Siempre intentar matar al jugador que vaya ganando para as igualar los marcadores.\n", + /* 59*/ "SimPelea: 。Cuando este simulante escoge objetivo, el jugador debe tener mucho cuidado! 。Un SimPelea perseguir al jugador hasta que se acabe el juego! Aunque muera, seguir guard疣dote rencor.\n", + /* 60*/ "SimVeloz: Estos simulantes han sido entrenados para ser muy veloces. 。Pueden atrapar f當ilmente a un humano, as que no huyas de un SimVeloz a menos que conozcas algn buen atajo!\n", + /* 61*/ "SimTortug: Este simulante lleva un prototipo de generador de escudo creado por cientficos de dataDyne. El generador crea un escudo protector que posee el doble de fuerza que un escudo normal. Desgraciadamente, restringe el movimiento del portador, as que se mover muy despacio. Los SimTortug llevan este escudo siempre, incluso si no hay escudos en el nivel.\n", + /* 62*/ "SimVengan: Ten cuidado de no disparar o matar a un SimVengan, ya que siempre atacar al ltimo jugador que le haya matado.", + /* 63*/ "Combate Oscuro", + /* 64*/ "Misterio Skedar", + /* 65*/ "Operativo IC", + /* 66*/ "Accin dataDyne", + /* 67*/ "L疊rimas Maian", + /* 68*/ "Conflicto Alien", + /* 69*/ "Instituto Carrington", + /* 70*/ "Central dD", + /* 71*/ "Central dD X", + /* 72*/ "Investigacin dD", + /* 73*/ "Investigacin dD X", + /* 74*/ "Extraccin dD", + /* 75*/ "Extraccin dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltracin A51", + /* 83*/ "Infiltracin A51 X", + /* 84*/ "Rescate A51", + /* 85*/ "Rescate A51 X", + /* 86*/ "Escape A51", + /* 87*/ "Escape A51 X", + /* 88*/ "Base A駻ea", + /* 89*/ "Base A駻ea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Impacto", + /* 93*/ "Impacto X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Mar Profundo", + /* 97*/ "Mar Profundo X", + /* 98*/ "Defensa Instituto", + /* 99*/ "Defensa Instituto X", + /*100*/ "Acorazado", + /*101*/ "Acorazado X", + /*102*/ "Ruinas Skedar", + /*103*/ "Ruinas Skedar X", + /*104*/ "Cr馘itos ", + /*105*/ "Aleatorio\n", + /*106*/ "Seleccionar Todo\n", + /*107*/ "Deseleccionar Todo\n", + /*108*/ "Al azar\n", + /*109*/ "Inventario\n", + /*110*/ "Funcin\n", + /*111*/ "モrdenes\n", + /*112*/ "Sin Arma\n", + /*113*/ "Elige Objetivo\n", + /*114*/ "Seguir\n", + /*115*/ "Atacar\n", + /*116*/ "Defender\n", + /*117*/ "Mantener\n", + /*118*/ "Normal\n", + /*119*/ "Bajar\n", + /*120*/ "Obtener\n", + /*121*/ "Marcar\n", + /*122*/ "Te mat", + /*123*/ "Mataste a", + /*124*/ "Iniciado:21\n", + /*125*/ "Aprendiz:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novato:17\n", + /*129*/ "Soldado:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Estrella:14\n", + /*132*/ "Especial:13\n", + /*133*/ "Experto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Peligroso:9\n", + /*137*/ "Mortal:8\n", + /*138*/ "Ejecutor:7\n", + /*139*/ "Asesino:6\n", + /*140*/ "Letal:5\n", + /*141*/ "ノlite:4\n", + /*142*/ "Invencible:3\n", + /*143*/ "Completo:2\n", + /*144*/ "Perfecto:1\n", + /*145*/ "DARDOS", + /*146*/ "MODELO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salvar Caja\n", + /*149*/ "Defender Colina\n", + /*150*/ "Mantener Colina\n", + /*151*/ "Coger Maletn\n", + /*152*/ "Llevarla\n", + /*153*/ "Proteger\n", + /*154*/ "Todo Simulante\n", + /*155*/ "MODELO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Sin suficiente espacio para activar ", + /*158*/ "ACIERTOS NEC.:", + /*159*/ "PUNTUACIモN NEC.:", + /*160*/ "PRECISIモN MIN.:", + /*161*/ "DISPARA PARA EMPEZAR\n", + /*162*/ "。PREPARADO!\n", + /*163*/ "LヘMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "DIANA\n", + /*168*/ "EXPLOTADOS\n", + /*169*/ "Elvis ha muerto.\n", + /*170*/ "Estilo 1", + /*171*/ "Estilo 2", + /*172*/ "Estilo 3", + /*173*/ "Estilo 4", + /*174*/ "Rubio", + /*175*/ "Moreno", + /*176*/ "Castao", + /*177*/ "Azulado", + /*178*/ "Jugador", + /*179*/ "", + /*180*/ "Identificado\n", + /*181*/ "unused", + /*182*/ "Desafos\n", + /*183*/ "Cargar Juegos\n", + /*184*/ "Comienzo R疳ido\n", + /*185*/ "Conf. Avanzada\n", + /*186*/ "Simulador de Combate\n", + /*187*/ "Instituto Carrington\n", + /*188*/ "P. Equipo\n", + /*189*/ "Conf. Finalizada\n", + /*190*/ "Equipo Jugador 1\n", + /*191*/ "Equipo Jugador 2\n", + /*192*/ "Equipo Jugador 3\n", + /*193*/ "Equipo Jugador 4\n", + /*194*/ "Nmero de Simulantes\n", + /*195*/ "Simulantes por Equipo\n", + /*196*/ "Nivel de Simulantes\n", + /*197*/ "Empezar Juego\n", + /*198*/ "Abandonar\n", + /*199*/ "Opciones de Jugador\n", + /*200*/ "Opciones de Juego\n", + /*201*/ "Salida R疳ida\n", + /*202*/ "。Preparado!\n", + /*203*/ "Equipo R疳ido\n", + /*204*/ "Slo Jugadores\n", + /*205*/ "Jugadores y Simulantes\n", + /*206*/ "Equipos de Jugadores\n", + /*207*/ "Jugadores contra Simulantes\n", + /*208*/ "Equipos de Jugador-Simulante\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Repetir Misin Previa\n", + /*212*/ "Holografa\n", + /*213*/ "Agresivos\n", + /*214*/ "Pasivos\n", + /*215*/ "Camaradas\n", + /*216*/ "Sigilosos\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/mp10E.c b/src/files/lang/jap-final/mp10E.c similarity index 100% rename from src/files/lang/mp10E.c rename to src/files/lang/jap-final/mp10E.c diff --git a/src/files/lang/mp10J.c b/src/files/lang/jap-final/mp10J.c similarity index 100% rename from src/files/lang/mp10J.c rename to src/files/lang/jap-final/mp10J.c diff --git a/src/files/lang/mp10P.c b/src/files/lang/jap-final/mp10P.c similarity index 100% rename from src/files/lang/mp10P.c rename to src/files/lang/jap-final/mp10P.c diff --git a/src/files/lang/mp10_str_f.c b/src/files/lang/jap-final/mp10_str_f.c similarity index 100% rename from src/files/lang/mp10_str_f.c rename to src/files/lang/jap-final/mp10_str_f.c diff --git a/src/files/lang/mp10_str_g.c b/src/files/lang/jap-final/mp10_str_g.c similarity index 100% rename from src/files/lang/mp10_str_g.c rename to src/files/lang/jap-final/mp10_str_g.c diff --git a/src/files/lang/mp10_str_i.c b/src/files/lang/jap-final/mp10_str_i.c similarity index 100% rename from src/files/lang/mp10_str_i.c rename to src/files/lang/jap-final/mp10_str_i.c diff --git a/src/files/lang/mp10_str_s.c b/src/files/lang/jap-final/mp10_str_s.c similarity index 100% rename from src/files/lang/mp10_str_s.c rename to src/files/lang/jap-final/mp10_str_s.c diff --git a/src/files/lang/mp11E.c b/src/files/lang/jap-final/mp11E.c similarity index 100% rename from src/files/lang/mp11E.c rename to src/files/lang/jap-final/mp11E.c diff --git a/src/files/lang/mp11J.c b/src/files/lang/jap-final/mp11J.c similarity index 100% rename from src/files/lang/mp11J.c rename to src/files/lang/jap-final/mp11J.c diff --git a/src/files/lang/mp11P.c b/src/files/lang/jap-final/mp11P.c similarity index 100% rename from src/files/lang/mp11P.c rename to src/files/lang/jap-final/mp11P.c diff --git a/src/files/lang/mp11_str_f.c b/src/files/lang/jap-final/mp11_str_f.c similarity index 100% rename from src/files/lang/mp11_str_f.c rename to src/files/lang/jap-final/mp11_str_f.c diff --git a/src/files/lang/mp11_str_g.c b/src/files/lang/jap-final/mp11_str_g.c similarity index 100% rename from src/files/lang/mp11_str_g.c rename to src/files/lang/jap-final/mp11_str_g.c diff --git a/src/files/lang/mp11_str_i.c b/src/files/lang/jap-final/mp11_str_i.c similarity index 100% rename from src/files/lang/mp11_str_i.c rename to src/files/lang/jap-final/mp11_str_i.c diff --git a/src/files/lang/mp11_str_s.c b/src/files/lang/jap-final/mp11_str_s.c similarity index 100% rename from src/files/lang/mp11_str_s.c rename to src/files/lang/jap-final/mp11_str_s.c diff --git a/src/files/lang/mp12E.c b/src/files/lang/jap-final/mp12E.c similarity index 100% rename from src/files/lang/mp12E.c rename to src/files/lang/jap-final/mp12E.c diff --git a/src/files/lang/mp12J.c b/src/files/lang/jap-final/mp12J.c similarity index 100% rename from src/files/lang/mp12J.c rename to src/files/lang/jap-final/mp12J.c diff --git a/src/files/lang/mp12P.c b/src/files/lang/jap-final/mp12P.c similarity index 100% rename from src/files/lang/mp12P.c rename to src/files/lang/jap-final/mp12P.c diff --git a/src/files/lang/mp12_str_f.c b/src/files/lang/jap-final/mp12_str_f.c similarity index 100% rename from src/files/lang/mp12_str_f.c rename to src/files/lang/jap-final/mp12_str_f.c diff --git a/src/files/lang/mp12_str_g.c b/src/files/lang/jap-final/mp12_str_g.c similarity index 100% rename from src/files/lang/mp12_str_g.c rename to src/files/lang/jap-final/mp12_str_g.c diff --git a/src/files/lang/mp12_str_i.c b/src/files/lang/jap-final/mp12_str_i.c similarity index 100% rename from src/files/lang/mp12_str_i.c rename to src/files/lang/jap-final/mp12_str_i.c diff --git a/src/files/lang/mp12_str_s.c b/src/files/lang/jap-final/mp12_str_s.c similarity index 100% rename from src/files/lang/mp12_str_s.c rename to src/files/lang/jap-final/mp12_str_s.c diff --git a/src/files/lang/mp13E.c b/src/files/lang/jap-final/mp13E.c similarity index 100% rename from src/files/lang/mp13E.c rename to src/files/lang/jap-final/mp13E.c diff --git a/src/files/lang/mp13J.c b/src/files/lang/jap-final/mp13J.c similarity index 100% rename from src/files/lang/mp13J.c rename to src/files/lang/jap-final/mp13J.c diff --git a/src/files/lang/mp13P.c b/src/files/lang/jap-final/mp13P.c similarity index 100% rename from src/files/lang/mp13P.c rename to src/files/lang/jap-final/mp13P.c diff --git a/src/files/lang/mp13_str_f.c b/src/files/lang/jap-final/mp13_str_f.c similarity index 100% rename from src/files/lang/mp13_str_f.c rename to src/files/lang/jap-final/mp13_str_f.c diff --git a/src/files/lang/mp13_str_g.c b/src/files/lang/jap-final/mp13_str_g.c similarity index 100% rename from src/files/lang/mp13_str_g.c rename to src/files/lang/jap-final/mp13_str_g.c diff --git a/src/files/lang/mp13_str_i.c b/src/files/lang/jap-final/mp13_str_i.c similarity index 100% rename from src/files/lang/mp13_str_i.c rename to src/files/lang/jap-final/mp13_str_i.c diff --git a/src/files/lang/mp13_str_s.c b/src/files/lang/jap-final/mp13_str_s.c similarity index 100% rename from src/files/lang/mp13_str_s.c rename to src/files/lang/jap-final/mp13_str_s.c diff --git a/src/files/lang/mp14E.c b/src/files/lang/jap-final/mp14E.c similarity index 100% rename from src/files/lang/mp14E.c rename to src/files/lang/jap-final/mp14E.c diff --git a/src/files/lang/mp14J.c b/src/files/lang/jap-final/mp14J.c similarity index 100% rename from src/files/lang/mp14J.c rename to src/files/lang/jap-final/mp14J.c diff --git a/src/files/lang/mp14P.c b/src/files/lang/jap-final/mp14P.c similarity index 100% rename from src/files/lang/mp14P.c rename to src/files/lang/jap-final/mp14P.c diff --git a/src/files/lang/mp14_str_f.c b/src/files/lang/jap-final/mp14_str_f.c similarity index 100% rename from src/files/lang/mp14_str_f.c rename to src/files/lang/jap-final/mp14_str_f.c diff --git a/src/files/lang/mp14_str_g.c b/src/files/lang/jap-final/mp14_str_g.c similarity index 100% rename from src/files/lang/mp14_str_g.c rename to src/files/lang/jap-final/mp14_str_g.c diff --git a/src/files/lang/mp14_str_i.c b/src/files/lang/jap-final/mp14_str_i.c similarity index 100% rename from src/files/lang/mp14_str_i.c rename to src/files/lang/jap-final/mp14_str_i.c diff --git a/src/files/lang/mp14_str_s.c b/src/files/lang/jap-final/mp14_str_s.c similarity index 100% rename from src/files/lang/mp14_str_s.c rename to src/files/lang/jap-final/mp14_str_s.c diff --git a/src/files/lang/mp15E.c b/src/files/lang/jap-final/mp15E.c similarity index 100% rename from src/files/lang/mp15E.c rename to src/files/lang/jap-final/mp15E.c diff --git a/src/files/lang/mp15J.c b/src/files/lang/jap-final/mp15J.c similarity index 100% rename from src/files/lang/mp15J.c rename to src/files/lang/jap-final/mp15J.c diff --git a/src/files/lang/mp15P.c b/src/files/lang/jap-final/mp15P.c similarity index 100% rename from src/files/lang/mp15P.c rename to src/files/lang/jap-final/mp15P.c diff --git a/src/files/lang/mp15_str_f.c b/src/files/lang/jap-final/mp15_str_f.c similarity index 100% rename from src/files/lang/mp15_str_f.c rename to src/files/lang/jap-final/mp15_str_f.c diff --git a/src/files/lang/mp15_str_g.c b/src/files/lang/jap-final/mp15_str_g.c similarity index 100% rename from src/files/lang/mp15_str_g.c rename to src/files/lang/jap-final/mp15_str_g.c diff --git a/src/files/lang/mp15_str_i.c b/src/files/lang/jap-final/mp15_str_i.c similarity index 100% rename from src/files/lang/mp15_str_i.c rename to src/files/lang/jap-final/mp15_str_i.c diff --git a/src/files/lang/mp15_str_s.c b/src/files/lang/jap-final/mp15_str_s.c similarity index 100% rename from src/files/lang/mp15_str_s.c rename to src/files/lang/jap-final/mp15_str_s.c diff --git a/src/files/lang/mp16E.c b/src/files/lang/jap-final/mp16E.c similarity index 100% rename from src/files/lang/mp16E.c rename to src/files/lang/jap-final/mp16E.c diff --git a/src/files/lang/mp16J.c b/src/files/lang/jap-final/mp16J.c similarity index 100% rename from src/files/lang/mp16J.c rename to src/files/lang/jap-final/mp16J.c diff --git a/src/files/lang/mp16P.c b/src/files/lang/jap-final/mp16P.c similarity index 100% rename from src/files/lang/mp16P.c rename to src/files/lang/jap-final/mp16P.c diff --git a/src/files/lang/mp16_str_f.c b/src/files/lang/jap-final/mp16_str_f.c similarity index 100% rename from src/files/lang/mp16_str_f.c rename to src/files/lang/jap-final/mp16_str_f.c diff --git a/src/files/lang/mp16_str_g.c b/src/files/lang/jap-final/mp16_str_g.c similarity index 100% rename from src/files/lang/mp16_str_g.c rename to src/files/lang/jap-final/mp16_str_g.c diff --git a/src/files/lang/mp16_str_i.c b/src/files/lang/jap-final/mp16_str_i.c similarity index 100% rename from src/files/lang/mp16_str_i.c rename to src/files/lang/jap-final/mp16_str_i.c diff --git a/src/files/lang/mp16_str_s.c b/src/files/lang/jap-final/mp16_str_s.c similarity index 100% rename from src/files/lang/mp16_str_s.c rename to src/files/lang/jap-final/mp16_str_s.c diff --git a/src/files/lang/mp17E.c b/src/files/lang/jap-final/mp17E.c similarity index 100% rename from src/files/lang/mp17E.c rename to src/files/lang/jap-final/mp17E.c diff --git a/src/files/lang/mp17J.c b/src/files/lang/jap-final/mp17J.c similarity index 100% rename from src/files/lang/mp17J.c rename to src/files/lang/jap-final/mp17J.c diff --git a/src/files/lang/mp17P.c b/src/files/lang/jap-final/mp17P.c similarity index 100% rename from src/files/lang/mp17P.c rename to src/files/lang/jap-final/mp17P.c diff --git a/src/files/lang/mp17_str_f.c b/src/files/lang/jap-final/mp17_str_f.c similarity index 100% rename from src/files/lang/mp17_str_f.c rename to src/files/lang/jap-final/mp17_str_f.c diff --git a/src/files/lang/mp17_str_g.c b/src/files/lang/jap-final/mp17_str_g.c similarity index 100% rename from src/files/lang/mp17_str_g.c rename to src/files/lang/jap-final/mp17_str_g.c diff --git a/src/files/lang/mp17_str_i.c b/src/files/lang/jap-final/mp17_str_i.c similarity index 100% rename from src/files/lang/mp17_str_i.c rename to src/files/lang/jap-final/mp17_str_i.c diff --git a/src/files/lang/mp17_str_s.c b/src/files/lang/jap-final/mp17_str_s.c similarity index 100% rename from src/files/lang/mp17_str_s.c rename to src/files/lang/jap-final/mp17_str_s.c diff --git a/src/files/lang/mp18E.c b/src/files/lang/jap-final/mp18E.c similarity index 100% rename from src/files/lang/mp18E.c rename to src/files/lang/jap-final/mp18E.c diff --git a/src/files/lang/mp18J.c b/src/files/lang/jap-final/mp18J.c similarity index 100% rename from src/files/lang/mp18J.c rename to src/files/lang/jap-final/mp18J.c diff --git a/src/files/lang/mp18P.c b/src/files/lang/jap-final/mp18P.c similarity index 100% rename from src/files/lang/mp18P.c rename to src/files/lang/jap-final/mp18P.c diff --git a/src/files/lang/mp18_str_f.c b/src/files/lang/jap-final/mp18_str_f.c similarity index 100% rename from src/files/lang/mp18_str_f.c rename to src/files/lang/jap-final/mp18_str_f.c diff --git a/src/files/lang/mp18_str_g.c b/src/files/lang/jap-final/mp18_str_g.c similarity index 100% rename from src/files/lang/mp18_str_g.c rename to src/files/lang/jap-final/mp18_str_g.c diff --git a/src/files/lang/mp18_str_i.c b/src/files/lang/jap-final/mp18_str_i.c similarity index 100% rename from src/files/lang/mp18_str_i.c rename to src/files/lang/jap-final/mp18_str_i.c diff --git a/src/files/lang/mp18_str_s.c b/src/files/lang/jap-final/mp18_str_s.c similarity index 100% rename from src/files/lang/mp18_str_s.c rename to src/files/lang/jap-final/mp18_str_s.c diff --git a/src/files/lang/mp19E.c b/src/files/lang/jap-final/mp19E.c similarity index 100% rename from src/files/lang/mp19E.c rename to src/files/lang/jap-final/mp19E.c diff --git a/src/files/lang/mp19J.c b/src/files/lang/jap-final/mp19J.c similarity index 100% rename from src/files/lang/mp19J.c rename to src/files/lang/jap-final/mp19J.c diff --git a/src/files/lang/mp19P.c b/src/files/lang/jap-final/mp19P.c similarity index 100% rename from src/files/lang/mp19P.c rename to src/files/lang/jap-final/mp19P.c diff --git a/src/files/lang/mp19_str_f.c b/src/files/lang/jap-final/mp19_str_f.c similarity index 100% rename from src/files/lang/mp19_str_f.c rename to src/files/lang/jap-final/mp19_str_f.c diff --git a/src/files/lang/mp19_str_g.c b/src/files/lang/jap-final/mp19_str_g.c similarity index 100% rename from src/files/lang/mp19_str_g.c rename to src/files/lang/jap-final/mp19_str_g.c diff --git a/src/files/lang/mp19_str_i.c b/src/files/lang/jap-final/mp19_str_i.c similarity index 100% rename from src/files/lang/mp19_str_i.c rename to src/files/lang/jap-final/mp19_str_i.c diff --git a/src/files/lang/mp19_str_s.c b/src/files/lang/jap-final/mp19_str_s.c similarity index 100% rename from src/files/lang/mp19_str_s.c rename to src/files/lang/jap-final/mp19_str_s.c diff --git a/src/files/lang/mp1E.c b/src/files/lang/jap-final/mp1E.c similarity index 100% rename from src/files/lang/mp1E.c rename to src/files/lang/jap-final/mp1E.c diff --git a/src/files/lang/mp1J.c b/src/files/lang/jap-final/mp1J.c similarity index 100% rename from src/files/lang/mp1J.c rename to src/files/lang/jap-final/mp1J.c diff --git a/src/files/lang/mp1P.c b/src/files/lang/jap-final/mp1P.c similarity index 100% rename from src/files/lang/mp1P.c rename to src/files/lang/jap-final/mp1P.c diff --git a/src/files/lang/mp1_str_f.c b/src/files/lang/jap-final/mp1_str_f.c similarity index 100% rename from src/files/lang/mp1_str_f.c rename to src/files/lang/jap-final/mp1_str_f.c diff --git a/src/files/lang/mp1_str_g.c b/src/files/lang/jap-final/mp1_str_g.c similarity index 100% rename from src/files/lang/mp1_str_g.c rename to src/files/lang/jap-final/mp1_str_g.c diff --git a/src/files/lang/mp1_str_i.c b/src/files/lang/jap-final/mp1_str_i.c similarity index 100% rename from src/files/lang/mp1_str_i.c rename to src/files/lang/jap-final/mp1_str_i.c diff --git a/src/files/lang/mp1_str_s.c b/src/files/lang/jap-final/mp1_str_s.c similarity index 100% rename from src/files/lang/mp1_str_s.c rename to src/files/lang/jap-final/mp1_str_s.c diff --git a/src/files/lang/mp20E.c b/src/files/lang/jap-final/mp20E.c similarity index 100% rename from src/files/lang/mp20E.c rename to src/files/lang/jap-final/mp20E.c diff --git a/src/files/lang/mp20J.c b/src/files/lang/jap-final/mp20J.c similarity index 100% rename from src/files/lang/mp20J.c rename to src/files/lang/jap-final/mp20J.c diff --git a/src/files/lang/mp20P.c b/src/files/lang/jap-final/mp20P.c similarity index 100% rename from src/files/lang/mp20P.c rename to src/files/lang/jap-final/mp20P.c diff --git a/src/files/lang/mp20_str_f.c b/src/files/lang/jap-final/mp20_str_f.c similarity index 100% rename from src/files/lang/mp20_str_f.c rename to src/files/lang/jap-final/mp20_str_f.c diff --git a/src/files/lang/mp20_str_g.c b/src/files/lang/jap-final/mp20_str_g.c similarity index 100% rename from src/files/lang/mp20_str_g.c rename to src/files/lang/jap-final/mp20_str_g.c diff --git a/src/files/lang/mp20_str_i.c b/src/files/lang/jap-final/mp20_str_i.c similarity index 100% rename from src/files/lang/mp20_str_i.c rename to src/files/lang/jap-final/mp20_str_i.c diff --git a/src/files/lang/mp20_str_s.c b/src/files/lang/jap-final/mp20_str_s.c similarity index 100% rename from src/files/lang/mp20_str_s.c rename to src/files/lang/jap-final/mp20_str_s.c diff --git a/src/files/lang/mp2E.c b/src/files/lang/jap-final/mp2E.c similarity index 100% rename from src/files/lang/mp2E.c rename to src/files/lang/jap-final/mp2E.c diff --git a/src/files/lang/mp2J.c b/src/files/lang/jap-final/mp2J.c similarity index 100% rename from src/files/lang/mp2J.c rename to src/files/lang/jap-final/mp2J.c diff --git a/src/files/lang/mp2P.c b/src/files/lang/jap-final/mp2P.c similarity index 100% rename from src/files/lang/mp2P.c rename to src/files/lang/jap-final/mp2P.c diff --git a/src/files/lang/mp2_str_f.c b/src/files/lang/jap-final/mp2_str_f.c similarity index 100% rename from src/files/lang/mp2_str_f.c rename to src/files/lang/jap-final/mp2_str_f.c diff --git a/src/files/lang/mp2_str_g.c b/src/files/lang/jap-final/mp2_str_g.c similarity index 100% rename from src/files/lang/mp2_str_g.c rename to src/files/lang/jap-final/mp2_str_g.c diff --git a/src/files/lang/mp2_str_i.c b/src/files/lang/jap-final/mp2_str_i.c similarity index 100% rename from src/files/lang/mp2_str_i.c rename to src/files/lang/jap-final/mp2_str_i.c diff --git a/src/files/lang/mp2_str_s.c b/src/files/lang/jap-final/mp2_str_s.c similarity index 100% rename from src/files/lang/mp2_str_s.c rename to src/files/lang/jap-final/mp2_str_s.c diff --git a/src/files/lang/mp3E.c b/src/files/lang/jap-final/mp3E.c similarity index 100% rename from src/files/lang/mp3E.c rename to src/files/lang/jap-final/mp3E.c diff --git a/src/files/lang/mp3J.c b/src/files/lang/jap-final/mp3J.c similarity index 100% rename from src/files/lang/mp3J.c rename to src/files/lang/jap-final/mp3J.c diff --git a/src/files/lang/mp3P.c b/src/files/lang/jap-final/mp3P.c similarity index 100% rename from src/files/lang/mp3P.c rename to src/files/lang/jap-final/mp3P.c diff --git a/src/files/lang/mp3_str_f.c b/src/files/lang/jap-final/mp3_str_f.c similarity index 100% rename from src/files/lang/mp3_str_f.c rename to src/files/lang/jap-final/mp3_str_f.c diff --git a/src/files/lang/mp3_str_g.c b/src/files/lang/jap-final/mp3_str_g.c similarity index 100% rename from src/files/lang/mp3_str_g.c rename to src/files/lang/jap-final/mp3_str_g.c diff --git a/src/files/lang/mp3_str_i.c b/src/files/lang/jap-final/mp3_str_i.c similarity index 100% rename from src/files/lang/mp3_str_i.c rename to src/files/lang/jap-final/mp3_str_i.c diff --git a/src/files/lang/mp3_str_s.c b/src/files/lang/jap-final/mp3_str_s.c similarity index 100% rename from src/files/lang/mp3_str_s.c rename to src/files/lang/jap-final/mp3_str_s.c diff --git a/src/files/lang/mp4E.c b/src/files/lang/jap-final/mp4E.c similarity index 100% rename from src/files/lang/mp4E.c rename to src/files/lang/jap-final/mp4E.c diff --git a/src/files/lang/mp4J.c b/src/files/lang/jap-final/mp4J.c similarity index 100% rename from src/files/lang/mp4J.c rename to src/files/lang/jap-final/mp4J.c diff --git a/src/files/lang/mp4P.c b/src/files/lang/jap-final/mp4P.c similarity index 100% rename from src/files/lang/mp4P.c rename to src/files/lang/jap-final/mp4P.c diff --git a/src/files/lang/mp4_str_f.c b/src/files/lang/jap-final/mp4_str_f.c similarity index 100% rename from src/files/lang/mp4_str_f.c rename to src/files/lang/jap-final/mp4_str_f.c diff --git a/src/files/lang/mp4_str_g.c b/src/files/lang/jap-final/mp4_str_g.c similarity index 100% rename from src/files/lang/mp4_str_g.c rename to src/files/lang/jap-final/mp4_str_g.c diff --git a/src/files/lang/mp4_str_i.c b/src/files/lang/jap-final/mp4_str_i.c similarity index 100% rename from src/files/lang/mp4_str_i.c rename to src/files/lang/jap-final/mp4_str_i.c diff --git a/src/files/lang/mp4_str_s.c b/src/files/lang/jap-final/mp4_str_s.c similarity index 100% rename from src/files/lang/mp4_str_s.c rename to src/files/lang/jap-final/mp4_str_s.c diff --git a/src/files/lang/mp5E.c b/src/files/lang/jap-final/mp5E.c similarity index 100% rename from src/files/lang/mp5E.c rename to src/files/lang/jap-final/mp5E.c diff --git a/src/files/lang/mp5J.c b/src/files/lang/jap-final/mp5J.c similarity index 100% rename from src/files/lang/mp5J.c rename to src/files/lang/jap-final/mp5J.c diff --git a/src/files/lang/mp5P.c b/src/files/lang/jap-final/mp5P.c similarity index 100% rename from src/files/lang/mp5P.c rename to src/files/lang/jap-final/mp5P.c diff --git a/src/files/lang/mp5_str_f.c b/src/files/lang/jap-final/mp5_str_f.c similarity index 100% rename from src/files/lang/mp5_str_f.c rename to src/files/lang/jap-final/mp5_str_f.c diff --git a/src/files/lang/mp5_str_g.c b/src/files/lang/jap-final/mp5_str_g.c similarity index 100% rename from src/files/lang/mp5_str_g.c rename to src/files/lang/jap-final/mp5_str_g.c diff --git a/src/files/lang/mp5_str_i.c b/src/files/lang/jap-final/mp5_str_i.c similarity index 100% rename from src/files/lang/mp5_str_i.c rename to src/files/lang/jap-final/mp5_str_i.c diff --git a/src/files/lang/mp5_str_s.c b/src/files/lang/jap-final/mp5_str_s.c similarity index 100% rename from src/files/lang/mp5_str_s.c rename to src/files/lang/jap-final/mp5_str_s.c diff --git a/src/files/lang/mp6E.c b/src/files/lang/jap-final/mp6E.c similarity index 100% rename from src/files/lang/mp6E.c rename to src/files/lang/jap-final/mp6E.c diff --git a/src/files/lang/mp6J.c b/src/files/lang/jap-final/mp6J.c similarity index 100% rename from src/files/lang/mp6J.c rename to src/files/lang/jap-final/mp6J.c diff --git a/src/files/lang/mp6P.c b/src/files/lang/jap-final/mp6P.c similarity index 100% rename from src/files/lang/mp6P.c rename to src/files/lang/jap-final/mp6P.c diff --git a/src/files/lang/mp6_str_f.c b/src/files/lang/jap-final/mp6_str_f.c similarity index 100% rename from src/files/lang/mp6_str_f.c rename to src/files/lang/jap-final/mp6_str_f.c diff --git a/src/files/lang/mp6_str_g.c b/src/files/lang/jap-final/mp6_str_g.c similarity index 100% rename from src/files/lang/mp6_str_g.c rename to src/files/lang/jap-final/mp6_str_g.c diff --git a/src/files/lang/mp6_str_i.c b/src/files/lang/jap-final/mp6_str_i.c similarity index 100% rename from src/files/lang/mp6_str_i.c rename to src/files/lang/jap-final/mp6_str_i.c diff --git a/src/files/lang/mp6_str_s.c b/src/files/lang/jap-final/mp6_str_s.c similarity index 100% rename from src/files/lang/mp6_str_s.c rename to src/files/lang/jap-final/mp6_str_s.c diff --git a/src/files/lang/mp7E.c b/src/files/lang/jap-final/mp7E.c similarity index 100% rename from src/files/lang/mp7E.c rename to src/files/lang/jap-final/mp7E.c diff --git a/src/files/lang/mp7J.c b/src/files/lang/jap-final/mp7J.c similarity index 100% rename from src/files/lang/mp7J.c rename to src/files/lang/jap-final/mp7J.c diff --git a/src/files/lang/mp7P.c b/src/files/lang/jap-final/mp7P.c similarity index 100% rename from src/files/lang/mp7P.c rename to src/files/lang/jap-final/mp7P.c diff --git a/src/files/lang/mp7_str_f.c b/src/files/lang/jap-final/mp7_str_f.c similarity index 100% rename from src/files/lang/mp7_str_f.c rename to src/files/lang/jap-final/mp7_str_f.c diff --git a/src/files/lang/mp7_str_g.c b/src/files/lang/jap-final/mp7_str_g.c similarity index 100% rename from src/files/lang/mp7_str_g.c rename to src/files/lang/jap-final/mp7_str_g.c diff --git a/src/files/lang/mp7_str_i.c b/src/files/lang/jap-final/mp7_str_i.c similarity index 100% rename from src/files/lang/mp7_str_i.c rename to src/files/lang/jap-final/mp7_str_i.c diff --git a/src/files/lang/mp7_str_s.c b/src/files/lang/jap-final/mp7_str_s.c similarity index 100% rename from src/files/lang/mp7_str_s.c rename to src/files/lang/jap-final/mp7_str_s.c diff --git a/src/files/lang/mp8E.c b/src/files/lang/jap-final/mp8E.c similarity index 100% rename from src/files/lang/mp8E.c rename to src/files/lang/jap-final/mp8E.c diff --git a/src/files/lang/mp8J.c b/src/files/lang/jap-final/mp8J.c similarity index 100% rename from src/files/lang/mp8J.c rename to src/files/lang/jap-final/mp8J.c diff --git a/src/files/lang/mp8P.c b/src/files/lang/jap-final/mp8P.c similarity index 100% rename from src/files/lang/mp8P.c rename to src/files/lang/jap-final/mp8P.c diff --git a/src/files/lang/mp8_str_f.c b/src/files/lang/jap-final/mp8_str_f.c similarity index 100% rename from src/files/lang/mp8_str_f.c rename to src/files/lang/jap-final/mp8_str_f.c diff --git a/src/files/lang/mp8_str_g.c b/src/files/lang/jap-final/mp8_str_g.c similarity index 100% rename from src/files/lang/mp8_str_g.c rename to src/files/lang/jap-final/mp8_str_g.c diff --git a/src/files/lang/mp8_str_i.c b/src/files/lang/jap-final/mp8_str_i.c similarity index 100% rename from src/files/lang/mp8_str_i.c rename to src/files/lang/jap-final/mp8_str_i.c diff --git a/src/files/lang/mp8_str_s.c b/src/files/lang/jap-final/mp8_str_s.c similarity index 100% rename from src/files/lang/mp8_str_s.c rename to src/files/lang/jap-final/mp8_str_s.c diff --git a/src/files/lang/mp9E.c b/src/files/lang/jap-final/mp9E.c similarity index 100% rename from src/files/lang/mp9E.c rename to src/files/lang/jap-final/mp9E.c diff --git a/src/files/lang/mp9J.c b/src/files/lang/jap-final/mp9J.c similarity index 100% rename from src/files/lang/mp9J.c rename to src/files/lang/jap-final/mp9J.c diff --git a/src/files/lang/mp9P.c b/src/files/lang/jap-final/mp9P.c similarity index 100% rename from src/files/lang/mp9P.c rename to src/files/lang/jap-final/mp9P.c diff --git a/src/files/lang/mp9_str_f.c b/src/files/lang/jap-final/mp9_str_f.c similarity index 100% rename from src/files/lang/mp9_str_f.c rename to src/files/lang/jap-final/mp9_str_f.c diff --git a/src/files/lang/mp9_str_g.c b/src/files/lang/jap-final/mp9_str_g.c similarity index 100% rename from src/files/lang/mp9_str_g.c rename to src/files/lang/jap-final/mp9_str_g.c diff --git a/src/files/lang/mp9_str_i.c b/src/files/lang/jap-final/mp9_str_i.c similarity index 100% rename from src/files/lang/mp9_str_i.c rename to src/files/lang/jap-final/mp9_str_i.c diff --git a/src/files/lang/mp9_str_s.c b/src/files/lang/jap-final/mp9_str_s.c similarity index 100% rename from src/files/lang/mp9_str_s.c rename to src/files/lang/jap-final/mp9_str_s.c diff --git a/src/files/lang/mpmenuE.c b/src/files/lang/jap-final/mpmenuE.c similarity index 100% rename from src/files/lang/mpmenuE.c rename to src/files/lang/jap-final/mpmenuE.c diff --git a/src/files/lang/jap-final/mpmenuJ.c b/src/files/lang/jap-final/mpmenuJ.c new file mode 100644 index 000000000..55aaf4c3f --- /dev/null +++ b/src/files/lang/jap-final/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "羅漕コ\n", + /* 1*/ "⌒⊂ォナべ⇔†タ\n", + /* 2*/ "ロd♀マサシ\n", + /* 3*/ "ロd♀コ\n", + /* 4*/ "キべシ┳\n", + /* 5*/ "≧、∃ナ\n", + /* 6*/ "ヨdロdマ\n", + /* 7*/ "べ∨√ニ∫\n", + /* 8*/ "く⌒ク\n", + /* 9*/ "┠ノフマ艪Ыn", + /* 10*/ "ιょ\n", + /* 11*/ "gミ゚ハユd\n", + /* 12*/ "く⌒セ饅n", + /* 13*/ "く⌒┠Κタ\n", + /* 14*/ "嫡アンマほナ∨\n", + /* 15*/ "塘アンマほナ∨\n", + /* 16*/ "売アンマほナ∨\n", + /* 17*/ "dヌ\n", + /* 18*/ "dヌメd♀\n", + /* 19*/ "d\n", + /* 20*/ "ミd臀n", + /* 21*/ "ヤ£ロヘマ\n", + /* 22*/ "烽о\n", + /* 23*/ "メネ#マ\n", + /* 24*/ "ハ綵n", + /* 25*/ "ロフマ綵n", + /* 26*/ "dヌメンd″\n", + /* 27*/ "d∈∂⊥≫\n", + /* 28*/ "ソ┳ヌ\n", + /* 29*/ "ソ┳ヌメd♀\n", + /* 30*/ "轤о\n", + /* 31*/ "ヨヒラ゚d\n", + /* 32*/ "騾マ♂ニ\n", + /* 33*/ "宴ロヌ\n", + /* 34*/ "ソ┳ヌヤ£ロヘマ\n", + /* 35*/ "ワ竄о゚ワ\n", + /* 36*/ "dラリ\n", + /* 37*/ "d∈メツ≫\n", + /* 38*/ "ソ┳ヌメンd″\n", + /* 39*/ "ソ┳ヌメル¢d\n", + /* 40*/ "∧メ禄n", + /* 41*/ "レメマ♀縲ハラ\n", + /* 42*/ "烽о轤о\n", + /* 43*/ "怕タ\n", + /* 44*/ "ぐけ\n", + /* 45*/ "シナ\n", + /* 46*/ "揩メメセ\n", + /* 47*/ "揩メメ\n", + /* 48*/ "マ≧\n", + /* 49*/ "烙ヒマ≠\n", + /* 50*/ "烙ヒマ≠d♀\n", + /* 51*/ "烙ヒマ≠∈∂⊥≫\n", + /* 52*/ "d∈∂⊥≫\n", + /* 53*/ "┨ふマd∈\n∂⊥リニ∩タ\n", + /* 54*/ "∂⊥≫\n", + /* 55*/ "ヨヒマン\n", + /* 56*/ "%s\n", + /* 57*/ "ィ、\n", + /* 58*/ "ヨヒマン\n", + /* 59*/ "烽о轤о\n", + /* 60*/ "ゅ≫\n", + /* 61*/ "烽о轤оメぬね\n", + /* 62*/ "レメマ♀縲ハラ\n", + /* 63*/ "οリメチセ\n", + /* 64*/ "ヤ蛛朽ワ\n", + /* 65*/ "ゅ≫\n", + /* 66*/ "ヤ蛛朽ワ\n", + /* 67*/ "マ≧\n", + /* 68*/ "チメツテ\n", + /* 69*/ "チメツテ\n", + /* 70*/ "烽оヌ\n", + /* 71*/ "烽оqィァ\n", + /* 72*/ "烽оセ\n", + /* 73*/ "ヤd縲烽о\n", + /* 74*/ "ゅ≫\n", + /* 75*/ "ヤd縲烽о\n", + /* 76*/ "逐烽о\n", + /* 77*/ "凍烽о\n", + /* 78*/ "楳烽о\n", + /* 79*/ "くθ烽о\n", + /* 80*/ "£ムdロフ\n", + /* 81*/ "£ムd劇ロフ\n", + /* 82*/ "ヨヒマン\n", + /* 83*/ "ロフマ繙ヌ\n", + /* 84*/ "ロフマ縺メト藹n", + /* 85*/ "操セ\n", + /* 86*/ "逐セ\n", + /* 87*/ "凍セ\n", + /* 88*/ "楳セ\n", + /* 89*/ "斧セ\n", + /* 90*/ "摩セ\n", + /* 91*/ "沃セ\n", + /* 92*/ "セ\n", + /* 93*/ "ュ⇔ヱニ\n", + /* 94*/ "ゅ≫\n", + /* 95*/ "コトぬねセ\n", + /* 96*/ "゚ム£ぬねセ\n", + /* 97*/ "ヨヒラ゚dセ\n", + /* 98*/ "テメロフ∈ヱニ\n", + /* 99*/ "ゅ≫\n", + /*100*/ "ヨヒラ゚d\n", + /*101*/ "ロフマ縺メト藹n", + /*102*/ "ロフマ縺メぬね\n", + /*103*/ "閧о゚ム£\n", + /*104*/ "ワ%ロピム£\n", + /*105*/ "├ヮエ\n", + /*106*/ "氏セら¬フト⊇\n", + /*107*/ "ハ繧ハね\n", + /*108*/ "゚ム\n", + /*109*/ "ソ┳Ηπ\n", + /*110*/ "ナマゅニ\n", + /*111*/ "ゅ≫\n", + /*112*/ "シl\n", + /*113*/ "%d\n", + /*114*/ "%d 禄n", + /*115*/ "ミd臀n", + /*116*/ "$dネラ縺dラ\n", + /*117*/ "ラロハラ\n", + /*118*/ "マ≧\n", + /*119*/ "ワリ≧d", + /*120*/ "$ム£", + /*121*/ "ニ┤x", + /*122*/ "普劇", + /*123*/ "フь", + /*124*/ "モハ", + /*125*/ "ハ♀", + /*126*/ "", + /*127*/ "モミ斧", + /*128*/ "┤x", + /*129*/ "゚ヒ", + /*130*/ "$′ヤマ", + /*131*/ "ヨ", + /*132*/ "$dヨマ", + /*133*/ "f", + /*134*/ "", + /*135*/ "aリ", + /*136*/ "マ≧", + /*137*/ "ソ┳ヌメd♀\n", + /*138*/ "宦準゚マ♭ヨヒマン\n", + /*139*/ "dヌメd♀\n", + /*140*/ "%sセ準dセ%s準準ミd艢セ%s準準ロフマ縲セ%d", + /*141*/ "£ンハ綵n", + /*142*/ "£ムd轤о\n", + /*143*/ "ヨヒラ゚d\n", + /*144*/ "ハ♀メd♀\n", + /*145*/ "%s\n", + /*146*/ "ほナ∨氣ヌ\n", + /*147*/ "ほ√∨氣ヌ\n", + /*148*/ "氛ホ驍劫・\n", + /*149*/ "ネo黴ハ綵n", + /*150*/ "麾ロヘハ繙ヌ\n", + /*151*/ "煤d≠\n", + /*152*/ "ゐ≧d≠\n", + /*153*/ "氈逐ムヌ\n", + /*154*/ "气セ竊ヌ\n", + /*155*/ "氓qヌ\n", + /*156*/ "气唐\n", + /*157*/ "氛ィてノフ\n", + /*158*/ "ハΗ≧\n", + /*159*/ "準純驍劫・ヒ\n", + /*160*/ "準純漕ヒ\n", + /*161*/ "準醇フほヒ\n", + /*162*/ "準純ィヨヒ\n", + /*163*/ "⊆∃∨メヘレ\n", + /*164*/ "ゅ≫\n", + /*165*/ "ラミリホ\n", + /*166*/ "ゅ≫\n", + /*167*/ "ソ┳ヌヤ£ロヘマ\n", + /*168*/ "ミム窶メコр\n", + /*169*/ "┳メコр\n", + /*170*/ "┳マ烽оユd\n", + /*171*/ "d≧d\n", + /*172*/ "ゅ≫\n", + /*173*/ "メネ#マ\n", + /*174*/ "ンハ綵n", + /*175*/ "ンハ繧糸藹n", + /*176*/ "曾n", + /*177*/ "箪n", + /*178*/ "貼n", + /*179*/ "能n", + /*180*/ "表n", + /*181*/ "暴n", + /*182*/ "ゅ≫\n", + /*183*/ "dヌメンd″\n", + /*184*/ "ヒミタナリニ∩タ\n", + /*185*/ "ヒミタニ≫\n", + /*186*/ "シ掾メぬね\n", + /*187*/ "ンd″ナ∃⊇\n", + /*188*/ "ナムシメb\n", + /*189*/ "dヌメナム\\205シ∈bナ⇔フト⊇\n", + /*190*/ "せどナ⇔フト⊇\n", + /*191*/ "ソ┳ヌナムモ\n⊇⇒⌒翌トτマ\nねルト√⇔⊇リニツ\n", + /*192*/ "ル¢d∈ロ≪リニ∩タ\n", + /*193*/ "ムムモ\n", + /*194*/ "騾ム\n", + /*195*/ "d∈メツ≫\n", + /*196*/ "┨ふマd∈\nメツリニ∩タ\n", + /*197*/ "d∈メツ≫\n", + /*198*/ "ヨヒマン\n", + /*199*/ "宴ロヌ\n", + /*200*/ "宴ロd♀\n", + /*201*/ "ムπ┴てメヒフメ\n", + /*202*/ "翌ト揩ヤムπ\n", + /*203*/ "ネメ∇√\n", + /*204*/ "翌トろ├\n", + /*205*/ "ろ├ヌ\n", + /*206*/ "ろ├メモ予n", + /*207*/ "ろ├∈ケマモ予n", + /*208*/ "<d宦メモ予n", + /*209*/ "、ヌメモ予n", + /*210*/ "の┸d♀モ予n", + /*211*/ "%ムマ縺盾о\n", + /*212*/ "ゅ≫\n", + /*213*/ "d♀\n", + /*214*/ "磨瘋ヤ⊃\n", + /*215*/ "ルマ°ハ綵n", + /*216*/ "リdワ曾n", + /*217*/ "騾ハヨマ\n", + /*218*/ "ヤ蛛黶エテ\n", + /*219*/ "宦畚n", + /*220*/ "リdワ箪n", + /*221*/ "它ィア\n", + /*222*/ "cべョ曾n", + /*223*/ "ワd\n", + /*224*/ "゙┴て\n", + /*225*/ "烽оユd°d\n", + /*226*/ "d≧dシワ\n", + /*227*/ "翌トろ├シワ\n", + /*228*/ "┳メコрシワ\n", + /*229*/ "ミム窶コрシワ\n", + /*230*/ "゚dハ縺メコр\n", + /*231*/ "゚d艢メコр\n", + /*232*/ "BOXメd≧dモ予n", + /*233*/ "メd≧dモ予n", + /*234*/ "メ┴て\n", + /*235*/ "ンヌ\n", + /*236*/ "d≧dマモ予n", + /*237*/ "リdワメコр\n", + /*238*/ "d≧dマモ予n", + /*239*/ "ゅ≫\n", + /*240*/ "ヤ\n", + /*241*/ "コ\n", + /*242*/ "\n", + /*243*/ "d\n", + /*244*/ "ソ┳ス烽оqユヨ\n", + /*245*/ "烽оqメル\n", + /*246*/ "ルマ°ハ", + /*247*/ "ミ゚ハロフリdワ", + /*248*/ "騾ハヨマ", + /*249*/ "ヤ蛛黶エテ", + /*250*/ "宦", + /*251*/ "ミ゚ハロフリdワ", + /*252*/ "它ィア゚ハ", + /*253*/ "ルマ°ハ", + /*254*/ "リdワ", + /*255*/ "騾ハヨマ", + /*256*/ "ヤ蛛黶エテ", + /*257*/ "宦", + /*258*/ "リdワ", + /*259*/ "它ィア", + /*260*/ "dヤd°d\n", + /*261*/ "\n", + /*262*/ "cと≡チエ∨の┸セ\n", + /*263*/ "ミd♀セ\n", + /*264*/ "槽ネ\n", + /*265*/ "着ネ\n", + /*266*/ "套ネ\n", + /*267*/ "賠ネ\n", + /*268*/ "腐ネ\n", + /*269*/ "妹ネ\n", + /*270*/ "羅ネ\n", + /*271*/ "ネ\n", + /*272*/ "刔ネ\n", + /*273*/ "操水ネ\n", + /*274*/ "操槽ネ\n", + /*275*/ "操着ネ\n", + /*276*/ "マヨマ\n", + /*277*/ "ほ√∨ヌ\n", + /*278*/ "Ηπ\n", + /*279*/ "烽оマヨマ\n", + /*280*/ "%s", + /*281*/ "羅漕ヌ\n", + /*282*/ "ほト√∨\n", + /*283*/ "ほナ∨\n", + /*284*/ "ぷ¬Σ\n", + /*285*/ "dルマ縲d\n", + /*286*/ "£ムンセ\n", + /*287*/ "dウ\n", + /*288*/ "#d<ニ≫\n", + /*289*/ "#d<f\n", + /*290*/ "dウ\n", + /*291*/ "≡∽ナ⊇♭ニ∩タ\n", + /*292*/ "ヨヒマン\n", + /*293*/ "dウ\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "宦準゚マ♭ゅ≫\n", + /*415*/ "私チハメムマノdロヘマ\n", + /*416*/ "縲d蛟マ\n", + /*417*/ "♂°ムワワ綵n", + /*418*/ "ムマノdロヘマ\n", + /*419*/ "リdロヘマ\n", + /*420*/ "ロマ\n", + /*421*/ "£ニd\n", + /*422*/ "∧メ\n", + /*423*/ "縲d蛟マリホ\n", + /*424*/ "辜ャ唐セ\n", + /*425*/ "ホ死エ\n", + /*426*/ "あホ死エ\n", + /*427*/ "ィ、\n", + /*428*/ "だツ≫\n", + /*429*/ "ヨヒマン\n", + /*430*/ "∂⊥≫\n", + /*431*/ "£ニd\n", + /*432*/ "シ捩セ\n", + /*433*/ "漕ヨセ\n", + /*434*/ "ラリセ\n", + /*435*/ "宦準゚マ♭ゅ≫\n", + /*436*/ "烽о縲蛟フd\n", + /*437*/ "ヵ<ノυ∈φュマィ麾氓气吹リニツ\n", + /*438*/ "ヨヒマン\n", + /*439*/ "″マ<\n", + /*440*/ "ロ°d\n", + /*441*/ "÷d♀\n", + /*442*/ "ィ諠ャ\n", + /*443*/ "ィ諠ャセ\n", + /*444*/ "ィ諠ャツテセ\n", + /*445*/ "準十n", + /*446*/ "メネ#マ\n", + /*447*/ "縲d蛟マn藹n", + /*448*/ "縲d蛟マルン\n", + /*449*/ "ホ死エ\n", + /*450*/ "Ηπセ\n", + /*451*/ "╋τばぱヌセ\n", + /*452*/ "ィ諠ャセ\n", + /*453*/ "辜ャ唐セ\n", + /*454*/ "メネ#マセ\n", + /*455*/ "驍劫・セ\n", + /*456*/ "んナ⇔∃⊇\n", + /*457*/ "、磨綵n", + /*458*/ "ン磨綵n", + /*459*/ "Ηπあレ\n", + /*460*/ "驍劫・あレ\n", + /*461*/ "ンマ゚d\n", + /*462*/ "≦dマ曾n", + /*463*/ "≦dマ箪n", + /*464*/ "≦dマ貼n", + /*465*/ "麾黴ハ綵n", + /*466*/ "ササΗπササ\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "、メlセ\n", + /*472*/ "ンメlセ\n", + /*473*/ "く怎驍劫・セ\n", + /*474*/ "゚dハ縲セ\n", + /*475*/ "Ηπセ\n", + /*476*/ "烽о綵n", + /*477*/ "\n", + /*478*/ "サiサ\n", + /*479*/ "烽о縺クィァマナ⇔⊇≫モ\nd∈けマす⊥≫テ∀モ\nぁヰリヌ∋ツ\n", + /*480*/ "ィ、\n", + /*481*/ "ヨヒマン\n", + /*482*/ "Player %d: ", + /*483*/ "ワ゚d縲エ\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "ルマ縲d$ハラ\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "烙ネハラm蚕n", +}; diff --git a/src/files/lang/jap-final/mpmenuP.c b/src/files/lang/jap-final/mpmenuP.c new file mode 100644 index 000000000..9cffad023 --- /dev/null +++ b/src/files/lang/jap-final/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Colour\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_f.c b/src/files/lang/jap-final/mpmenu_str_f.c new file mode 100644 index 000000000..a654639cf --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Super suicidaire\n", + /* 1*/ "Munitions? O?\n", + /* 2*/ "Le moins prot馮饅n", + /* 3*/ "Le mieux prot馮饅n", + /* 4*/ "Tireur d'駘ite\n", + /* 5*/ "Le plus pro\n", + /* 6*/ "Le plus meurtrier\n", + /* 7*/ "Le plus inoffensif\n", + /* 8*/ "Le plus p騁ochard\n", + /* 9*/ "Le plus dingue\n", + /* 10*/ "Le plus loyal\n", + /* 11*/ "Le plus fourbe\n", + /* 12*/ "Dur馥 de vie Mini\n", + /* 13*/ "Dur馥de vie Maxi\n", + /* 14*/ "Double frag\n", + /* 15*/ "Triple frag\n", + /* 16*/ "Quadruple frag\n", + /* 17*/ "Param鑼res jeu\n", + /* 18*/ "Charger param.\n", + /* 19*/ "Sc駭ario\n", + /* 20*/ "Ar鈩es\n", + /* 21*/ "Options\n", + /* 22*/ "Equipes\n", + /* 23*/ "Armes\n", + /* 24*/ "Limites\n", + /* 25*/ "Simulants\n", + /* 26*/ "Sauver param.\n", + /* 27*/ "Abandonner\n", + /* 28*/ "Param. joueur\n", + /* 29*/ "Charger joueur\n", + /* 30*/ "Nom\n", + /* 31*/ "Personnages\n", + /* 32*/ "Handicap\n", + /* 33*/ "Manipulations\n", + /* 34*/ "Options joueur\n", + /* 35*/ "Statistiques\n", + /* 36*/ "Commencer jeu\n", + /* 37*/ "Arr黎er\n", + /* 38*/ "Sauver joueur\n", + /* 39*/ "Sauv. copie joueur\n", + /* 40*/ "Trucs\n", + /* 41*/ "Musique\n", + /* 42*/ "Noms 駲uipes\n", + /* 43*/ "Ratio\n", + /* 44*/ "Verrou\n", + /* 45*/ "Aucun\n", + /* 46*/ "Vainq.\n", + /* 47*/ "Perd.\n", + /* 48*/ "Hasard\n", + /* 49*/ "Challenge\n", + /* 50*/ "Challenges combat\n", + /* 51*/ "Abandonner Challenge\n", + /* 52*/ "Abandonner\n", + /* 53*/ "Voulez-vous vraiment\nabandonner la partie?\n", + /* 54*/ "Abandonner\n", + /* 55*/ "Retour\n", + /* 56*/ "%s\n", + /* 57*/ "Accepter\n", + /* 58*/ "Retour\n", + /* 59*/ "Noms 駲uipes\n", + /* 60*/ "Retour\n", + /* 61*/ "Changer nom 駲uipe\n", + /* 62*/ "Musique\n", + /* 63*/ "Actuelle:\n", + /* 64*/ "Musiques multiples\n", + /* 65*/ "Retour\n", + /* 66*/ "Musiques multiples\n", + /* 67*/ "Hasard\n", + /* 68*/ "Choix musiques\n", + /* 69*/ "Choix musique\n", + /* 70*/ "Manip. 駲uipe\n", + /* 71*/ "Equipes activ馥s\n", + /* 72*/ "Equipes:\n", + /* 73*/ "Equipe auto...\n", + /* 74*/ "Retour\n", + /* 75*/ "Equipe auto\n", + /* 76*/ "Deux 駲uipes\n", + /* 77*/ "Trois 駲uipes\n", + /* 78*/ "Quatre 駲uipes\n", + /* 79*/ "Maximum 駲uipes\n", + /* 80*/ "Humains vs Simulants\n", + /* 81*/ "Duos Humain-Simulant\n", + /* 82*/ "Retour\n", + /* 83*/ "Simulants\n", + /* 84*/ "Ajouter Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Effacer tout\n", + /* 94*/ "Retour\n", + /* 95*/ "Difficult:\n", + /* 96*/ "Changer type...\n", + /* 97*/ "Personnage...\n", + /* 98*/ "Effacer Simulant\n", + /* 99*/ "Retour\n", + /*100*/ "Personnage Simulant\n", + /*101*/ "Ajouter Simulant\n", + /*102*/ "Changer Simulant\n", + /*103*/ "Simulants normaux\n", + /*104*/ "Simulants sp馗iaux\n", + /*105*/ "Pr黎!\n", + /*106*/ "...en attente\n", + /*107*/ "Limites\n", + /*108*/ "Temps\n", + /*109*/ "Score\n", + /*110*/ "R騁ablir par d馭aut\n", + /*111*/ "Retour\n", + /*112*/ "Pas de limite\n", + /*113*/ "%d\n", + /*114*/ "%d Min.\n", + /*115*/ "Ar鈩es\n", + /*116*/ "Dark\n", + /*117*/ "Classique\n", + /*118*/ "Hasard\n", + /*119*/ "Skedar", + /*120*/ "Conduits", + /*121*/ "Ravin", + /*122*/ "Immeuble G5", + /*123*/ "Egouts", + /*124*/ "Entrept", + /*125*/ "Grid", + /*126*/ "Ruines", + /*127*/ "Secteur 52", + /*128*/ "Base", + /*129*/ "Toit", + /*130*/ "Forteresse", + /*131*/ "Villa", + /*132*/ "Parking", + /*133*/ "Temple", + /*134*/ "Complexe", + /*135*/ "F駘icit", + /*136*/ "Hasard", + /*137*/ "Charger joueur\n", + /*138*/ "Bouton B pour annuler\n", + /*139*/ "Charger param.\n", + /*140*/ "%s: Sc駭ario: %s Ar鈩e: %s Simulants: %d", + /*141*/ "Pr駸駘ections\n", + /*142*/ "Nom joueur\n", + /*143*/ "Personnage\n", + /*144*/ "Charger t黎e...\n", + /*145*/ "Stats pour %s\n", + /*146*/ "Tu駸:\n", + /*147*/ "Morts:\n", + /*148*/ "Pr馗ision:\n", + /*149*/ "Tirs t黎e:\n", + /*150*/ "Mun. util.:\n", + /*151*/ "D馮. inflig駸:\n", + /*152*/ "D馮. re輹s:\n", + /*153*/ "Parties:\n", + /*154*/ "Gagn馥s:\n", + /*155*/ "Perdues:\n", + /*156*/ "Temps:\n", + /*157*/ "Distance:\n", + /*158*/ "M馘ailles gagn馥s:\n", + /*159*/ " Pr馗ision:\n", + /*160*/ " Tirs t黎e:\n", + /*161*/ " Tueur:\n", + /*162*/ " Survivant:\n", + /*163*/ "Votre titre:\n", + /*164*/ "Retour\n", + /*165*/ "Challenges compl騁駸\n", + /*166*/ "Retour\n", + /*167*/ "Options\n", + /*168*/ "Voir r馗up.\n", + /*169*/ "Voir joueurs\n", + /*170*/ "Voir 駲uipes\n", + /*171*/ "Radar\n", + /*172*/ "Retour\n", + /*173*/ "Armes\n", + /*174*/ "Choix:\n", + /*175*/ "Param. armes actuels:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Retour\n", + /*183*/ "Sauver param. jeu\n", + /*184*/ "Ecraser votre\nfichier original?\n", + /*185*/ "Ecraser fichier\n", + /*186*/ "Sauver copie\n", + /*187*/ "Ne pas sauver\n", + /*188*/ "Nom fichier\n", + /*189*/ "Entrer nom pour\nfichier de param鑼res:\n", + /*190*/ "Confirmer\n", + /*191*/ "Fichier joueur\nest sauv饅nen auto.\n", + /*192*/ "Sauver une copie?\n", + /*193*/ "Non\n", + /*194*/ "Oui\n", + /*195*/ "Arr黎er\n", + /*196*/ "Voulez-vous vraiment\narr黎er?\n", + /*197*/ "Arr黎er\n", + /*198*/ "Retour\n", + /*199*/ "Manipulations\n", + /*200*/ "Style manip.\n", + /*201*/ "Inverser axe\n", + /*202*/ "Voir devant\n", + /*203*/ "Mouv. t黎e\n", + /*204*/ "Vis馥 auto\n", + /*205*/ "Contrle vis馥\n", + /*206*/ "Cible l'馗ran\n", + /*207*/ "Voir cible\n", + /*208*/ "Port馥 zoom\n", + /*209*/ "Munit. l'馗ran\n", + /*210*/ "Fonction arme\n", + /*211*/ "Paintball\n", + /*212*/ "Retour\n", + /*213*/ "Fixe\n", + /*214*/ "Alt.\n", + /*215*/ "Options combat\n", + /*216*/ "Options mallette\n", + /*217*/ "Options hacker\n", + /*218*/ "Options d馗apsuleur\n", + /*219*/ "Options zone\n", + /*220*/ "Options capture\n", + /*221*/ "Options PC\n", + /*222*/ "Pan! T'es mort!\n", + /*223*/ "Ralenti\n", + /*224*/ "Mouvement rapide\n", + /*225*/ "Afficher 駲uipe\n", + /*226*/ "Sans radar\n", + /*227*/ "Sans vis馥 auto\n", + /*228*/ "Sans voir joueur\n", + /*229*/ "Sans voir r馗up.\n", + /*230*/ "Voir cible\n", + /*231*/ "Voir Terminal\n", + /*232*/ "PC sur radar\n", + /*233*/ "Zone sur radar\n", + /*234*/ "Zone mobile\n", + /*235*/ "Temps\n", + /*236*/ "Visible sur radar\n", + /*237*/ "Voir mallette\n", + /*238*/ "Voir sur radar\n", + /*239*/ "Retour\n", + /*240*/ "Non\n", + /*241*/ "Oui\n", + /*242*/ "Custom\n", + /*243*/ "Sc駭ario\n", + /*244*/ "Chacun pour soi!\n", + /*245*/ "-Equipes-\n", + /*246*/ "Combat", + /*247*/ "Tenir la mallette", + /*248*/ "Centre hacker", + /*249*/ "D馗apsuleur", + /*250*/ "Roi de la zone", + /*251*/ "Capturer la mallette", + /*252*/ "Contrle de PC", + /*253*/ "Combat", + /*254*/ "Mallette", + /*255*/ "Hacker", + /*256*/ "D馗aps.", + /*257*/ "Zone", + /*258*/ "Capture", + /*259*/ "PC", + /*260*/ "Game Over\n", + /*261*/ "Titre:\n", + /*262*/ "Arme de pr馘ilection:\n", + /*263*/ "Prix:\n", + /*264*/ "1er\n", + /*265*/ "2鑪e\n", + /*266*/ "3鑪e\n", + /*267*/ "4鑪e\n", + /*268*/ "5鑪e\n", + /*269*/ "6鑪e\n", + /*270*/ "7鑪e\n", + /*271*/ "8鑪e\n", + /*272*/ "9鑪e\n", + /*273*/ "10鑪e\n", + /*274*/ "11鑪e\n", + /*275*/ "12鑪e\n", + /*276*/ "Classement joueur\n", + /*277*/ "Morts\n", + /*278*/ "Score\n", + /*279*/ "Classement 駲uipe\n", + /*280*/ "Stats de %s", + /*281*/ "Suicides\n", + /*282*/ "Morts\n", + /*283*/ "Tu駸\n", + /*284*/ "Inventaire\n", + /*285*/ "Manipulation\n", + /*286*/ "Temps de jeu:\n", + /*287*/ "Fin de jeu\n", + /*288*/ "Pause\n", + /*289*/ "Reprendre\n", + /*290*/ "Fin jeu\n", + /*291*/ "Etes-vous sr?\n", + /*292*/ "Annuler\n", + /*293*/ "Fin jeu\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Bouton B pour Retour.\n", + /*415*/ "Hangar d'information\n", + /*416*/ "Holo-entranement\n", + /*417*/ "Liste appareils\n", + /*418*/ "Informations\n", + /*419*/ "Emplacements\n", + /*420*/ "V馼icules\n", + /*421*/ "Profils personnages\n", + /*422*/ "Autres informations\n", + /*423*/ "Stats entranement\n", + /*424*/ "Temps 馗oul:\n", + /*425*/ "Succ鑚!\n", + /*426*/ "Echec!\n", + /*427*/ "Ok\n", + /*428*/ "Reprendre\n", + /*429*/ "Annuler\n", + /*430*/ "Abandonner\n", + /*431*/ "Profil personnage\n", + /*432*/ "Nom:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Bouton B pour Retour.\n", + /*436*/ "Triche\n", + /*437*/ "Vous pouvez 騁eindre votre ordinateur en toute s馗urit.\n", + /*438*/ "Annuler\n", + /*439*/ "Bronze\n", + /*440*/ "Argent\n", + /*441*/ "Or\n", + /*442*/ "Difficult饅n", + /*443*/ "Difficult:\n", + /*444*/ "Choix difficult:\n", + /*445*/ " \n", + /*446*/ "Arme\n", + /*447*/ "Info entranement\n", + /*448*/ "Stats entranement\n", + /*449*/ "Succ鑚!\n", + /*450*/ "Score:\n", + /*451*/ "Cibles d騁ruites:\n", + /*452*/ "Difficult:\n", + /*453*/ "Temps 馗oul:\n", + /*454*/ "Arme:\n", + /*455*/ "Pr馗ision:\n", + /*456*/ "Pas 馗hou饅n", + /*457*/ "Plus de munit.\n", + /*458*/ "Fin chrono\n", + /*459*/ "Score non atteint\n", + /*460*/ "Trop impr馗is\n", + /*461*/ "Centre\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Score\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munit.:\n", + /*472*/ "Limite temps:\n", + /*473*/ "Pr馗ision Mini:\n", + /*474*/ "Cibles d騁ruire:\n", + /*475*/ "Score atteindre:\n", + /*476*/ "Triche\n", + /*477*/ "Termin饅n", + /*478*/ "Attention\n", + /*479*/ "En utilsant les codes de triche\nvous ne pourrez pas progresser dans le jeu \ntant que ceux-ci seront activ駸.\n", + /*480*/ "OK\n", + /*481*/ "Annuler\n", + /*482*/ "Joueur %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "V駻if. Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Attendre...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_g.c b/src/files/lang/jap-final/mpmenu_str_g.c new file mode 100644 index 000000000..d0f7ba5b1 --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Suizidal\n", + /* 1*/ "Muni?\n", + /* 2*/ "Schilde?\n", + /* 3*/ "Bestgeschtzt\n", + /* 4*/ "Treffsicher\n", + /* 5*/ "Professionell\n", + /* 6*/ "Gef臧rlich\n", + /* 7*/ "Harmlos\n", + /* 8*/ "Feig\n", + /* 9*/ "Verzweifelt\n", + /* 10*/ "Ehrenhaft\n", + /* 11*/ "Unehrenhaft\n", + /* 12*/ "Eintagsfliege\n", + /* 13*/ "Methusalem\n", + /* 14*/ "Doppel-Treffer\n", + /* 15*/ "Trippel-Treffer\n", + /* 16*/ "Quadro-Treffer\n", + /* 17*/ "Spiel-Einstellungen\n", + /* 18*/ "Laden\n", + /* 19*/ "Szenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Optionen\n", + /* 22*/ "Teams\n", + /* 23*/ "Waffen\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulanten\n", + /* 26*/ "Speichern\n", + /* 27*/ "Spiel abbrechen\n", + /* 28*/ "Spieler-Einstellungen\n", + /* 29*/ "Spieler laden\n", + /* 30*/ "Name\n", + /* 31*/ "Charakter\n", + /* 32*/ "Handicap\n", + /* 33*/ "Steuerung\n", + /* 34*/ "Spieler-Optionen\n", + /* 35*/ "Statistik\n", + /* 36*/ "Spielstart\n", + /* 37*/ "Abbruch\n", + /* 38*/ "Spieler speichern\n", + /* 39*/ "Kopie speichern\n", + /* 40*/ "Zeugs\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team-Namen\n", + /* 43*/ "Rate\n", + /* 44*/ "Sperre\n", + /* 45*/ "keine\n", + /* 46*/ "Letzt. Gewinner\n", + /* 47*/ "Letzt. Verlierer\n", + /* 48*/ "zuf舁lig\n", + /* 49*/ "Challenge\n", + /* 50*/ "Kampf-Challenge\n", + /* 51*/ "Challenge abbrechen\n", + /* 52*/ "Abbruch\n", + /* 53*/ "Mchten Sie wirklich\nabbrechen?\n", + /* 54*/ "Abbruch\n", + /* 55*/ "Zurck\n", + /* 56*/ "%s\n", + /* 57*/ "Annehmen\n", + /* 58*/ "Zurck\n", + /* 59*/ "Team-Namen\n", + /* 60*/ "Zurck\n", + /* 61*/ "Team-Name 舅dern\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Derzeit:\n", + /* 64*/ "Multiple Sound\n", + /* 65*/ "Zurck\n", + /* 66*/ "Multiple Sounds\n", + /* 67*/ "zuf舁lig\n", + /* 68*/ "W臧le Sounds\n", + /* 69*/ "W臧le Sound\n", + /* 70*/ "Team-Steuerung\n", + /* 71*/ "Teams erm臘htigt\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto-Team...\n", + /* 74*/ "Zurck\n", + /* 75*/ "Auto-Team\n", + /* 76*/ "Zwei Teams\n", + /* 77*/ "Drei Teams\n", + /* 78*/ "Vier Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Menschen vs. Sim.\n", + /* 81*/ "Menschen-Sim.-Paare\n", + /* 82*/ "Zurck\n", + /* 83*/ "Simulanten\n", + /* 84*/ "Simulant hinzufgen...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Alle lschen\n", + /* 94*/ "Zurck\n", + /* 95*/ "Schwierigkeit:\n", + /* 96*/ "Typ wechseln...\n", + /* 97*/ "Charakter...\n", + /* 98*/ "Simulant lschen\n", + /* 99*/ "Zurck\n", + /*100*/ "Simulanten-Charakter\n", + /*101*/ "Simulant hinzufgen\n", + /*102*/ "Simulant wechseln\n", + /*103*/ "Normale Simulanten\n", + /*104*/ "Spezielle Simulanten\n", + /*105*/ "Fertig!\n", + /*106*/ "...und bereit\n", + /*107*/ "Limits\n", + /*108*/ "Zeit\n", + /*109*/ "Score\n", + /*110*/ "Grundeinstellung\n", + /*111*/ "Zurck\n", + /*112*/ "Unbegr.\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "zuf舁lig\n", + /*119*/ "Skedar", + /*120*/ "Rohre", + /*121*/ "Graben", + /*122*/ "G5-Building", + /*123*/ "Kan舁e", + /*124*/ "Lagerhaus", + /*125*/ "Netz", + /*126*/ "Ruinen", + /*127*/ "Area 52", + /*128*/ "Basis", + /*129*/ "D臘her", + /*130*/ "Festung", + /*131*/ "Villa", + /*132*/ "Parkdeck", + /*133*/ "Tempel", + /*134*/ "Komplex", + /*135*/ "Glckseligkeit", + /*136*/ "Zuf舁lig", + /*137*/ "Spieler laden\n", + /*138*/ "Abbruch\n", + /*139*/ "Laden\n", + /*140*/ "%s: Szenario: %s Arena: %s Simulanten: %d", + /*141*/ "Voreinstellungen\n", + /*142*/ "Spieler-Name\n", + /*143*/ "Charakter\n", + /*144*/ "Kopf laden...\n", + /*145*/ "Statistik fr %s\n", + /*146*/ "Treff.:\n", + /*147*/ "Versuche:\n", + /*148*/ "Genauigkeit:\n", + /*149*/ "Kopftreffer:\n", + /*150*/ "Munition:\n", + /*151*/ "Schaden:\n", + /*152*/ "Schmerzen:\n", + /*153*/ "Spiele gesamt:\n", + /*154*/ "Gewinne:\n", + /*155*/ "Verluste:\n", + /*156*/ "Zeit:\n", + /*157*/ "Distanz:\n", + /*158*/ "Medaillen:\n", + /*159*/ " Genauigkeit:\n", + /*160*/ " Kopftreffer:\n", + /*161*/ " Meisterschtze:\n", + /*162*/ " ワberlebender:\n", + /*163*/ "Ihr Titel:\n", + /*164*/ "Zurck\n", + /*165*/ "Challenges OK\n", + /*166*/ "Zurck\n", + /*167*/ "Optionen\n", + /*168*/ "Items anzeigen\n", + /*169*/ "Spieler anzeigen\n", + /*170*/ "Teams anzeigen\n", + /*171*/ "Radar\n", + /*172*/ "Zurck\n", + /*173*/ "Bewaffnung\n", + /*174*/ "Einstellung:\n", + /*175*/ "Aktuelle Einstellung:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Zurck\n", + /*183*/ "Speichern\n", + /*184*/ "Mchten Sie das \nbestehende File\nberschreiben?\n", + /*185*/ "ワberschreiben\n", + /*186*/ "Kopieren\n", + /*187*/ "Nicht speichern\n", + /*188*/ "File-Name\n", + /*189*/ "Bitte benennen Sie\nIhr File:\n", + /*190*/ "Best舩igen\n", + /*191*/ "Ihr Spieler-File wird\nimmer automatisch\ngespeichert.\n", + /*192*/ "Kopie speichern?\n", + /*193*/ "Nein\n", + /*194*/ "Ja\n", + /*195*/ "Abbruch\n", + /*196*/ "Mchten Sie wirklich\nabbrechen?\n", + /*197*/ "Abbrechen\n", + /*198*/ "Zurck\n", + /*199*/ "Steuerung\n", + /*200*/ "Steuerungsart\n", + /*201*/ "Blick vertauschen\n", + /*202*/ "Vorausschauen\n", + /*203*/ "Kopfneigung\n", + /*204*/ "Auto-Ziel\n", + /*205*/ "Ziel-Steuerung\n", + /*206*/ "Screen-Anzeigen\n", + /*207*/ "Ziel zeigen\n", + /*208*/ "Zoom-Bereich\n", + /*209*/ "Munition anzeigen\n", + /*210*/ "Funktion anzeigen\n", + /*211*/ "Paintball\n", + /*212*/ "Zurck\n", + /*213*/ "Halten\n", + /*214*/ "Umschalten\n", + /*215*/ "Kampf-Optionen\n", + /*216*/ "Aktenkoffer-Optionen\n", + /*217*/ "Hacker-Optionen\n", + /*218*/ "Pop a Cap-Optionen\n", + /*219*/ "Hgel-Optionen\n", + /*220*/ "Fang-Optionen\n", + /*221*/ "Boxen-Optionen\n", + /*222*/ "Ein Treffer\n", + /*223*/ "Zeitlupe\n", + /*224*/ "Zeitraffer\n", + /*225*/ "Team anzeigen\n", + /*226*/ "Kein Radar\n", + /*227*/ "Kein Auto-Ziel\n", + /*228*/ "Spieler nicht zeigen\n", + /*229*/ "Items nicht zeigen\n", + /*230*/ "Ziel anzeigen\n", + /*231*/ "Terminal anzeigen\n", + /*232*/ "Boxen am Radar zeigen\n", + /*233*/ "Hgel zeigen\n", + /*234*/ "Mobiler Hgel\n", + /*235*/ "Zeit\n", + /*236*/ "Am Radar zeigen\n", + /*237*/ "Koffer zeigen\n", + /*238*/ "Am Radar zeigen\n", + /*239*/ "Zurck\n", + /*240*/ "Aus\n", + /*241*/ "Ein\n", + /*242*/ "Smart\n", + /*243*/ "Szenario\n", + /*244*/ "Frei fr alle!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Kampf", + /*247*/ "Der Koffer 1", + /*248*/ "Hacker-Zentrale", + /*249*/ "Pop a Cap", + /*250*/ "Herr des Hgels", + /*251*/ "Der Koffer 2", + /*252*/ "Berhr die Box", + /*253*/ "Kampf", + /*254*/ "Aktenkoffer", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hgel", + /*258*/ "Fang", + /*259*/ "Boxen", + /*260*/ "Game Over\n", + /*261*/ "Titel:\n", + /*262*/ "Bevorzugte Waffe:\n", + /*263*/ "Preise:\n", + /*264*/ "1.\n", + /*265*/ "2.\n", + /*266*/ "3.\n", + /*267*/ "4.\n", + /*268*/ "5.\n", + /*269*/ "6.\n", + /*270*/ "7.\n", + /*271*/ "8.\n", + /*272*/ "9.\n", + /*273*/ "10.\n", + /*274*/ "11.\n", + /*275*/ "12.\n", + /*276*/ "Spieler-Bewertung\n", + /*277*/ "Versuche\n", + /*278*/ "Score\n", + /*279*/ "Team-Bewertung\n", + /*280*/ "Statistik fr %s", + /*281*/ "Suizide\n", + /*282*/ "Versuche\n", + /*283*/ "Hits\n", + /*284*/ "Inventar\n", + /*285*/ "Steuerung\n", + /*286*/ "Spielzeit:\n", + /*287*/ "Spiel beenden\n", + /*288*/ "Pause\n", + /*289*/ "Pause beenden\n", + /*290*/ "Spiel beenden\n", + /*291*/ "Sind Sie sicher?\n", + /*292*/ "Zurck\n", + /*293*/ "Spiel beenden\n", + /*294*/ "PerfectHead\n", + /*295*/ "Gespeicherten Kopf laden\n", + /*296*/ "Neuen Kopf erstellen\n", + /*297*/ "Kopf editieren\n", + /*298*/ "PerfectHead editieren\n", + /*299*/ "W臧le den Kopf:\n", + /*300*/ "Abbruch\n", + /*301*/ "Neuen Kopf erstellen\n", + /*302*/ "Gespeicherten Kopf laden\n", + /*303*/ "Wo mchtest du diesen\n", + /*304*/ "Kopf einsetzen?\n", + /*305*/ "Kampfsimulator\n", + /*306*/ "Alle Missionen\n", + /*307*/ "Beide\n", + /*308*/ "Abbruch\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "PerfectHead laden\n", + /*339*/ "Legen Sie das Controller Pak\n", + /*340*/ "mit dem Kopf, den Sie laden\n", + /*341*/ "mchten in einen beliebigen\n", + /*342*/ "Controller ein.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Abbruch\n", + /*345*/ "Quelle:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "PerfectHead speichern\n", + /*393*/ "Sie knnen jetzt den Kopf auf\n", + /*394*/ "ein Controller Pak speichern.\n", + /*395*/ "In diesem Fall stellen Sie bitte\n", + /*396*/ "sicher, dass ein Controller Pak\n", + /*397*/ "eingelegt ist. W臧len Sie \"Speichern\".\n", + /*398*/ "Speichern\n", + /*399*/ "Nicht speichern\n", + /*400*/ "Kopf wurde erstellt!\n", + /*401*/ "Um diesen Kopf im Kampsimulator einzusetzen,\n", + /*402*/ "w臧len Sie ihn aus dem Charakter-Men vom\n", + /*403*/ "Spieler/Simulanten-Einstellungs-Men.\n", + /*404*/ "Die gewnschten Kpfe erscheinen nun\n", + /*405*/ "in allen Missionen, die Sie spielen.\n", + /*406*/ "Sie knnen den Kopf nun noch weiter editieren.\n", + /*407*/ "Beenden\n", + /*408*/ "Kopf editieren\n", + /*409*/ "Farbe des Kopfes:\n", + /*410*/ "Gesicht:\n", + /*411*/ "Frisur:\n", + /*412*/ "OK\n", + /*413*/ "Abbruch\n", + /*414*/ "Abbruch\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Ger舩e-Liste\n", + /*418*/ "Information\n", + /*419*/ "ヨrtlichkeiten\n", + /*420*/ "Fahrzeuge\n", + /*421*/ "Character-Profile\n", + /*422*/ "Weitere Informationen\n", + /*423*/ "Trainings-Statistik\n", + /*424*/ "bentigte Zeit:\n", + /*425*/ "Abgeschlossen!\n", + /*426*/ "Durchgefallen!\n", + /*427*/ "OK\n", + /*428*/ "Weiter\n", + /*429*/ "Zurck\n", + /*430*/ "Abbruch\n", + /*431*/ "Character-Profile\n", + /*432*/ "Name:\n", + /*433*/ "Alter:\n", + /*434*/ "Rasse:\n", + /*435*/ "Abbruch\n", + /*436*/ "Cheats\n", + /*437*/ "Sie knnen das Ger舩 jetzt abschalten.\n", + /*438*/ "Abbruch\n", + /*439*/ "Bronze\n", + /*440*/ "Silber\n", + /*441*/ "Gold\n", + /*442*/ "Schwierigkeit\n", + /*443*/ "Schwierigkeit:\n", + /*444*/ "W臧len Sie die Schwierigkeit:\n", + /*445*/ " \n", + /*446*/ "Waffe\n", + /*447*/ "Trainings-Info\n", + /*448*/ "Trainings-Statistik\n", + /*449*/ "Abgeschlossen!\n", + /*450*/ "Score:\n", + /*451*/ "Zerstrte Ziele:\n", + /*452*/ "Schwierigkeit:\n", + /*453*/ "bentigte Zeit:\n", + /*454*/ "Waffe:\n", + /*455*/ "Genauigkeit:\n", + /*456*/ "Nicht durchgefallen\n", + /*457*/ "Keine Munition\n", + /*458*/ "Zeit abgelaufen\n", + /*459*/ "Score nicht erreicht\n", + /*460*/ "Zu ungenau\n", + /*461*/ "Bingo\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Munitions-Limit:\n", + /*472*/ "Zeit-Limit:\n", + /*473*/ "Min. Genauigkeit:\n", + /*474*/ "Ziele:\n", + /*475*/ "Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Fertig\n", + /*478*/ "Warnung!\n", + /*479*/ "Sollten Sie Cheats aktivieren, knnen Sie nicht\nweiter ins Spiel vordringen, solange\ndiese Cheats aktiv sind.\n", + /*480*/ "OK\n", + /*481*/ "Zurck\n", + /*482*/ "Spieler %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Controller Pak \nwird geprft\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Bitte warten...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_i.c b/src/files/lang/jap-final/mpmenu_str_i.c new file mode 100644 index 000000000..f3bfe22df --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Che schifo!\n", + /* 1*/ "Servono munizioni?\n", + /* 2*/ "Protezione minima\n", + /* 3*/ "Protezione massima\n", + /* 4*/ "Precisione di tiro\n", + /* 5*/ "Professionale\n", + /* 6*/ "Micidiale\n", + /* 7*/ "Innocuo\n", + /* 8*/ "Codardo\n", + /* 9*/ "Disperato\n", + /* 10*/ "Lodevole\n", + /* 11*/ "Disonorevole\n", + /* 12*/ "Vita pi breve\n", + /* 13*/ "Vita pi lunga\n", + /* 14*/ "Doppio colpo\n", + /* 15*/ "Triplo colpo\n", + /* 16*/ "Colpo quadruplo\n", + /* 17*/ "Impostazioni gioco\n", + /* 18*/ "Carica impostazioni\n", + /* 19*/ "Ambientaz.\n", + /* 20*/ "Scena\n", + /* 21*/ "Opzioni\n", + /* 22*/ "Squadre\n", + /* 23*/ "Armi\n", + /* 24*/ "Limiti\n", + /* 25*/ "Replicanti\n", + /* 26*/ "Salva impostazioni\n", + /* 27*/ "Interrompi gioco\n", + /* 28*/ "Impostaz. giocatore\n", + /* 29*/ "Carica giocatore\n", + /* 30*/ "Nome\n", + /* 31*/ "Personaggio\n", + /* 32*/ "Svantaggi\n", + /* 33*/ "Comandi\n", + /* 34*/ "Opzioni giocatore\n", + /* 35*/ "Statistiche\n", + /* 36*/ "Avvio gioco\n", + /* 37*/ "Esci\n", + /* 38*/ "Salva Giocatore\n", + /* 39*/ "Salva Copia Giocat.\n", + /* 40*/ "Varie\n", + /* 41*/ "Colonna sonora\n", + /* 42*/ "Nomi squadre\n", + /* 43*/ "Rapporto\n", + /* 44*/ "Blocco\n", + /* 45*/ "Nessuno\n", + /* 46*/ "Ultimo vincit.\n", + /* 47*/ "Ultimo perden.\n", + /* 48*/ "A caso\n", + /* 49*/ "Sfida\n", + /* 50*/ "Sfide di lotta\n", + /* 51*/ "Interrompi la sfida\n", + /* 52*/ "Interrompi\n", + /* 53*/ "Desideri veramente\ninterrompere il gioco?\n", + /* 54*/ "Interrompi\n", + /* 55*/ "Annulla\n", + /* 56*/ "%s\n", + /* 57*/ "Accetta\n", + /* 58*/ "Annulla\n", + /* 59*/ "Nomi squadre\n", + /* 60*/ "Esci\n", + /* 61*/ "Cambia nomi squadre\n", + /* 62*/ "Colonna sonora\n", + /* 63*/ "Attuale:\n", + /* 64*/ "Pi brani\n", + /* 65*/ "Esci\n", + /* 66*/ "Brani multipli\n", + /* 67*/ "A caso\n", + /* 68*/ "Seleziona brani\n", + /* 69*/ "Seleziona brano\n", + /* 70*/ "Comandi squadra\n", + /* 71*/ "Squadre attivate\n", + /* 72*/ "Squadre:\n", + /* 73*/ "Squadra automatica...\n", + /* 74*/ "Esci\n", + /* 75*/ "Squadra automatica\n", + /* 76*/ "Due squadre\n", + /* 77*/ "Tre squadre\n", + /* 78*/ "Quattro squadre\n", + /* 79*/ "Squadre al massimo\n", + /* 80*/ "Umani contro replic.\n", + /* 81*/ "Coppie umani-replic.\n", + /* 82*/ "Annulla\n", + /* 83*/ "Replicanti\n", + /* 84*/ "Aggiungi replicanti...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Cancella tutto\n", + /* 94*/ "Esci\n", + /* 95*/ "Difficolt:\n", + /* 96*/ "Cambia tipo...\n", + /* 97*/ "Personaggio...\n", + /* 98*/ "Cancella replicante\n", + /* 99*/ "Esci\n", + /*100*/ "Personaggio replicante\n", + /*101*/ "Aggiungi replicante\n", + /*102*/ "Cambia replicante\n", + /*103*/ "Replicanti normali\n", + /*104*/ "Replicanti speciali\n", + /*105*/ "Pronti!\n", + /*106*/ "...attendere\n", + /*107*/ "Limiti\n", + /*108*/ "Tempo\n", + /*109*/ "Punteggio\n", + /*110*/ "Ripristina impostaz.\n", + /*111*/ "Esci\n", + /*112*/ "No limite\n", + /*113*/ "%d\n", + /*114*/ "%d min\n", + /*115*/ "Scena\n", + /*116*/ "Dark\n", + /*117*/ "Classica\n", + /*118*/ "A caso\n", + /*119*/ "Skedar", + /*120*/ "Condotte", + /*121*/ "Burrone", + /*122*/ "Edificio G5", + /*123*/ "Fognature", + /*124*/ "Magazzino", + /*125*/ "Griglia", + /*126*/ "Rovine", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Tetto", + /*130*/ "Fortezza", + /*131*/ "Villa", + /*132*/ "Parcheggio", + /*133*/ "Tempio", + /*134*/ "Complesso", + /*135*/ "Felicit", + /*136*/ "A caso", + /*137*/ "Carica giocatore\n", + /*138*/ "Premi B per annullare\n", + /*139*/ "Carica impostaz. gioco\n", + /*140*/ "%s: Ambientazione: %s Scena: %s Replicanti: %d", + /*141*/ "Impostazioni\n", + /*142*/ "Nome giocatore\n", + /*143*/ "Personaggio\n", + /*144*/ "Carica testa...\n", + /*145*/ "Statistiche %s\n", + /*146*/ "Vittime:\n", + /*147*/ "Decessi:\n", + /*148*/ "Precisione:\n", + /*149*/ "Colpi al capo:\n", + /*150*/ "Munizioni usate:\n", + /*151*/ "Danno arrecato:\n", + /*152*/ "Danno subito:\n", + /*153*/ "Partite giocate:\n", + /*154*/ "Partite vinte:\n", + /*155*/ "Partite perse:\n", + /*156*/ "Tempo:\n", + /*157*/ "Distanza:\n", + /*158*/ "Medaglie vinte:\n", + /*159*/ " Precisione:\n", + /*160*/ " Colpi al capo:\n", + /*161*/ " Campione:\n", + /*162*/ " Superstite:\n", + /*163*/ "Tuo titolo:\n", + /*164*/ "Esci\n", + /*165*/ "Sfide completate\n", + /*166*/ "Esci\n", + /*167*/ "Opzioni\n", + /*168*/ "Mostra strumenti\n", + /*169*/ "Mostra giocatori\n", + /*170*/ "Mostra squadre\n", + /*171*/ "Radar\n", + /*172*/ "Esci\n", + /*173*/ "Armi\n", + /*174*/ "Imposta:\n", + /*175*/ "Impostaz. attuali armi:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Esci\n", + /*183*/ "Salva impostaz. gioco\n", + /*184*/ "Vuoi salvare sul file\ndi gioco originale?\n", + /*185*/ "Salva su originale\n", + /*186*/ "Salva copia\n", + /*187*/ "Non salvare\n", + /*188*/ "Nome del file partita\n", + /*189*/ "Digita nome per il file\nimpostazioni gioco:\n", + /*190*/ "Conferma\n", + /*191*/ "Il file giocatore 鐔nsempre salvato\nautomaticamente.\n", + /*192*/ "Salvarne una copia?\n", + /*193*/ "No\n", + /*194*/ "S\n", + /*195*/ "Esci\n", + /*196*/ "Desideri veramente\nuscire?\n", + /*197*/ "Esci\n", + /*198*/ "Annulla\n", + /*199*/ "Comandi\n", + /*200*/ "Modalit comandi\n", + /*201*/ "Inv. punto vista\n", + /*202*/ "Vista in avanti\n", + /*203*/ "Rotazione testa\n", + /*204*/ "Mira automatica\n", + /*205*/ "Mirino\n", + /*206*/ "Vista su schermo\n", + /*207*/ "Mostra obiettivo\n", + /*208*/ "Area zoom\n", + /*209*/ "Munizioni\n", + /*210*/ "Funzioni arma\n", + /*211*/ "Macchia colorata\n", + /*212*/ "Esci\n", + /*213*/ "Tieni premuto\n", + /*214*/ "Attiva/disattiva\n", + /*215*/ "Opzioni lotta\n", + /*216*/ "Opzioni cartella\n", + /*217*/ "Opzioni hacker\n", + /*218*/ "Opzioni tutti contro 1\n", + /*219*/ "Opzioni colle\n", + /*220*/ "Opzioni cassa\n", + /*221*/ "Opzioni box\n", + /*222*/ "Vittime in un colpo\n", + /*223*/ "Al rallentatore\n", + /*224*/ "Accelerato\n", + /*225*/ "Mostra squadra\n", + /*226*/ "Nessun Radar\n", + /*227*/ "No mira autom.\n", + /*228*/ "Nascondi giocatori\n", + /*229*/ "Nascondi strumenti\n", + /*230*/ "Mostra obiettivo\n", + /*231*/ "Mostra terminale\n", + /*232*/ "Box su radar\n", + /*233*/ "Colle su radar\n", + /*234*/ "Colle mobile\n", + /*235*/ "Tempo\n", + /*236*/ "Mostra su radar\n", + /*237*/ "Mostra cartella\n", + /*238*/ "Mostra su radar\n", + /*239*/ "Esci\n", + /*240*/ "No\n", + /*241*/ "S\n", + /*242*/ "Furbo\n", + /*243*/ "Ambientazione\n", + /*244*/ "Per tutti!\n", + /*245*/ "-Collaborazione-\n", + /*246*/ "Lotta", + /*247*/ "Tieni cartella", + /*248*/ "Centrale Hacker", + /*249*/ "Tutti contro 1", + /*250*/ "Re del colle", + /*251*/ "Prendi la cassa", + /*252*/ "Tocca quel box", + /*253*/ "Lotta", + /*254*/ "Cartella", + /*255*/ "Hacker", + /*256*/ "Contro 1", + /*257*/ "Colle", + /*258*/ "Cassa", + /*259*/ "Box", + /*260*/ "Fine partita\n", + /*261*/ "Titolo:\n", + /*262*/ "Arma pi usata:\n", + /*263*/ "Premi:\n", + /*264*/ "1ー\n", + /*265*/ "2ー\n", + /*266*/ "3ー\n", + /*267*/ "4ー\n", + /*268*/ "5ー\n", + /*269*/ "6ー\n", + /*270*/ "7ー\n", + /*271*/ "8ー\n", + /*272*/ "9ー\n", + /*273*/ "10ー\n", + /*274*/ "11ー\n", + /*275*/ "12ー\n", + /*276*/ "Classifica giocatori\n", + /*277*/ "Decessi\n", + /*278*/ "Punti\n", + /*279*/ "Classifica squadre\n", + /*280*/ "Statistiche %s", + /*281*/ "Suicidi\n", + /*282*/ "Decessi\n", + /*283*/ "Vitt.\n", + /*284*/ "Inventario\n", + /*285*/ "Comandi\n", + /*286*/ "Tempo:\n", + /*287*/ "Fine gioco\n", + /*288*/ "Pausa\n", + /*289*/ "Fine pausa\n", + /*290*/ "Esci dal gioco\n", + /*291*/ "Sicuro?\n", + /*292*/ "Annulla\n", + /*293*/ "Fine gioco\n", + /*294*/ "TestaPerfect\n", + /*295*/ "Carica testa salvata\n", + /*296*/ "Crea nuova testa\n", + /*297*/ "Modifica testa caricata\n", + /*298*/ "Modifica testaPerfect\n", + /*299*/ "Scegli casella per modifica:\n", + /*300*/ "Annulla\n", + /*301*/ "Crea nuova testa\n", + /*302*/ "Carica testa salvata\n", + /*303*/ "Dove desideri usare\n", + /*304*/ "questa testa?\n", + /*305*/ "Simulatore lotta\n", + /*306*/ "Tutte le missioni\n", + /*307*/ "Entrambi\n", + /*308*/ "Annulla\n", + /*309*/ "Impostaz. macch. fotografica\n", + /*310*/ "Inserisci la macch. fotografica\n", + /*311*/ "nella cassetta Game Boy.\n", + /*312*/ "Poi inserisci la cassetta Game Boy\n", + /*313*/ "in un Controller.\n", + /*314*/ "OK\n", + /*315*/ "Annulla\n", + /*316*/ "Errore\n", + /*317*/ "Macch. fotografica Game Boy non rilevata!\n", + /*318*/ "Controlla i collegamenti\n", + /*319*/ "e riprova.\n", + /*320*/ "Annulla\n", + /*321*/ "Scegli la macchina\n", + /*322*/ "Rilevate pi macchine\n", + /*323*/ "Seleziona la macchina che\nvuoi usare\n", + /*324*/ "OK\n", + /*325*/ "Annulla\n", + /*326*/ "TestaPerfect\n", + /*327*/ "Scatta foto ora\n", + /*328*/ "Carica foto da macchina\n", + /*329*/ "Annulla\n", + /*330*/ "Carica da macchina\n", + /*331*/ "Scegli foto:\n", + /*332*/ "Annulla\n", + /*333*/ "Scatta foto\n", + /*334*/ "Scatta!\n", + /*335*/ "Annulla\n", + /*336*/ "Tieni foto\n", + /*337*/ "Riprova\n", + /*338*/ "Carica testaPerfect\n", + /*339*/ "Inserisci il Controller Pak\n", + /*340*/ "contenete la testa che\n", + /*341*/ "vuoi caricare in uno\n", + /*342*/ "dei Controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Annulla\n", + /*345*/ "Fonte:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "TestaPerfect Editor\n", + /*352*/ "Scatta altra foto\n", + /*353*/ "Cambia testa\n", + /*354*/ "Posiziona foto\n", + /*355*/ "Colora viso e capelli\n", + /*356*/ "Dai forma a testa\n", + /*357*/ "Rimuovi testa\n", + /*358*/ "Cancella modifiche\n", + /*359*/ "Tieni modifiche\n", + /*360*/ "Dai forma a testa\n", + /*361*/ "Profondit濬n", + /*362*/ "OK\n", + /*363*/ "Annulla\n", + /*364*/ "Posiziona immagine\n", + /*365*/ "Lumninosit濬n", + /*366*/ "OK\n", + /*367*/ "Annulla\n", + /*368*/ "Scegli testa\n", + /*369*/ "OK\n", + /*370*/ "Annulla\n", + /*371*/ "Elimina testaPerfect\n", + /*372*/ "Desideri veramente eliminare\n", + /*373*/ "questa testa dalla memoria?\n", + /*374*/ "Elimina\n", + /*375*/ "Annulla\n", + /*376*/ "Annulla modifiche\n", + /*377*/ "Eliminare veramente\n", + /*378*/ "le modifiche?\n", + /*379*/ "Elimina\n", + /*380*/ "Esci\n", + /*381*/ "Salva testaPerfect\n", + /*382*/ "Hai modificato questa testa.\n", + /*383*/ "Vuoi tenere le modifiche?\n", + /*384*/ "Tieni\n", + /*385*/ "Annulla\n", + /*386*/ "Salva testaPerfect\n", + /*387*/ "Le modifiche saranno memorizzate.\n", + /*388*/ "Vuoi salvare le modifiche\n", + /*389*/ "nel Controller Pak?\n", + /*390*/ "Salva\n", + /*391*/ "Non salvare\n", + /*392*/ "Salva testaPerfect\n", + /*393*/ "Ora puoi salvare la testa\n", + /*394*/ "su un Controller Pak se vuoi.\n", + /*395*/ "Prima per accertati che\n", + /*396*/ "sia inserito un Controller Pak\n", + /*397*/ "e scegli \"Salva\".\n", + /*398*/ "Salva\n", + /*399*/ "Non salvare\n", + /*400*/ "Testa completa!\n", + /*401*/ "Per usare la testa nel simulatore lotta,\n", + /*402*/ "selezionala dal menu personaggi delle\n", + /*403*/ "impostazioni giocatore/replicante.\n", + /*404*/ "Appariranno le teste missione\n", + /*405*/ "per ogni missione giocata.\n", + /*406*/ "Puoi ancora modificare la testa.\n", + /*407*/ "Esci\n", + /*408*/ "Modifica testa\n", + /*409*/ "Colore testa\n", + /*410*/ "Viso:\n", + /*411*/ "Capelli:\n", + /*412*/ "OK\n", + /*413*/ "Annulla\n", + /*414*/ "Premi B per uscire.\n", + /*415*/ "Informazioni hangar\n", + /*416*/ "Esercitazione olografica\n", + /*417*/ "Lista strumenti\n", + /*418*/ "Informazioni\n", + /*419*/ "Luoghi\n", + /*420*/ "Veicoli\n", + /*421*/ "Profili personaggi\n", + /*422*/ "Altre informazioni\n", + /*423*/ "Statistiche esercitazione\n", + /*424*/ "Tempo impiegato:\n", + /*425*/ "Compiuto!\n", + /*426*/ "Fallito!\n", + /*427*/ "Ok\n", + /*428*/ "Riprendi\n", + /*429*/ "Annulla\n", + /*430*/ "Interrompi\n", + /*431*/ "Profilo personaggio\n", + /*432*/ "Nome:\n", + /*433*/ "Et:\n", + /*434*/ "Razza:\n", + /*435*/ "Premi B per uscire.\n", + /*436*/ "Trucchi\n", + /*437*/ "Ora puoi spegnere il computer.\n", + /*438*/ "Annulla\n", + /*439*/ "Bronzo\n", + /*440*/ "Argento\n", + /*441*/ "Oro\n", + /*442*/ "Difficolt濬n", + /*443*/ "Difficolt:\n", + /*444*/ "Seleziona difficolt:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informazioni esercitazione\n", + /*448*/ "Statistiche esercitazione\n", + /*449*/ "Compiuto!\n", + /*450*/ "Punti:\n", + /*451*/ "Obiettivi distrutti:\n", + /*452*/ "Difficolt:\n", + /*453*/ "Tempo impiegato:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisione:\n", + /*456*/ "Non fallito\n", + /*457*/ "Finite munizioni\n", + /*458*/ "Tempo scaduto\n", + /*459*/ "Punteggio impossibile \n", + /*460*/ "Troppo impreciso\n", + /*461*/ "Centro\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Colpi\n", + /*466*/ "Punti\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munizioni:\n", + /*472*/ "Limite tempo:\n", + /*473*/ "Precisione min.:\n", + /*474*/ "Obiettivi:\n", + /*475*/ "Punteggio obiettivi:\n", + /*476*/ "Trucchi\n", + /*477*/ "Fatto\n", + /*478*/ "Avvertenza\n", + /*479*/ "Finch i trucchi sono attivi,\nnon potrai progredire nel gioco\n.", + /*480*/ "OK\n", + /*481*/ "Annulla\n", + /*482*/ "Giocat. %d: ", + /*483*/ "Premi START!\n", + /*484*/ "Ricerca macch. fotografica!\n", + /*485*/ "Regolazione macchina\n", + /*486*/ "Scaricamento immagine\n", + /*487*/ "Caricamento immagine\n", + /*488*/ "Salva immagine\n", + /*489*/ "Tasferimento immagine\n", + /*490*/ "Caricamento segmento\n", + /*491*/ "Esame Controller Pak\n", + /*492*/ "Prelevam. testaPerfect\n", + /*493*/ "Salvatag. testaPerfect\n", + /*494*/ "Regolazione autom. macchina\n", + /*495*/ "Attendere prego...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_s.c b/src/files/lang/jap-final/mpmenu_str_s.c new file mode 100644 index 000000000..1a89f6635 --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "El m疽 Suicida\n", + /* 1*/ "ソY la municin?\n", + /* 2*/ "Menor Escudo\n", + /* 3*/ "Mejor Protegido\n", + /* 4*/ "Mejor Puntera\n", + /* 5*/ "El m疽 Profesional\n", + /* 6*/ "El m疽 Mortfero\n", + /* 7*/ "El m疽 Inofensivo\n", + /* 8*/ "El m疽 Cobarde\n", + /* 9*/ "El m疽 Fren騁ico\n", + /* 10*/ "El m疽 Honorable\n", + /* 11*/ "El menos Honorable\n", + /* 12*/ "La Vida m疽 Corta\n", + /* 13*/ "La Vida m疽 Larga\n", + /* 14*/ "Doble Muerte\n", + /* 15*/ "Triple Muerte\n", + /* 16*/ "Cu疆ruple Muerte\n", + /* 17*/ "Conf. de Juego\n", + /* 18*/ "Cargar Par疥.\n", + /* 19*/ "Escenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Opciones\n", + /* 22*/ "Equipos\n", + /* 23*/ "Armas\n", + /* 24*/ "Lmites\n", + /* 25*/ "Simulantes\n", + /* 26*/ "Guardar Par疥.\n", + /* 27*/ "Abortar Juego\n", + /* 28*/ "Conf. de Jugador\n", + /* 29*/ "Cargar Jugador\n", + /* 30*/ "Nombre\n", + /* 31*/ "Personaje\n", + /* 32*/ "H疣dicap\n", + /* 33*/ "Controles\n", + /* 34*/ "Opciones Jug.\n", + /* 35*/ "Estadsticas\n", + /* 36*/ "Comenzar Juego\n", + /* 37*/ "Abandonar\n", + /* 38*/ "Guardar Jugador\n", + /* 39*/ "Guardar Copia\n", + /* 40*/ "Objetos\n", + /* 41*/ "Banda Sonora\n", + /* 42*/ "Nombres de Equipo\n", + /* 43*/ "Ratio\n", + /* 44*/ "Bloquear\n", + /* 45*/ "Ninguno\n", + /* 46*/ "レl. Ganador\n", + /* 47*/ "レl. Perdedor\n", + /* 48*/ "Aleatorio\n", + /* 49*/ "Desafo\n", + /* 50*/ "Desafos de Combate\n", + /* 51*/ "Abortar Desafo\n", + /* 52*/ "Abortar\n", + /* 53*/ "ソEst疽 seguro de que\nquieres abortar el juego?\n", + /* 54*/ "Abortar\n", + /* 55*/ "Cancelar\n", + /* 56*/ "%s\n", + /* 57*/ "Aceptar\n", + /* 58*/ "Cancelar\n", + /* 59*/ "Nombres de Equipo\n", + /* 60*/ "Volver\n", + /* 61*/ "Cambiar Nombre Eq.\n", + /* 62*/ "Banda Sonora\n", + /* 63*/ "Actual:\n", + /* 64*/ "Mltiples Melodas\n", + /* 65*/ "Volver\n", + /* 66*/ "Mltiples Melodas\n", + /* 67*/ "Aleatorio\n", + /* 68*/ "Elegir Melodas\n", + /* 69*/ "Elegir Meloda\n", + /* 70*/ "Controles de Equipo\n", + /* 71*/ "Equipos Activados\n", + /* 72*/ "Equipos:\n", + /* 73*/ "Auto Equipo...\n", + /* 74*/ "Volver\n", + /* 75*/ "Auto Equipo\n", + /* 76*/ "Dos Equipos\n", + /* 77*/ "Tres Equipos\n", + /* 78*/ "Cuatro Equipos\n", + /* 79*/ "M痊imo de Equipos\n", + /* 80*/ "Humanos contra Sim.\n", + /* 81*/ "Parejas Humano-Sim.\n", + /* 82*/ "Cancelar\n", + /* 83*/ "Simulantes\n", + /* 84*/ "Aadir Simulante...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Despejar Todo\n", + /* 94*/ "Volver\n", + /* 95*/ "Dificultad:\n", + /* 96*/ "Cambiar Tipo...\n", + /* 97*/ "Personaje...\n", + /* 98*/ "Borrar Simulante\n", + /* 99*/ "Volver\n", + /*100*/ "Personaje Simulante\n", + /*101*/ "Aadir Simulante\n", + /*102*/ "Cambiar Simulante\n", + /*103*/ "Simulantes Normales\n", + /*104*/ "Simulantes Especiales\n", + /*105*/ "。Preparado!\n", + /*106*/ "...y esperando\n", + /*107*/ "Lmites\n", + /*108*/ "Tiempo\n", + /*109*/ "Puntos\n", + /*110*/ "Par疥etros Iniciales\n", + /*111*/ "Volver\n", + /*112*/ "Sin lmite\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Cl疽ico\n", + /*118*/ "Aleatorio\n", + /*119*/ "Skedar", + /*120*/ "Tuberas", + /*121*/ "Barranco", + /*122*/ "Edificio G5", + /*123*/ "Cloacas", + /*124*/ "Almac駭", + /*125*/ "Rejilla", + /*126*/ "Ruinas", + /*127*/ "チrea 52", + /*128*/ "Base", + /*129*/ "Tejado", + /*130*/ "Fortaleza", + /*131*/ "Villa", + /*132*/ "Aparcamiento", + /*133*/ "Templo", + /*134*/ "Complejo", + /*135*/ "Felicity", + /*136*/ "Aleatorio", + /*137*/ "Cargar Jugador\n", + /*138*/ "Botn B para cancelar\n", + /*139*/ "Cargar Par疥etros\n", + /*140*/ "%s: Escenario: %s Arena: %s Simulantes: %d", + /*141*/ "Predefinidos\n", + /*142*/ "Nombre del Jugador\n", + /*143*/ "Personaje\n", + /*144*/ "Cargar Cabeza...\n", + /*145*/ "Estad. de %s\n", + /*146*/ "Muertes:\n", + /*147*/ "Bajas:\n", + /*148*/ "Precisin:\n", + /*149*/ "Tiros Cabeza:\n", + /*150*/ "Mun. Util.:\n", + /*151*/ "Dao Caus.:\n", + /*152*/ "Dolor Rec.:\n", + /*153*/ "Nー Juegos:\n", + /*154*/ "J. Ganados:\n", + /*155*/ "J. Perdidos:\n", + /*156*/ "Tiempo:\n", + /*157*/ "Distancia:\n", + /*158*/ "Medallas Ganadas:\n", + /*159*/ " Precisin:\n", + /*160*/ " Tiros Cabeza:\n", + /*161*/ " Mr. Muerte:\n", + /*162*/ " Superviviente:\n", + /*163*/ "Tu Ttulo:\n", + /*164*/ "Volver\n", + /*165*/ "Desafos Completados\n", + /*166*/ "Volver\n", + /*167*/ "Opciones\n", + /*168*/ "Destacar Objetos\n", + /*169*/ "Destacar Jugadores\n", + /*170*/ "Destacar Equipos\n", + /*171*/ "Radar\n", + /*172*/ "Volver\n", + /*173*/ "Armas\n", + /*174*/ "Fijar:\n", + /*175*/ "Conf. Arma Actual:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Volver\n", + /*183*/ "Guardar Configuracin\n", + /*184*/ "ソQuieres guardar sobre\ntu fichero original?\n", + /*185*/ "Guardar Sobre Orig.\n", + /*186*/ "Guardar Copia\n", + /*187*/ "No Guardar\n", + /*188*/ "Nombre de Fichero\n", + /*189*/ "Introduce el nombre\nde fichero de conf.:\n", + /*190*/ "Confirmar\n", + /*191*/ "Tu fichero de jugador\nsiempre se guarda\nautom疸icamente.\n", + /*192*/ "ソGuardar una copia?\n", + /*193*/ "No\n", + /*194*/ "S\n", + /*195*/ "Abandonar\n", + /*196*/ "ソSeguro que quieres\nabandonar?\n", + /*197*/ "Abandonar\n", + /*198*/ "Cancelar\n", + /*199*/ "Controles\n", + /*200*/ "Estilo de Control\n", + /*201*/ "Cabeceo Cambiado\n", + /*202*/ "Mirar al Frente\n", + /*203*/ "Giro de Cabeza\n", + /*204*/ "Auto-Apuntar\n", + /*205*/ "C. Apuntar\n", + /*206*/ "Mirilla en Pantalla\n", + /*207*/ "Mostrar Objetivo\n", + /*208*/ "Alcance de Zoom\n", + /*209*/ "Municin en Pantalla\n", + /*210*/ "Funcin del Arma\n", + /*211*/ "Bolas de Pintura\n", + /*212*/ "Volver\n", + /*213*/ "Mantener\n", + /*214*/ "Cambiar\n", + /*215*/ "Opciones de Combate\n", + /*216*/ "Opciones de Maletn\n", + /*217*/ "Opciones de Hacker\n", + /*218*/ "Opciones de Llevar\n", + /*219*/ "Opciones de Colina\n", + /*220*/ "Opciones de Captura\n", + /*221*/ "Opciones de Cajas\n", + /*222*/ "Muertes de 1 Tiro\n", + /*223*/ "C疥. Lenta\n", + /*224*/ "Movimiento R疳ido\n", + /*225*/ "Mostrar Equipo\n", + /*226*/ "Sin Radar\n", + /*227*/ "Sin Auto-Apuntar\n", + /*228*/ "Sin Destacar Jug.\n", + /*229*/ "Sin Destacar Obj.\n", + /*230*/ "Destacar Objetivos\n", + /*231*/ "Destacar Terminales\n", + /*232*/ "Cajas en el Radar\n", + /*233*/ "Colina en el Radar\n", + /*234*/ "Colina Mvil\n", + /*235*/ "Tiempo\n", + /*236*/ "Mostrar en el Radar\n", + /*237*/ "Destacar Maletn\n", + /*238*/ "Mostrar en Radar\n", + /*239*/ "Volver\n", + /*240*/ "No\n", + /*241*/ "S\n", + /*242*/ "Intelig.\n", + /*243*/ "Escenario\n", + /*244*/ "。Pelea!\n", + /*245*/ "-Trabajo de Equipo-\n", + /*246*/ "Combate", + /*247*/ "Mant駭 el Maletn", + /*248*/ "Central Hacker", + /*249*/ "T la llevas", + /*250*/ "Rey de la Colina", + /*251*/ "Captura Maletn", + /*252*/ "Toca esa Caja", + /*253*/ "Combate", + /*254*/ "Maletn", + /*255*/ "Hacker", + /*256*/ "Llevar", + /*257*/ "Colina", + /*258*/ "Capturar", + /*259*/ "Cajas", + /*260*/ "Fin del Juego\n", + /*261*/ "Ttulo:\n", + /*262*/ "Arma Preferida:\n", + /*263*/ "Premios:\n", + /*264*/ "1ー\n", + /*265*/ "2ー\n", + /*266*/ "3ー\n", + /*267*/ "4ー\n", + /*268*/ "5ー\n", + /*269*/ "6ー\n", + /*270*/ "7ー\n", + /*271*/ "8ー\n", + /*272*/ "9ー\n", + /*273*/ "10ー\n", + /*274*/ "11ー\n", + /*275*/ "12ー\n", + /*276*/ "Situacin Jugador\n", + /*277*/ "Bajas\n", + /*278*/ "Punt.\n", + /*279*/ "Situacin Equipo\n", + /*280*/ "Estad. de %s", + /*281*/ "Suicidios\n", + /*282*/ "Bajas\n", + /*283*/ "Aci.\n", + /*284*/ "Inventario\n", + /*285*/ "Controles\n", + /*286*/ "T. Juego:\n", + /*287*/ "Acabar Juego\n", + /*288*/ "Pausar\n", + /*289*/ "Reanudar\n", + /*290*/ "Acabar Juego\n", + /*291*/ "ソEst疽 seguro?\n", + /*292*/ "Cancelar\n", + /*293*/ "Acabar Juego\n", + /*294*/ "PerfectHead\n", + /*295*/ "Cargar Cabeza Guardada\n", + /*296*/ "Crear Nueva Cabeza\n", + /*297*/ "Editar Cabeza Cargada\n", + /*298*/ "Editar PerfectHead\n", + /*299*/ "Elegir slot a editar:\n", + /*300*/ "Cancelar\n", + /*301*/ "Crear Nueva Cabeza\n", + /*302*/ "Cargar Cabeza Guardada\n", + /*303*/ "ソDnde querr疽 usar\n", + /*304*/ "esta cabeza?\n", + /*305*/ "Simulador de Combate\n", + /*306*/ "Todas las Misiones\n", + /*307*/ "Ambos\n", + /*308*/ "Cancelar\n", + /*309*/ "Conf. C疥ara\n", + /*310*/ "Inserta tu c疥ara en tu\n", + /*311*/ "Transfer Pak.\n", + /*312*/ "Entonces, inserta tu Transfer Pak\n", + /*313*/ "en cualquier mando.\n", + /*314*/ "Aceptar\n", + /*315*/ "Cancelar\n", + /*316*/ "Error\n", + /*317*/ "。C疥ara de Game Boy No Detectada!\n", + /*318*/ "Por favor, comprueba todas las\n", + /*319*/ "conexiones y reint駭talo.\n", + /*320*/ "Cancelar\n", + /*321*/ "Elegir C疥ara\n", + /*322*/ "M疽 de una c疥ara detectada.\n", + /*323*/ "Por favor, elige qu c疥ara\nquieres usar\n", + /*324*/ "Aceptar\n", + /*325*/ "Cancelar\n", + /*326*/ "PerfectHead\n", + /*327*/ "Tomar una Foto ahora\n", + /*328*/ "Cargar Foto de la C疥ara\n", + /*329*/ "Cancelar\n", + /*330*/ "Cargar de la C疥ara\n", + /*331*/ "Elige foto a cargar de la c疥ara:\n", + /*332*/ "Cancelar\n", + /*333*/ "Tomar Foto\n", + /*334*/ "。Dispara!\n", + /*335*/ "Cancelar\n", + /*336*/ "Guardar Foto\n", + /*337*/ "Reintentar\n", + /*338*/ "Cargar PerfectHead\n", + /*339*/ "Inserta el Controller Pak\n", + /*340*/ "que contiene la cabeza\n", + /*341*/ "que quieres cargar en\n", + /*342*/ "cualquier mando.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancelar\n", + /*345*/ "Origen:\n", + /*346*/ "Cart. 1", + /*347*/ "Cart. 2", + /*348*/ "Cart. 3", + /*349*/ "Cart. 4", + /*350*/ "", + /*351*/ "Editor PerfectHead\n", + /*352*/ "Tomar otra foto\n", + /*353*/ "Cambiar Cabeza\n", + /*354*/ "Posicionar la Foto\n", + /*355*/ "Color de Cara y Pelo\n", + /*356*/ "Forma de la Cabeza\n", + /*357*/ "Quitar Cabeza\n", + /*358*/ "Cancelar Cambios\n", + /*359*/ "Mantener Cambios\n", + /*360*/ "Forma de la Cabeza\n", + /*361*/ "Profundidad\n", + /*362*/ "Aceptar\n", + /*363*/ "Cancelar\n", + /*364*/ "Posicionar la Imagen\n", + /*365*/ "Brillo\n", + /*366*/ "Aceptar\n", + /*367*/ "Cancelar\n", + /*368*/ "Elegir Cabeza\n", + /*369*/ "Aceptar\n", + /*370*/ "Cancelar\n", + /*371*/ "Quitar PerfectHead\n", + /*372*/ "ソEst疽 seguro de que quieres\n", + /*373*/ "quitar esta cabeza de la memoria?\n", + /*374*/ "Borrar\n", + /*375*/ "Cancelar\n", + /*376*/ "Cancelar Cambios\n", + /*377*/ "ソEst疽 seguro de que quieres\n", + /*378*/ "descartar tus cambios?\n", + /*379*/ "Descartar\n", + /*380*/ "Volver al Editor\n", + /*381*/ "Guardar PerfectHead\n", + /*382*/ "Has editado esta cabeza.\n", + /*383*/ "ソQuieres guardar tus cambios?\n", + /*384*/ "Mantener\n", + /*385*/ "Volver\n", + /*386*/ "Guardar PerfectHead\n", + /*387*/ "Tus cambios se mantendr疣 en la memoria.\n", + /*388*/ "ソQuieres guardar tus cambios\n", + /*389*/ "en el Controller Pak?\n", + /*390*/ "Guardar\n", + /*391*/ "No Guardar\n", + /*392*/ "Guardar PerfectHead\n", + /*393*/ "Puedes guardar tu cabeza en el\n", + /*394*/ "Controller Pak que desees.\n", + /*395*/ "Si quieres hacerlo, por favor,\n", + /*396*/ "asegrate de que el Controller Pak\n", + /*397*/ "est insertado y elige \"Guardar\".\n", + /*398*/ "Guardar\n", + /*399*/ "No Guardar\n", + /*400*/ "。Cabeza Completada!\n", + /*401*/ "Para usar tu cabeza en el simulador de combate,\n", + /*402*/ "elige la cabeza desde el men de personajes\n", + /*403*/ "en el men de par疥etros del jugador/simulante.\n", + /*404*/ "Tus cabezas de Misin aparecer疣 en\n", + /*405*/ "cualquier misin que juegues.\n", + /*406*/ "Puedes editar m疽 tu cabeza si quieres.\n", + /*407*/ "Finalizar\n", + /*408*/ "Editar Cabeza\n", + /*409*/ "Color de Cabeza\n", + /*410*/ "Cara:\n", + /*411*/ "Estilo de Pelo:\n", + /*412*/ "Aceptar\n", + /*413*/ "Cancelar\n", + /*414*/ "Pulsa el Botn B para volver.\n", + /*415*/ "Informacin del Hangar\n", + /*416*/ "Holoentrenamiento\n", + /*417*/ "Lista de Dispositivos\n", + /*418*/ "Informacin\n", + /*419*/ "Lugares\n", + /*420*/ "Vehculos\n", + /*421*/ "Perfiles de Personajes\n", + /*422*/ "Informacin Adicional\n", + /*423*/ "Estadsticas de Entrenamiento\n", + /*424*/ "Tiempo Necesitado:\n", + /*425*/ "。Completado!\n", + /*426*/ "。Fallado!\n", + /*427*/ "Aceptar\n", + /*428*/ "Reanudar\n", + /*429*/ "Cancelar\n", + /*430*/ "Abortar\n", + /*431*/ "Perfil del Personaje\n", + /*432*/ "Nombre:\n", + /*433*/ "Edad:\n", + /*434*/ "Raza:\n", + /*435*/ "Pulsa el Botn B para volver.\n", + /*436*/ "Trucos\n", + /*437*/ "Ahora es seguro apagar tu ordenador.\n", + /*438*/ "Cancelar\n", + /*439*/ "Bronce\n", + /*440*/ "Plata\n", + /*441*/ "Oro\n", + /*442*/ "Dificultad\n", + /*443*/ "Dificultad:\n", + /*444*/ "Elegir Dificultad:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informacin de Entrenamiento\n", + /*448*/ "Estadsticas de Entrenamiento\n", + /*449*/ "。Completado!\n", + /*450*/ "Puntuacin:\n", + /*451*/ "Blancos Destruidos:\n", + /*452*/ "Dificultad:\n", + /*453*/ "Tiempo Necesitado:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisin:\n", + /*456*/ "No Fallado\n", + /*457*/ "Sin Municin\n", + /*458*/ "Tiempo Acabado\n", + /*459*/ "Puntuacin Inalcanzable\n", + /*460*/ "Demasiado Impreciso\n", + /*461*/ "Diana\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Total\n", + /*466*/ "Puntuacin\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Lmite de Municin:\n", + /*472*/ "Lmite de Tiempo:\n", + /*473*/ "Precisin Mnima:\n", + /*474*/ "Blancos Necesarios:\n", + /*475*/ "Puntuacin Necesaria:\n", + /*476*/ "Trucos\n", + /*477*/ "Hecho\n", + /*478*/ "Cuidado\n", + /*479*/ "Si activas cualquier truco, ser疽\nincapaz de avanzar m疽 en el juego\nmientras ese truco est activo.\n", + /*480*/ "Aceptar\n", + /*481*/ "Cancelar\n", + /*482*/ "Jugador %d: ", + /*483*/ "。Pulsa START!\n", + /*484*/ "。Buscando C疥ara!\n", + /*485*/ "Calibrando C疥ara\n", + /*486*/ "Descargando Imagen\n", + /*487*/ "Cargando Imagen\n", + /*488*/ "Guardando Imagen\n", + /*489*/ "Transfiriendo Imagen\n", + /*490*/ "Cargando Segmento\n", + /*491*/ "Compr. Controller Pak\n", + /*492*/ "Obteniendo PerfectHead\n", + /*493*/ "Guardando PerfectHead\n", + /*494*/ "Autoajuste de C疥ara\n", + /*495*/ "Por favor... espera...\n", +}; diff --git a/src/files/lang/jap-final/mpweaponsE.c b/src/files/lang/jap-final/mpweaponsE.c new file mode 100644 index 000000000..13db3dc7e --- /dev/null +++ b/src/files/lang/jap-final/mpweaponsE.c @@ -0,0 +1,296 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ "Perfect Dark Registered Trademark No. 43666801\n", + /*282*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*283*/ NULL, + /*284*/ NULL, + /*285*/ NULL, + /*286*/ NULL, + /*287*/ NULL, + /*288*/ NULL, + /*289*/ NULL, + /*290*/ NULL, + /*291*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweaponsJ.c b/src/files/lang/jap-final/mpweaponsJ.c new file mode 100644 index 000000000..2aa27a4cb --- /dev/null +++ b/src/files/lang/jap-final/mpweaponsJ.c @@ -0,0 +1,296 @@ +#include + +char *lang[] = { + /* 0*/ "%s モ\n♂-゚マユ∈\nみマ√∨\n", + /* 1*/ "%s モ\nミ゚ハロフ∈\nみマ√∨\n", + /* 2*/ "%s モ\n%s メ\nミ゚ハロフ∈\nみマ√∨\n", + /* 3*/ "%s モ\nゆeメ\nミ゚ハロフ∈\nみマ√∨\n", + /* 4*/ "%s メ\nミ゚ハロフ∈\nみマ√∨\n", + /* 5*/ "%s メ\nミ゚ハロフ♭\n刀楳ムマ縲エ\n", + /* 6*/ "%s モ\nゆeメ\nミ゚ハロフ♭\n刀楳ムマ縲エ\n", + /* 7*/ "%s モ\n%s メ\nミ゚ハロフ♭\n刀楳ムマ縲エ\n", + /* 8*/ "Κヨ#ムマ縲エ\n", + /* 9*/ "┻ぶメヤ蛛ク\n", + /* 10*/ "ほナ⇔ナリエ∨エ\n", + /* 11*/ "ロエ\n", + /* 12*/ "ヤ蛛クほナ∨エ\n", + /* 13*/ "秩楳ムマ繙ハΗ\n", + /* 14*/ "⊆∃∨∵ヤ藹n", + /* 15*/ "%s\n∈ぎ√エ\n", + /* 16*/ "%s\n∈ほヌエ\n", + /* 17*/ "騾ハヨマΤ┯\n", + /* 18*/ "ムだ∵で磨縺リナ∨\n", + /* 19*/ "騾ハヨマラリ\n", + /* 20*/ "♂d゚マユ∵ョャ\n", + /* 21*/ "宦痰エ\n", + /* 22*/ "宦痲ラリエ\n", + /* 23*/ "%s ∵\n宦痲ラリエ\n", + /* 24*/ "%dロ巣ホ\n", + /* 25*/ "早楳ムマ縲エ\n", + /* 26*/ "ロd♀シナ\n", + /* 27*/ "ヤd縲烙ハラ\n", + /* 28*/ "リハ縲マ烙ヒ\n", + /* 29*/ "ロフマ綵n", + /* 30*/ "宦畚n", + /* 31*/ "÷準ナdレム綵n", + /* 32*/ "ミ゚ハロフリdワ曾n", + /* 33*/ "¢ワ縲盾モラョ曾n", + /* 34*/ "ミ゚ハロフリdワ箪n", + /* 35*/ "ワ$ムラdラ\n", + /* 36*/ "fム遵」なЫn", + /* 37*/ "ワムd\n", + /* 38*/ "縲マヨム=\n", + /* 39*/ "ワddロヘマ\n", + /* 40*/ "ワ゚d縺準゚マ\n", + /* 41*/ "#d<m\n", + /* 42*/ "ユワ゚\n", + /* 43*/ "マ≧\n", + /* 44*/ "マ≧表n", + /* 45*/ "ムぞq\n", + /* 46*/ "ンマレd」、\n", + /* 47*/ "ォマ烙ヒ\n", + /* 48*/ "マ烙ヒ\n", + /* 49*/ "」なЫn", + /* 50*/ "ワ凾濬n", + /* 51*/ "′dЫn", + /* 52*/ "究ゥ圭n", + /* 53*/ "ナdレム綵n", + /* 54*/ "$dЫn", + /* 55*/ "δ揩煕Ыn", + /* 56*/ "¢ワ縲Ыn", + /* 57*/ "窶ワ綵n", + /* 58*/ "楳ヲ窶ワ綵n", + /* 59*/ "シナ\n", + /* 60*/ "ロd♀\n", + /* 61*/ "シワ\n", + /* 62*/ "しじ\n", + /* 63*/ "あゎ\n", + /* 64*/ "ぼぶあゎ\n", + /* 65*/ "$ハラあ能n", + /* 66*/ "モぱ√⇔⊇≫∩ナチ\n", + /* 67*/ "ムだト√⇔⊇リヌ∋\n", + /* 68*/ "ンт∈艨ル≫\n", + /* 69*/ "⌒⊂cΞ\n", + /* 70*/ "ルマ縲d$ハラ∈\n∝マだツ≫\n", + /* 71*/ "$ハラ\n", + /* 72*/ "モ=サエ⊇♭ニツ\nンd″ニ≫マモ\n操閧о縲逐%d≠\n∵ョャ♭ニツ\n", + /* 73*/ "", + /* 74*/ "ィ、\n", + /* 75*/ "ササササササササ\n", + /* 76*/ "゙$マ濬n", + /* 77*/ "ワ$ムラdラ\n", + /* 78*/ "シwd♀\n", + /* 79*/ "ヤdの┸ム゙Ыn", + /* 80*/ "、シl\n", + /* 81*/ "、シl準d♀あャ\n", + /* 82*/ "ワddロヘマム゙Ыn", + /* 83*/ "捩、d♀\n", + /* 84*/ "縲マ縺メ艢も\n", + /* 85*/ "ナdレム綵n", + /* 86*/ "゚ム蛯пヘミマ臀n", + /* 87*/ "wワd\n", + /* 88*/ "ロd♀はヮモ沃Ыn", + /* 89*/ "ロd♀はヮ\n", + /* 90*/ "ワd$dロd♀\n", + /* 91*/ "ラロハラろ├\n", + /* 92*/ "ラなワ゚ハメル\n", + /* 93*/ "モ′ワ♭£ム\n", + /* 94*/ "ュwォマ烙ヒ\n", + /* 95*/ "ハ£縲ハ£翌トδも遵、シl\n", + /* 96*/ "ュwヤみ\n", + /* 97*/ "揉園d♀\n", + /* 98*/ "¥ラレd\n", + /* 99*/ "ハ縲ロヘハ綵n", + /*100*/ "黴ハ縲劇マ\n", + /*101*/ "モムミマ\n", + /*102*/ "ォ縲ハユマオカの┸モ予n", + /*103*/ "ォマ烙ヒ\n", + /*104*/ "ャム\n", + /*105*/ "アワヨヒマ\n", + /*106*/ "ャ♀÷マ\n", + /*107*/ "ハ£縲ハ£マ\n", + /*108*/ "ネ蛟ラワ\n", + /*109*/ "レムヨハラマ\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "℃℃ハ縲≧dラ\n", + /*119*/ "∪∨メナル\n", + /*120*/ "d£ム\n", + /*121*/ "メネ#マ\n", + /*122*/ "烽оム綵n", + /*123*/ "≠ヘミマ艫メの┸ム゙Ыn", + /*124*/ "ラロハラメネ#マム゙Ыn", + /*125*/ "♂d゚≧ムマ┨凍割リて", + /*126*/ "♂d゚≧ムマ┨凍鰍コ", + /*127*/ "モミ斧操潟ナば", + /*128*/ "モミ斧操鰍ィぁ", + /*129*/ "モミ斧操鰍桙麾", + /*130*/ "ィ諠ャセ\n", + /*131*/ "ム烽о縲о゙ハロヘマ\n", + /*132*/ "ム烽о縲оルマ°ハ縲ロフd゚\n", + /*133*/ "ム烽о縲р」bハロヘマ\n", + /*134*/ "ム烽о縲р翌ハロヘマ\n", + /*135*/ "£ム♀∃ナ\n", + /*136*/ "烽о繧ヨ\n", + /*137*/ "窿ぃいセ", + /*138*/ "ワ竄пセ", + /*139*/ "∈ラミニ√†セ", + /*140*/ "ィ諠ャセ", + /*141*/ "lンセ", + /*142*/ "", + /*143*/ "∈烙ネハラナ∨⊇烽о縺クツ∋♭フト⊇ツ\n", + /*144*/ "窿ぃいぅbセ", + /*145*/ "キべ縲d蛟マ♭÷d♀≧∈∨チト∋ハ縲ツ\n", + /*146*/ "ろ├メモ予n", + /*147*/ "ろ├∈ケマモ予n", + /*148*/ "<d媾n", + /*149*/ "、ヌメモ予n", + /*150*/ "の┸d♀モ予n", + /*151*/ "%ムマ縺盾о\n", + /*152*/ "゚焉メモ予n", + /*153*/ "ハロヘマ゚ム\n", + /*154*/ "d♀\n", + /*155*/ "怎畚n", + /*156*/ "しじ∈ヌ秉nナリニ∩タ\n", + /*157*/ "」捩=dワd畚n", + /*158*/ "」捩ヤニワ\n", + /*159*/ "モ′ワ準烙ヘハヨ\n", + /*160*/ "モd\n", + /*161*/ "テメナムモヨm\n∃メ♭ヱぁヰリヌ∋\n", + /*162*/ "ヨヒマン\n", + /*163*/ "lンセ\n", + /*164*/ "淀エソ┳Ηπセ\n", + /*165*/ "淀エホをΗπセ\n", + /*166*/ "烙ヒマ≠準ラミエ\n", + /*167*/ "烙ヒマ≠盾エ\n", + /*168*/ "烙ヒマ≠準烽о繧ヨエ\n", + /*169*/ "ロ轢メ゚濬n", + /*170*/ "dmメ゚濬n", + /*171*/ "゚ム縲ワラdマ∧メ箪n", + /*172*/ "烙ヒマ≠ワ゚d綵n", + /*173*/ "♂d゚≧ムマxフ", + /*174*/ "モd\n", + /*175*/ "ナメルマ縲d\n$ハラ∵⊆≪リヌ∋\n", + /*176*/ "ンт∈艨ル≫\n", + /*177*/ "テメルマ縲d\n$ハラ∈ンтナ⇔⌒\n≡∽ナ⊇♭ニ∩タ\n", + /*178*/ "♂d゚モん∝√リニエ\n", + /*179*/ "ヨヒマン\n", + /*180*/ "ンтニ≫\n", + /*181*/ "ンт\n", + /*182*/ "ルマ縲d$ハラモ\nンтト√リナ∨\n", + /*183*/ "ンтん\n", + /*184*/ "ルマ縲d$ハラメ\nンтマんナリナ∨\nテメルマ縲d\n$ハラモ⊃リヌ∋\n", + /*185*/ "騾マ♂ニ\n", + /*186*/ "L/R: ", + /*187*/ "C-UP: ", + /*188*/ "C-LEFT/RIGHT: ", + /*189*/ "C-DOWN: ", + /*190*/ "A: ", + /*191*/ "B: ", + /*192*/ "3D: ", + /*193*/ "Z: ", + /*194*/ "+ PAD: ", + /*195*/ "ろ├死d♀", + /*196*/ "ろ├私磨瘋ヤ⊃", + /*197*/ "にヒ驕", + /*198*/ "にフ∽ニ", + /*199*/ "にフ∽ニ", + /*200*/ "にヒ驕", + /*201*/ "揩キ", + /*202*/ "°ハラ", + /*203*/ "レム♀ワ窶ハ£", + /*204*/ "の┸ツテ", + /*205*/ "ミラロヘマスd♀", + /*206*/ "べ⇒", + /*207*/ "┴てス゚dマ", + /*208*/ "にぴナ", + /*209*/ "┴てスレム♀ワ窶ハ£", + /*210*/ "にぴナスレム♀ワ窶ハ£", + /*211*/ "怐準゚マ∀", + /*212*/ "ルマ縲d操セ", + /*213*/ "ルマ縲d逐セ", + /*214*/ "宴ロd♀ %s %s\n", + /*215*/ "ム漕ソd♀", + /*216*/ "ム中ソd♀", + /*217*/ "の┸ツテd♀セラムハラ蛟フd\n它d♀セの┸d♀メ昧ヤ\n它ケべ⇒セの┸d♀メcン昧ヤ\nろ├ケ怫フセナオ∵∠\nろ├ケ怫ヒセ⇒\n", + /*218*/ "ュ⇔メ烽о縺クシワマニ≫\n", + /*219*/ "ワマィ麾歃n", + /*220*/ "d=d「捩セ\n", + /*221*/ "$ワd♀セ\n", + /*222*/ "ワ%ロヒ\n", + /*223*/ "┓ヤ£ロヘマセ\n", + /*224*/ "wメワ¢d♀セ\n", + /*225*/ "wメkbセ\n", + /*226*/ "wメコトセ\n", + /*227*/ "wメ驍劫・セ\n", + /*228*/ "ィ、\n", + /*229*/ "ヨヒマン\n", + /*230*/ "ルマ縲d$ハラ∵に⇒∩≪リヌ∋\n", + /*231*/ "轤оセ\n", + /*232*/ "リ轢セ\n", + /*233*/ "ササ┛Χササ\n", + /*234*/ "シナム∵ヨリ\n", + /*235*/ "", + /*236*/ "シ掾メぬね\n", + /*237*/ "リ轣メぬね\n", + /*238*/ "ヨヒマン\n", + /*239*/ "ナムシメぬね\n", + /*240*/ "ル∨∃ナムシセ\n", + /*241*/ "ル¢dナメナム\n∃メ♭ヱ♭タリヌ∋\n", + /*242*/ "§揩曹窒凍セ%d\n", + /*243*/ "゚dハ縲゚ムセ\n", + /*244*/ "ル∨∃烽о縺クハΗエセ\n", + /*245*/ "だツ≫\n", + /*246*/ "⌒⊂cΞ£ムニ≫\n", + /*247*/ "ソ┳ヌメンd″\n", + /*248*/ "ソ┳ヌ∈\nンd″ナリニ∩タ\n", + /*249*/ "ンd″ニ≫\n", + /*250*/ "ンd″ナ∃⊇\n", + /*251*/ "£ムd轤оセ\n", + /*252*/ "ンd″ナムモ\nば閨メ∨⊥マ\nヱト√リナ∨\n", + /*253*/ "だツ≫\n", + /*254*/ "モd\n", + /*255*/ "d¥dムメユd縲ハ≠∈\n栫ルっ⊥リヌ∋ツムだ∵ナ⊇\n∩÷ユd縲ハ≠∵ナ⊇∩∈\nせどナ⇔フト⊇ツ\n", + /*256*/ "ヨヒマン\n", + /*257*/ "モd\n", + /*258*/ "ンd″ナムモ\n", + /*259*/ "ば閨メ∨⊥マ\n", + /*260*/ "ヱト√リナ∨\n", + /*261*/ "ヨヒマン\n", + /*262*/ "マd≠ツテセ\n", + /*263*/ "ムマハロフ\n", + /*264*/ "マ濬n", + /*265*/ "≠ヒdマ\n", + /*266*/ "ム゚ミマ\n", + /*267*/ "ワ$蛟ハロフ\n", + /*268*/ "ミユマ\n", + /*269*/ "マd≠セ\n", + /*270*/ "マd≠\n", + /*271*/ "宴ロd♀\n", + /*272*/ "ムπ┴てメヒフメ\n", + /*273*/ "翌ト揩ヤムπ\n", + /*274*/ "ネメ∇√\n", + /*275*/ "翌トろ├\n", + /*276*/ "ろ├ヌ\n", + /*277*/ "d♀\n", + /*278*/ "磨瘋ヤ⊃\n", + /*279*/ "ロ轢メ゚濬n", + /*280*/ "dmメ゚濬n", + /*281*/ "Perfect Dark Registered Trademark No. 4366801\n", + /*282*/ "テメdマモ÷d諷$ハラ\n", + /*283*/ "∵ョャ♭ニツ順吹ナチモdメ寐ス\n", + /*284*/ "ゎミ∈∪栫ルフト⊇ツ準準準準準十n", + /*285*/ "ルマ縲dル轢ラ゚早マ\n", + /*286*/ "ルマ縲d∵ムだト√⇔⊇リヌ∋ツ\n", + /*287*/ "┨kメλυ∈磨エ⇔∩≒\n", + /*288*/ "ルマ縲d∈ムだナ⇔フト⊇ツ\n", + /*289*/ NULL, + /*290*/ NULL, + /*291*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweaponsP.c b/src/files/lang/jap-final/mpweaponsP.c new file mode 100644 index 000000000..b2f6dad7d --- /dev/null +++ b/src/files/lang/jap-final/mpweaponsP.c @@ -0,0 +1,296 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "Fran軋is\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, + /*284*/ NULL, + /*285*/ NULL, + /*286*/ NULL, + /*287*/ NULL, + /*288*/ NULL, + /*289*/ NULL, + /*290*/ NULL, + /*291*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_f.c b/src/files/lang/jap-final/mpweapons_str_f.c new file mode 100644 index 000000000..1d97c6827 --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_f.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtient:\nR馗epteur\n", + /* 1*/ "%s obtient:\nMallette\n", + /* 2*/ "%s obtient:\nMallette %s\n", + /* 3*/ "%sa notre\nMallette\n", + /* 4*/ "Mallette %s", + /* 5*/ "Vous capturez:\nMallette %s\n", + /* 6*/ "%s capture notre\nMallette\n", + /* 7*/ "%s capture:\nMallette %s\n", + /* 8*/ "Un point pour survivre!\n", + /* 9*/ "Il faut s'occuper de\n", + /* 10*/ "vos amis!\n", + /* 11*/ "Bien jou!\n", + /* 12*/ "Vous d馗apsulez!\n", + /* 13*/ "2 Points...\n", + /* 14*/ "Vous 黎es la victime!\n", + /* 15*/ "Prot馮ez %s!\n", + /* 16*/ "Abattez %s!\n", + /* 17*/ "T駘馗hargement r騏ssi.\n", + /* 18*/ "Connexion perdue.\n", + /* 19*/ "D饕ut t駘馗hargement.\n", + /* 20*/ "Il faut utiliser le r馗epteur.\n", + /* 21*/ "Roi de\nla zone!\n", + /* 22*/ "Vous avez\nla zone!\n", + /* 23*/ "%sa captur饅nla zone!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "Pas de bouclier\n", + /* 27*/ "Automatiques\n", + /* 28*/ "L-roquettes\n", + /* 29*/ "Simulants\n", + /* 30*/ "Roi de la zone\n", + /* 31*/ "Complexe FarSight\n", + /* 32*/ "Tenir la mallette\n", + /* 33*/ "Pistolets meurtriers\n", + /* 34*/ "Capturer la mallette\n", + /* 35*/ "Occultage\n", + /* 36*/ "Temple Explosifs\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquil.\n", + /* 39*/ "Ralenti\n", + /* 40*/ "Appuyer sur START\n", + /* 41*/ "En pause\n", + /* 42*/ "Custom\n", + /* 43*/ "Hasard\n", + /* 44*/ "Hasard 5\n", + /* 45*/ "Corps corps\n", + /* 46*/ "Mine proximit饅n", + /* 47*/ "L-roquettes\n", + /* 48*/ "Lance-grenades\n", + /* 49*/ "Explosif\n", + /* 50*/ "Magnum d'Or\n", + /* 51*/ "Lourd\n", + /* 52*/ "Tranquil.\n", + /* 53*/ "FarSight\n", + /* 54*/ "Puissant\n", + /* 55*/ "Automatiques\n", + /* 56*/ "Pistolets\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Rien\n", + /* 60*/ "Bouclier\n", + /* 61*/ "Annul饅n", + /* 62*/ "Objectifs remplis\n", + /* 63*/ "Inconnu\n", + /* 64*/ "Manquant\n", + /* 65*/ "Controller Pak ins駻饅n", + /* 66*/ "endommag ou\n", + /* 67*/ "mal branch.\n", + /* 68*/ "Tenter r駱ar.\n", + /* 69*/ "Recommencer\n", + /* 70*/ "Ne pas utiliser\n Controller Pak\n", + /* 71*/ "Controller Pak ins駻饅n", + /* 72*/ "Espace libre insuf.:\n1 note et 28 pages\nrequises.\n", + /* 73*/ "Utiliser le menu\npour faire de la place\n(maintenir START\nen allumant.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Poings du dragon\n", + /* 77*/ "Occulteur\n", + /* 78*/ "Invincible\n", + /* 79*/ "Toutes les armes en solo\n", + /* 80*/ "Munitions infinies\n", + /* 81*/ "Munit. inf. Pas de recharg.\n", + /* 82*/ "Ralenti\n", + /* 83*/ "Mode DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Petite Joanna\n", + /* 87*/ "Petits personnages\n", + /* 88*/ "Boucliers Ennemis\n", + /* 89*/ "Joanna bouclier\n", + /* 90*/ "Super bouclier\n", + /* 91*/ "Vis馥 classique\n", + /* 92*/ "T黎es 駲uipe seulement\n", + /* 93*/ "Jouer Elvis\n", + /* 94*/ "Ennemis roquettes\n", + /* 95*/ "Munit. inf. Laptop sentinelle\n", + /* 96*/ "Ennemis boxeurs\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugiliste\n", + /* 99*/ "Hotshot\n", + /*100*/ "Touche et tire\n", + /*101*/ "Extraterrestre\n", + /*102*/ "Pisteur-R / Coffres armes\n", + /*103*/ "Lance-roquettes\n", + /*104*/ "Fusil sniper\n", + /*105*/ "Scan rayonsX\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Sp馗ial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Jouabilit饅n", + /*121*/ "Armes\n", + /*122*/ "Amis\n", + /*123*/ "Armes pour Joanna en solo\n", + /*124*/ "Armes classiques pour Joanna en solo\n", + /*125*/ "D駸ertion dataDyne", + /*126*/ "Extraction dataDyne ", + /*127*/ "Infiltration S51 ", + /*128*/ "Sauvetage S51", + /*129*/ "Fuite S51", + /*130*/ "Difficult:\n", + /*131*/ "Triche Missions Solo\n", + /*132*/ "Triche Simulateur Combat\n", + /*133*/ "Triche Coop駻atif\n", + /*134*/ "Triche Contre-Op駻ation\n", + /*135*/ "D駸honneur\n", + /*136*/ "Tricheur\n", + /*137*/ "Triche disponible", + /*138*/ "Terminer", + /*139*/ "pour Triche:", + /*140*/ "sur", + /*141*/ "sous", + /*142*/ " ou brancher Perfect Dark Game Boy (r) dans le Transfer Pak (tm), connectez le Transfer Pak dans une manette , sortez et acc馘ez au menu", + /*143*/ "Choix Triche pour information\n", + /*144*/ "Ami disponible", + /*145*/ "Gagner Or sur le champ de tir pour les armes classiques.\n", + /*146*/ "Vis馥 l'馗ran\n", + /*147*/ "Cible\n", + /*148*/ "Port馥 zoom\n", + /*149*/ "Voir munit.\n", + /*150*/ "Fonction arme\n", + /*151*/ "Paintball\n", + /*152*/ "Sous-titres\n", + /*153*/ "Temps mission\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Voulez-vous abandonner\nla mission?\n", + /*157*/ "Joanna Cuir\n", + /*158*/ "Joanna N馮ociatrice\n", + /*159*/ "Elvis (gilet)\n", + /*160*/ "Erreur\n", + /*161*/ "Op駻. impossible.\nUtilisation en cours.\n", + /*162*/ "Annuler\n", + /*163*/ "Limite temps:\n", + /*164*/ "Limite score:\n", + /*165*/ "Limite score 駲uipe:\n", + /*166*/ "Challenge r騏ssi!\n", + /*167*/ "Challenge 馗hou!\n", + /*168*/ "Challenge trich!\n", + /*169*/ "Sous-titres cin饅n", + /*170*/ "Sous-titres jeu\n", + /*171*/ "Ecran titre optionnel\n", + /*172*/ "Commencer Challenge\n", + /*173*/ "Enqu黎e dataDyne", + /*174*/ "Erreur\n", + /*175*/ "Le Controller Pak\na 騁 enlev.\n", + /*176*/ "Tentative r駱aration\n", + /*177*/ "Tenter une\nr駱aration du\nController Pak?\n", + /*178*/ "Donn馥 黎re\nperdue!\n", + /*179*/ "Annuler\n", + /*180*/ "R駱arer\n", + /*181*/ "R駱aration r騏ssie\n", + /*182*/ "Controller Pak\nr駱ar.\n", + /*183*/ "R駱aration 馗hou馥\n", + /*184*/ "Controller Pak\nne peut 黎re r駱ar.\nSauvegarde ou\nchargement impossible\navec ce Cont. Pak.\n", + /*185*/ "Handicap\n", + /*186*/ "BOUTONS L/R: ", + /*187*/ "BOUTON C HAUT: ", + /*188*/ "BOUTONS C G/D: ", + /*189*/ "BOUTON C BAS: ", + /*190*/ "BOUTON A: ", + /*191*/ "BOUTON B: ", + /*192*/ "STICK ANALOG.: ", + /*193*/ "BOUTON Z: ", + /*194*/ "MANETTE +: ", + /*195*/ "VISER", + /*196*/ "ALT. VISER", + /*197*/ "REGARDER HAUT", + /*198*/ "REGARDER BAS", + /*199*/ "REGARDER BAS", + /*200*/ "REGARDER HAUT", + /*201*/ "AVANT", + /*202*/ "ARRIERE", + /*203*/ "DEP. LATERAL", + /*204*/ "ARME", + /*205*/ "ACTION/RECHARGER", + /*206*/ "FEU", + /*207*/ "MARCHER/TOURNER", + /*208*/ "REGARDER", + /*209*/ "MARCHER/LATERAL", + /*210*/ "REGARDER/LATERAL", + /*211*/ "COMME BOUTONS C", + /*212*/ "MAnette 1:", + /*213*/ "Manette 2:", + /*214*/ "Style contrle %s %s\n", + /*215*/ "(Une main)", + /*216*/ "(Deux mains)", + /*217*/ "Maintenir bouton d'arme pour menu rapide.\nMaintenir action pour autre fonction.\nAction+Feu pour changer de fonction.\nViser pour plus de pr馗ision.\nViser + Bouton C Bas pour s'accroupir.\nViser + Bouton C Haut pour se lever.\n", + /*218*/ "D駸activer toutes les triches\n", + /*219*/ "Filtre langage\n", + /*220*/ "UTILISATEUR:\n", + /*221*/ "MOT DE PASSE:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choix param鑼res:\n", + /*224*/ "Vit. r饌ction ennemis:\n", + /*225*/ "Vie ennemis:\n", + /*226*/ "D馮穰s ennemis:\n", + /*227*/ "Pr馗ision ennemis:\n", + /*228*/ "OK\n", + /*229*/ "Annuler\n", + /*230*/ "Controller Pak introuvable\n", + /*231*/ "Nom:\n", + /*232*/ "Emplacement:\n", + /*233*/ "Dupliquer nom fichier\n", + /*234*/ "contient d駛濬n", + /*235*/ "un fichier nomm饅n", + /*236*/ "Renommer fichier\n", + /*237*/ "Changer emplacement\n", + /*238*/ "Annuler\n", + /*239*/ "Changer nom fichier\n", + /*240*/ "Nouveau nom fichier:\n", + /*241*/ " Le fichier en copie\nne peut 黎re effac.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Temps sp馗ial:\n", + /*244*/ "Nouvelle triche disponible:\n", + /*245*/ "Continuer\n", + /*246*/ "Recommencer dernier niveau\n", + /*247*/ "Sauver joueur\n", + /*248*/ "Sauver nouveau joueur\net stats?\n", + /*249*/ "Sauver maintenant\n", + /*250*/ "Non merci!\n", + /*251*/ "Confirmer nom joueur:\n", + /*252*/ "Le fichier sauv饅na 騁 effac:\ncorrupu ou\nendommag.\n", + /*253*/ "Continuer\n", + /*254*/ "Erreur\n", + /*255*/ "Cartouche Game Boy illisible.\nV駻ifier connexions et s'assurer\nque la bonne cartouche est\nutilis馥.\n", + /*256*/ "Annuler\n", + /*257*/ "Erreur\n", + /*258*/ "La sauvegarde a 騁饅n", + /*259*/ "effac馥: corrompue\n", + /*260*/ "ou endommag馥.\n", + /*261*/ "Annuler\n", + /*262*/ "Choix de langue:\n", + /*263*/ "English\n", + /*264*/ "Fran軋is\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "American\n", + /*269*/ "Langue:\n", + /*270*/ "Langue\n", + /*271*/ "Style contrle\n", + /*272*/ "Vis馥 inv.\n", + /*273*/ "Voir droit\n", + /*274*/ "Vue t黎e\n", + /*275*/ "Vis馥 auto\n", + /*276*/ "Contrle cible\n", + /*277*/ "Fixe\n", + /*278*/ "Alt.\n", + /*279*/ "Sous-titres cin饅n", + /*280*/ "Sous-titres jeu\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_g.c b/src/files/lang/jap-final/mpweapons_str_g.c new file mode 100644 index 000000000..76a7f4616 --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_g.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shat den\nData Uplink\n", + /* 1*/ "%shat den\nAktenkoffer\n", + /* 2*/ "%shat den Koffer von %s\n", + /* 3*/ "%shat unseren\nAktenkoffer\n", + /* 4*/ "Aktenkoffer von %s geschnappt\n", + /* 5*/ "Sie haben den\nAktenkoffer von %s geschnappt.\n", + /* 6*/ "%shat unseren\nAktenkoffer geschnappt.\n", + /* 7*/ "%shat den\nAktenkoffer von %s geschnappt.\n", + /* 8*/ "Wieviel ist Ihnen das Leben wert?\n", + /* 9*/ "Sie sollten Ihr Team nicht\n", + /* 10*/ "angreifen!\n", + /* 11*/ "Gut gemacht!\n", + /* 12*/ "Einer weniger!\n", + /* 13*/ "Ist Ihnen das Leben noch immer etwas wert?\n", + /* 14*/ "Sie sind das Opfer!\n", + /* 15*/ "Beschtzen Sie %s!\n", + /* 16*/ "Schnappen Sie %s!\n", + /* 17*/ "Download erfolgreich.\n", + /* 18*/ "Verbindung abgebrochen.\n", + /* 19*/ "Download gestartet.\n", + /* 20*/ "Sie mssen den Data Uplink einsetzen.\n", + /* 21*/ "Herr des\nHgels!\n", + /* 22*/ "Der Hgel\nist unser!\n", + /* 23*/ "%shat den Hgel\nerobert!\n", + /* 24*/ "%ds/Punkt\n", + /* 25*/ "1 Punkt!\n", + /* 26*/ "Kein Schild\n", + /* 27*/ "Auto\n", + /* 28*/ "Raketenw.\n", + /* 29*/ "Simulanten\n", + /* 30*/ "Herr des Hgels\n", + /* 31*/ "Weitsicht\n", + /* 32*/ "Der Koffer 1\n", + /* 33*/ "Hchste Vorsicht\n", + /* 34*/ "Der Koffer 2\n", + /* 35*/ "Tarnung\n", + /* 36*/ "Sprengs.\n", + /* 37*/ "Slayer\n", + /* 38*/ "B-Gewehr\n", + /* 39*/ "Zeitlupe\n", + /* 40*/ "Drcken Sie START\n", + /* 41*/ "Pause\n", + /* 42*/ "individuell\n", + /* 43*/ "zuf舁lig\n", + /* 44*/ "Fnf Zuf.\n", + /* 45*/ "Nahkampf\n", + /* 46*/ "A-Mine\n", + /* 47*/ "Raketenw.\n", + /* 48*/ "Granatw.\n", + /* 49*/ "Sprengs.\n", + /* 50*/ "G-Magnum\n", + /* 51*/ "Schwere\n", + /* 52*/ "Bet.-Gewehr\n", + /* 53*/ "Fernsicht\n", + /* 54*/ "Power\n", + /* 55*/ "Autom.\n", + /* 56*/ "Pistolen\n", + /* 57*/ "Test\n", + /* 58*/ "4 MB-Test\n", + /* 59*/ "Nichts\n", + /* 60*/ "Schild\n", + /* 61*/ "Nicht belegt\n", + /* 62*/ "Alle Ziele erreicht\n", + /* 63*/ "Unbekannt\n", + /* 64*/ "Vermisst\n", + /* 65*/ "Contr.-Pak besch臈igt\n", + /* 66*/ "ist besch臈igt oder\n", + /* 67*/ "nicht korrekt eingelegt.\n", + /* 68*/ "Schaden beheben\n", + /* 69*/ "Nochmals versuchen\n", + /* 70*/ "Ohne Controller Pak \nfortfahren\n", + /* 71*/ "Controller Pak ist voll\n", + /* 72*/ "ist zu voll, um zu \nspeichern - Es werden 28 \nfreie Seiten bentigt.\n", + /* 73*/ "Schaffe im Controller Pak \nMen ausreichend Platz. \n(Halte w臧rend des Einschaltens \nSTART gedrckt.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane-Faust\n", + /* 77*/ "Tarnkappe\n", + /* 78*/ "Unbesiegbar\n", + /* 79*/ "Alle Waffen verfgbar\n", + /* 80*/ "Unbegrenzte Munition\n", + /* 81*/ "Unbegrenzte Munition, kein Nachladen\n", + /* 82*/ "Zeitlupen-Modus\n", + /* 83*/ "DK-Modus\n", + /* 84*/ "Trents Magnum\n", + /* 85*/ "Fernsicht\n", + /* 86*/ "Mini-Jo\n", + /* 87*/ "Kleine Charaktere\n", + /* 88*/ "Feinde mit Schild\n", + /* 89*/ "Jo mit Schild\n", + /* 90*/ "Super-Schild\n", + /* 91*/ "Klassische Sicht\n", + /* 92*/ "Nur Kpfe des Teams\n", + /* 93*/ "Elvis\n", + /* 94*/ "Feinde mit Raketen\n", + /* 95*/ "Unbegr. Muni fr Selbstschuss-Anlage\n", + /* 96*/ "Marquis of Queensbury-Regeln\n", + /* 97*/ "Perfekte Dunkelheit\n", + /* 98*/ "Boxer\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Munitions-Fundorte\n", + /*103*/ "Raketenw.\n", + /*104*/ "Sniper-Gewehr\n", + /*105*/ "Rntgen-Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop-Gewehr\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis-Gewehr\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KLO1313\n", + /*113*/ "KF7 Spezial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Waffen\n", + /*122*/ "Kumpel\n", + /*123*/ "Waffen fr Jo im Solo-Modus\n", + /*124*/ "Klassische Waffe fr Jo im Solo-Modus\n", + /*125*/ "dataDyne ワberlauf", + /*126*/ "dataDyne Extraktion", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rettung", + /*129*/ "A51 Flucht", + /*130*/ "Schwierigkeit:\n", + /*131*/ "Cheat Solo Missionen\n", + /*132*/ "Cheat Kampf-Simulator\n", + /*133*/ "Cheat Teamwork\n", + /*134*/ "Cheat Counter Operative-Modus\n", + /*135*/ "Entehrt\n", + /*136*/ "Gecheated\n", + /*137*/ "Cheat verfgbar", + /*138*/ "Komplettierung", + /*139*/ "fr den Cheat:", + /*140*/ "auf", + /*141*/ "in weniger als ", + /*142*/ " oder legen Sie Perfect Dark - Game Boy (R) in das Transfer Pak (TM) ein. Legen Sie ein Transfer Pak in einen beliebigen Controller ein, und gehen Sie ins Men.", + /*143*/ "W臧len Sie den Cheat fr mehr Infos aus.\n", + /*144*/ "Kumpel verfgbar", + /*145*/ "Erlangen Sie Gold am Schie゚stand, um klassische Waffen anzuw臧len.\n", + /*146*/ "Display\n", + /*147*/ "Ziel\n", + /*148*/ "Zoom\n", + /*149*/ "Munition\n", + /*150*/ "Funktion\n", + /*151*/ "Paintball\n", + /*152*/ "Text\n", + /*153*/ "Zeit\n", + /*154*/ "Sound\n", + /*155*/ "Split\n", + /*156*/ "Mchten Sie die Mission\nabbrechen?\n", + /*157*/ "Joanna in Leder\n", + /*158*/ "Joanna als Unterh舅dler\n", + /*159*/ "Elvis (Weste)\n", + /*160*/ "Error\n", + /*161*/ "File ist aktiv. Aktive \nFiles knnen nicht \ngelscht werden.\n", + /*162*/ "Abbrechen\n", + /*163*/ "Zeit-Limit:\n", + /*164*/ "Score-Limit:\n", + /*165*/ "Team Score-Limit:\n", + /*166*/ "Abgeschlossen!\n", + /*167*/ "Fehlgeschlagen!\n", + /*168*/ "CHEATER!\n", + /*169*/ "Cutscene Untertitel\n", + /*170*/ "In-Game Untertitel\n", + /*171*/ "Alternativer Titelbildschirm\n", + /*172*/ "Challenge beginnen\n", + /*173*/ "dataDyne Untersuchung", + /*174*/ "Error\n", + /*175*/ "Das Controller Pak \nwurde entfernt.\n", + /*176*/ "Schaden beheben\n", + /*177*/ "Sind Sie sicher, dass \nSie das Controller Pak \nreparieren wollen)\n", + /*178*/ "Datenverlust\nmglich!\n", + /*179*/ "Abbruch\n", + /*180*/ "Reparatur\n", + /*181*/ "Reparatur erfolgreich\n", + /*182*/ "Das Controller Pak \nwurde repariert.\n", + /*183*/ "Reparatur nicht OK\n", + /*184*/ "Das Controller Pak \nkann nicht repariert\nwerden. Sie knnen\nkeine Daten laden \noder speichern.\n", + /*185*/ "Handicaps\n", + /*186*/ "L/R-TASTEN: ", + /*187*/ "C OBEN: ", + /*188*/ "C LINKS/RECHTS: ", + /*189*/ "C UNEN: ", + /*190*/ "A: ", + /*191*/ "B: ", + /*192*/ "3D-STICK: ", + /*193*/ "Z: ", + /*194*/ "+ STEUERKREUZ: ", + /*195*/ "ZIELEN", + /*196*/ "ZIELFUNKTION", + /*197*/ "BLICK OBEN", + /*198*/ "BLICK UNTEN", + /*199*/ "NACH UNTEN SCHAUEN", + /*200*/ "BLICK OBEN", + /*201*/ "VORWトRTS", + /*202*/ "RワCKWトRTS", + /*203*/ "AUSW.", + /*204*/ "WAFFE", + /*205*/ "AKTION/NACHLADEN", + /*206*/ "FEUER", + /*207*/ "GEHEN/DREHEN", + /*208*/ "UMSCHAUEN", + /*209*/ "GEHEN/AUSW.", + /*210*/ "UMSCHAUEN/AUSW.", + /*211*/ "WIE C-KNヨPFE", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Steuerungsart %s %s\n", + /*215*/ "(Einh舅dig)", + /*216*/ "(Beidh舅dig)", + /*217*/ "'Waffe' gedrckt halten = Quick-Men\n'Aktions' gedrckt halten = 2. Funktion\nAktion+Feuer 舅dert die Funktion kurz\nZielfunktion = manuelles Zielen\nZielen + C-Knopf unten = kriechen.\nZielen + C-Knopf oben = aufstehen.\n", + /*218*/ "Alle Cheats deaktivieren\n", + /*219*/ "Sprachfilter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORT:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Einstellungen w臧len:\n", + /*224*/ "Gegnerische Reaktion:\n", + /*225*/ "Gegnerische Energie:\n", + /*226*/ "Schaden durch Gegner:\n", + /*227*/ "Gegnerische Genauigkeit:\n", + /*228*/ "OK\n", + /*229*/ "Abbruch\n", + /*230*/ "Controller Pak wurde nicht gefunden\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "File Name duplizieren\n", + /*234*/ "beinhaltet bereits\n", + /*235*/ "ein File namens\n", + /*236*/ "File umbenennen\n", + /*237*/ "Location wechseln\n", + /*238*/ "Abbruch\n", + /*239*/ "File Namen 舅dern\n", + /*240*/ "Neuen Namen eingeben:\n", + /*241*/ "Das zu kopierende File \nkann nicht gelscht werden.\n", + /*242*/ "SchockSim:%d\n", + /*243*/ "Maximale Zeit:\n", + /*244*/ "Neuer Cheat verfgbar!\n", + /*245*/ "Weiter\n", + /*246*/ "Letzten Level wiederholen\n", + /*247*/ "Spieler speichern\n", + /*248*/ "Neuen Spieler und \nWerte speichern?\n", + /*249*/ "Speichern\n", + /*250*/ "Nein Danke!\n", + /*251*/ "Spielernamen best舩igen:\n", + /*252*/ "Das gespeicherte File wurde \naufgrund von besch臈igten Daten \noder Hardware-Sch臈en \ngelscht.\n", + /*253*/ "Weiter\n", + /*254*/ "Error\n", + /*255*/ "Game Boy-Modul kann nicht gelesen werden.\nBitte berprfen Sie, ob\ndas richtige Game Boy-Modul\neingelegt ist.\n", + /*256*/ "Abbruch\n", + /*257*/ "Error\n", + /*258*/ "Die gespeicherten Daten\n", + /*259*/ "wurden aufgrund einer\n", + /*260*/ "Besch臈igung gelscht.\n", + /*261*/ "Abbruch\n", + /*262*/ "W臧len Sie die Sprache:\n", + /*263*/ "Englisch\n", + /*264*/ "Franzsisch\n", + /*265*/ "Deutsch\n", + /*266*/ "Italienisch\n", + /*267*/ "Spanisch\n", + /*268*/ "Amerikanisch\n", + /*269*/ "Sprache:\n", + /*270*/ "Sprache\n", + /*271*/ "Steuerung\n", + /*272*/ "Blickrichtung\n", + /*273*/ "Geradeaus\n", + /*274*/ "Kopfbewegung\n", + /*275*/ "Auto-Visier\n", + /*276*/ "Fadenkreuz\n", + /*277*/ "Halten\n", + /*278*/ "Umsch.\n", + /*279*/ "Cutscene Untertitel\n", + /*280*/ "In-Game Untertitel\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_i.c b/src/files/lang/jap-final/mpweapons_str_i.c new file mode 100644 index 000000000..c5ec94eef --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_i.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%sha il\nConnettore Dati\n", + /* 1*/ "%sha la\ncartella\n", + /* 2*/ "%sha la cartella di %s\n", + /* 3*/ "%sha la nostra\ncartella\n", + /* 4*/ "Presa la cartella di %s\n", + /* 5*/ "Hai preso la\ncartella di %s\n", + /* 6*/ "%s ha preso la nostra\ncartella\n", + /* 7*/ "%s ha preso la\ncartella di %s\n", + /* 8*/ "Un punto per la resistenza!\n", + /* 9*/ "Dovresti aver cura\n", + /* 10*/ "dei tuoi amici!\n", + /* 11*/ "Ben fatto!\n", + /* 12*/ "Libero!\n", + /* 13*/ "Due punti ...\n", + /* 14*/ "Sei la vittima!\n", + /* 15*/ "Proteggi %s!\n", + /* 16*/ "Prendi %s!\n", + /* 17*/ "Scaricamento avvenuto.\n", + /* 18*/ "Connessione fallita.\n", + /* 19*/ "Avvio scaricamento.\n", + /* 20*/ "Devi usare il Connettore Dati.\n", + /* 21*/ "Re \ndel colle!\n", + /* 22*/ "Abbiamo\nil colle!\n", + /* 23*/ "%sha preso\nil colle!\n", + /* 24*/ "%ds/punto\n", + /* 25*/ "Un punto!\n", + /* 26*/ "Niente scudo\n", + /* 27*/ "Automatica\n", + /* 28*/ "Lanciamissili\n", + /* 29*/ "Replicanti\n", + /* 30*/ "Re del Colle\n", + /* 31*/ "TeleVista complessa\n", + /* 32*/ "Prendi la cartella\n", + /* 33*/ "Un-colpo-e-sei-morto\n", + /* 34*/ "Prendi la cassa\n", + /* 35*/ "Mimesi\n", + /* 36*/ "Esplosivi tempio\n", + /* 37*/ "Killer\n", + /* 38*/ "Sedativo\n", + /* 39*/ "Al rallentatore\n", + /* 40*/ "Premi START\n", + /* 41*/ "In pausa\n", + /* 42*/ "Personale\n", + /* 43*/ "A caso\n", + /* 44*/ "5 a caso\n", + /* 45*/ "Lotta\n", + /* 46*/ "Mina pross.\n", + /* 47*/ "Lanciamissili\n", + /* 48*/ "Lanciagran.\n", + /* 49*/ "Esplosivo\n", + /* 50*/ "Magnum Oro\n", + /* 51*/ "Pesante\n", + /* 52*/ "Sedativo\n", + /* 53*/ "TeleVista\n", + /* 54*/ "Power\n", + /* 55*/ "Automatico\n", + /* 56*/ "Pistole\n", + /* 57*/ "Prova\n", + /* 58*/ "Prova 4mb\n", + /* 59*/ "Niente\n", + /* 60*/ "Scudo\n", + /* 61*/ "Disattivato\n", + /* 62*/ "Obiettivi raggiunti\n", + /* 63*/ "Sconosciuto\n", + /* 64*/ "Mancante\n", + /* 65*/ "Controller Pak difettoso\n", + /* 66*/ "ネ danneggiato o \n", + /* 67*/ "inserito male.\n", + /* 68*/ "Sistemalo\n", + /* 69*/ "Riprova\n", + /* 70*/ "Continua senza\nController Pak\n", + /* 71*/ "Controller Pak pieno\n", + /* 72*/ "Memoria esaurita,\nimpossibile salvare.\n", + /* 73*/ "Accedi al menu\nController Pak per\nliberare spazio - premi\nSTART all'avvio del gioco.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Pugni uragano\n", + /* 77*/ "Dispositivo mimetico\n", + /* 78*/ "Invulnerabile\n", + /* 79*/ "Tutte le armi per missioni individuali\n", + /* 80*/ "Munizioni illimitate\n", + /* 81*/ "Munizioni illimitate, senza ricarica\n", + /* 82*/ "Un giocatore al rallentatore \n", + /* 83*/ "Modalit DK\n", + /* 84*/ "Magnum di Trent\n", + /* 85*/ "TeleVista\n", + /* 86*/ "Jo Piccola\n", + /* 87*/ "Personaggi piccoli\n", + /* 88*/ "Scudi nemici\n", + /* 89*/ "Scudo di Jo\n", + /* 90*/ "SuperScudo\n", + /* 91*/ "Vista classica\n", + /* 92*/ "Solo capi squadra\n", + /* 93*/ "Gioca come Elvis\n", + /* 94*/ "Missili nemici\n", + /* 95*/ "Munizioni illimitate - Pistola Laptop Sentinella\n", + /* 96*/ "Regole del Marchese di Queensbury\n", + /* 97*/ "BuioPerfect\n", + /* 98*/ "Pugile\n", + /* 99*/ "Colpo\n", + /*100*/ "Toccata e fuga\n", + /*101*/ "Alieno\n", + /*102*/ "Puntatore R/Disposizione armi nascoste\n", + /*103*/ "Lanciamissili\n", + /*104*/ "Fucile cecchino\n", + /*105*/ "Scanner a raggi X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Pistola Laptop\n", + /*108*/ "Phoenix\n", + /*109*/ "PsicoArma\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Divertimento\n", + /*120*/ "Gioco\n", + /*121*/ "Armi\n", + /*122*/ "Amici\n", + /*123*/ "Armi per Jo da sola\n", + /*124*/ "Armi classiche per Jo da sola\n", + /*125*/ "Ribellione dD", + /*126*/ "Salvataggio dD", + /*127*/ "Infiltrazione A51", + /*128*/ "Salvataggio A51", + /*129*/ "Fuga A51", + /*130*/ "Difficolt:\n", + /*131*/ "Trucco Missioni Individuali\n", + /*132*/ "Trucco Simulatore Lotta\n", + /*133*/ "Trucco Collaborazione\n", + /*134*/ "Trucco Tutti-contro-Tutti\n", + /*135*/ "Disonore\n", + /*136*/ "Truccata\n", + /*137*/ "Trucco disponibile", + /*138*/ "Completa", + /*139*/ "per trucco:", + /*140*/ "con", + /*141*/ "in meno di", + /*142*/ " o inserisci Perfect Dark Game Boy (r) nel Transfer Pak (tm), connetti il Transfer Pak ad un Controller, esci e accedi al menu", + /*143*/ "Seleziona trucco per informazioni\n", + /*144*/ "Amico disponibile", + /*145*/ "Vinci medaglie d'oro al poligono per attivare le pistole classiche.\n", + /*146*/ "Vista su schermo\n", + /*147*/ "Obiettivo\n", + /*148*/ "Area Zoom\n", + /*149*/ "Munizioni\n", + /*150*/ "Funzioni arma\n", + /*151*/ "Macchia colorata\n", + /*152*/ "Didascalie\n", + /*153*/ "Tempo Missione\n", + /*154*/ "Modalit濬n", + /*155*/ "Dividi\n", + /*156*/ "Vuoi interrompere\nla missione?\n", + /*157*/ "Pelle Joanna\n", + /*158*/ "Negoziatore Joanna\n", + /*159*/ "Gilet Elvis\n", + /*160*/ "Errore\n", + /*161*/ "Impossibile eliminare\nfile in uso.\n", + /*162*/ "Annulla\n", + /*163*/ "Lim. tempo:\n", + /*164*/ "Lim. punti:\n", + /*165*/ "Lim. punti squadra:\n", + /*166*/ "Sfida compiuta!\n", + /*167*/ "Sfida fallita!\n", + /*168*/ "Sfida truccata!\n", + /*169*/ "Didascalie film\n", + /*170*/ "Didascalie nel gioco\n", + /*171*/ "Schermo alternativo titolo\n", + /*172*/ "Inizia sfida\n", + /*173*/ "Indagine dataDyne", + /*174*/ "Errore\n", + /*175*/ "Il Controller Pak\n stato tolto.\n", + /*176*/ "Sistemalo\n", + /*177*/ "Sicuro di voler\nsistemare il\nController Pak?\n", + /*178*/ "Potresti perdere i dati!\n", + /*179*/ "Annulla\n", + /*180*/ "Sistema\n", + /*181*/ "Ci sei riuscito!\n", + /*182*/ "Il Controller Pak\n stato sistemato.\n", + /*183*/ "Non ci sei riuscito.\n", + /*184*/ "Impossibile sistemare\nil Controller Pak:\nimpossibile caricare\no salvare su questo\nController Pak.\n", + /*185*/ "Svantaggio giocatore\n", + /*186*/ "PULSANTI L/R: ", + /*187*/ "PULSANTE C SU: ", + /*188*/ "PULSANTI C DX/SX: ", + /*189*/ "PULSANTE C GIル: ", + /*190*/ "PULSANTE A: ", + /*191*/ "PULSANTE B: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "PULSANTE Z: ", + /*194*/ "PULSANTIERA +: ", + /*195*/ "MIRA", + /*196*/ "DIS/ATTIVA MIRA", + /*197*/ "GUARDA SU", + /*198*/ "GUARDA GIル", + /*199*/ "GUARDA GIル", + /*200*/ "GUARDA SU", + /*201*/ "AVANTI", + /*202*/ "INDIETRO", + /*203*/ "SPOSTATI", + /*204*/ "ARMA", + /*205*/ "AZIONE/RICARICA", + /*206*/ "FUOCO", + /*207*/ "VAI/GIRA", + /*208*/ "GUARDA", + /*209*/ "VAI/SPOSTATI", + /*210*/ "VAI/SPOSTATI", + /*211*/ "COME PULSANTI C", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Modalit comandi %s %s\n", + /*215*/ "(una mano)", + /*216*/ "(due mani)", + /*217*/ "Tieni premuto ARMA per menu rapido.\nTieni premuto AZIONE per dis/attivare.\nAZIONE+FUOCO per cambiare funzioni.\nCon MIRA puoi mirare accuratamente.\nMIRA + C GIル per accucciarti.\nMIRA + C SU per alzarti.\n", + /*218*/ "Disattiva i trucchi\n", + /*219*/ "Filtro lingua\n", + /*220*/ "NOME UTENTE:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Scegli impostaz.:\n", + /*224*/ "Velocit reazione nemico:\n", + /*225*/ "Salute nemico:\n", + /*226*/ "Danno nemico:\n", + /*227*/ "Precisione nemico:\n", + /*228*/ "OK\n", + /*229*/ "Annulla\n", + /*230*/ "Controller Pak assente\n", + /*231*/ "Nome:\n", + /*232*/ "Dove:\n", + /*233*/ "Copia nome file\n", + /*234*/ "contiene gi un\n", + /*235*/ "file di nome\n", + /*236*/ "Rinomina file\n", + /*237*/ "Cambia posto\n", + /*238*/ "Annulla\n", + /*239*/ "Cambia nome file\n", + /*240*/ "Digita nuovo nome:\n", + /*241*/ "Il file che stai copiando\nnon pu essere cancellato.\n", + /*242*/ "RepShock:%d\n", + /*243*/ "Tempo-obiettivo:\n", + /*244*/ "Nuovo trucco disponibile!:\n", + /*245*/ "Continua\n", + /*246*/ "Replay ultimo livello\n", + /*247*/ "Salva giocatore\n", + /*248*/ "Salva nuovo giocatore\ne statistiche?\n", + /*249*/ "Salva!\n", + /*250*/ "Non salvare!\n", + /*251*/ "Conferma nome giocatore:\n", + /*252*/ "Il file in memoria\n stato cancellato\na causa di un errore.\n", + /*253*/ "Continua\n", + /*254*/ "Errore\n", + /*255*/ "Impossibile leggere la cassetta\ndi gioco Game Boy. Controlla le\nconnessioni e assicurati che si\ntratti della cassetta giusta.\n", + /*256*/ "Annulla\n", + /*257*/ "Errore\n", + /*258*/ "I dati in memoria\n", + /*259*/ "sono stati eliminati\n", + /*260*/ "perch danneggiati.\n", + /*261*/ "Annulla\n", + /*262*/ "Scegli la lingua:\n", + /*263*/ "Inglese\n", + /*264*/ "Francese\n", + /*265*/ "Tedesco\n", + /*266*/ "Italiano\n", + /*267*/ "Spagnolo\n", + /*268*/ "Americano\n", + /*269*/ "Lingua:\n", + /*270*/ "Lingua\n", + /*271*/ "Modalit comandi\n", + /*272*/ "Inv. punto vista\n", + /*273*/ "Vista in avanti\n", + /*274*/ "Rotazione testa\n", + /*275*/ "Mira automatica\n", + /*276*/ "Mirino\n", + /*277*/ "Tieni premuto\n", + /*278*/ "Dis/Attiva\n", + /*279*/ "Didascalie film\n", + /*280*/ "Didascalie nel gioco\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_s.c b/src/files/lang/jap-final/mpweapons_str_s.c new file mode 100644 index 000000000..89654fec2 --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_s.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%stiene el\nC. de Datos\n", + /* 1*/ "%stiene el\nMaletn\n", + /* 2*/ "%stiene el Maletn de %s\n", + /* 3*/ "%stiene nuestro Maletn\n", + /* 4*/ "Atrapaste el Maletn\nde %s\n", + /* 5*/ "Has capturado el\nMaletn de %s\n", + /* 6*/ "%sha capturado\nnuestro Maletn\n", + /* 7*/ "%sha capturado\nel Maletn de %s\n", + /* 8*/ "。Un punto por sobrevivir!\n", + /* 9*/ "。Se supone que debes\n", + /* 10*/ "proteger a tus amigos!\n", + /* 11*/ "。Bien hecho!\n", + /* 12*/ "。T la llevas!\n", + /* 13*/ "Obtienes 2 Puntos...\n", + /* 14*/ "。Eres la vctima!\n", + /* 15*/ "。Protege a\n%s!\n", + /* 16*/ "。Coge a\n%s!\n", + /* 17*/ "Descarga completada.\n", + /* 18*/ "Conexin perdida.\n", + /* 19*/ "Comenzando descarga.\n", + /* 20*/ "Necesitas usar el Conector de Datos.\n", + /* 21*/ "。Rey de\nla Colina!\n", + /* 22*/ "。Tenemos\nla Colina!\n", + /* 23*/ "。%sha capturado\nla Colina!\n", + /* 24*/ "%ds/Punto\n", + /* 25*/ "。1 Punto!\n", + /* 26*/ "Sin Escudo\n", + /* 27*/ "Autom疸icas\n", + /* 28*/ "Lanzacohetes\n", + /* 29*/ "Simulantes\n", + /* 30*/ "Rey de la Colina\n", + /* 31*/ "Complejo FarSight\n", + /* 32*/ "Mant駭 el Maletn\n", + /* 33*/ "Mata de Un Tiro\n", + /* 34*/ "Captura el Maletn\n", + /* 35*/ "Ocultacin\n", + /* 36*/ "Explosivos Templo\n", + /* 37*/ "Asesino\n", + /* 38*/ "Tranquilizante\n", + /* 39*/ "C疥ara Lenta\n", + /* 40*/ "Pulsa START\n", + /* 41*/ "Pausa\n", + /* 42*/ "Personalizado\n", + /* 43*/ "Aleatorio\n", + /* 44*/ "Cinco al Azar\n", + /* 45*/ "Mano a Mano\n", + /* 46*/ "Minas Proxim.\n", + /* 47*/ "Lanzacohetes\n", + /* 48*/ "Lanzagranadas\n", + /* 49*/ "Explosivos\n", + /* 50*/ "Magnum Dorada\n", + /* 51*/ "Armas Pesadas\n", + /* 52*/ "Tranquilizantes\n", + /* 53*/ "FarSight\n", + /* 54*/ "Fuerza Bruta\n", + /* 55*/ "Autom疸icas\n", + /* 56*/ "Pistolas\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Nada\n", + /* 60*/ "Escudo\n", + /* 61*/ "Desactivado\n", + /* 62*/ "Objetivos Completados\n", + /* 63*/ "Desconocido\n", + /* 64*/ "Desaparecido\n", + /* 65*/ "Controller Pak Daado\n", + /* 66*/ "est daado o\n", + /* 67*/ "mal insertado.\n", + /* 68*/ "Intentar Reparar\n", + /* 69*/ "Reintentar\n", + /* 70*/ "Continuar sin usar\nel Controller Pak\n", + /* 71*/ "Controller Pak Lleno\n", + /* 72*/ "Est demasiado lleno. Se\nnecesitan 1 nota y 28\np疊inas para guardar.\n", + /* 73*/ "Entra en el Men del\nController Pak para liberar\nespacio (pulsa START\nmientras enciendes.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Puetazos Hurac疣\n", + /* 77*/ "Dispositivo de Ocultacin\n", + /* 78*/ "Invencible\n", + /* 79*/ "Todas las Armas en Solo\n", + /* 80*/ "Municin Ilimitada\n", + /* 81*/ "Municin Ilimitada sin Recargas\n", + /* 82*/ "Un jugador C疥ara Lenta\n", + /* 83*/ "Modo DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Mini-Joanna\n", + /* 87*/ "Mini-Personajes\n", + /* 88*/ "Escudo de Enemigos\n", + /* 89*/ "Escudo de Joanna\n", + /* 90*/ "Sper Escudo\n", + /* 91*/ "Mirilla Cl疽ica\n", + /* 92*/ "Slo Jefes de Equipo\n", + /* 93*/ "Jugar como Elvis\n", + /* 94*/ "Cohetes Enemigos\n", + /* 95*/ "Municin Ilimitada - Arma PC Centinela\n", + /* 96*/ "Reglas del Marqu駸 de Queensbury\n", + /* 97*/ "Oscuridad Perfecta\n", + /* 98*/ "Pugilista\n", + /* 99*/ "Disparo Caliente\n", + /*100*/ "Golpea y Corre\n", + /*101*/ "Aliengena\n", + /*102*/ "Rastreador/Localizacin de armas\n", + /*103*/ "Lanzacohetes\n", + /*104*/ "Rifle Francotirador\n", + /*105*/ "Esc疣er de Rayos-X\n", + /*106*/ "SuperDragn\n", + /*107*/ "Arma PC\n", + /*108*/ "Phoenix\n", + /*109*/ "Pistola Psicosis\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "Klo1313\n", + /*113*/ "KF7 Especial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Diversin\n", + /*120*/ "Jugabilidad\n", + /*121*/ "Armas\n", + /*122*/ "Compaeros\n", + /*123*/ "Armas para Joanna en Solo\n", + /*124*/ "Armas Cl疽icas para Joanna en Solo\n", + /*125*/ "Entrando en dataDyne", + /*126*/ "Extraccin de dataDyne", + /*127*/ "Infiltracin en A51", + /*128*/ "Rescate en A51", + /*129*/ "Escape de A51", + /*130*/ "Dificultad:\n", + /*131*/ "Trucos en Misiones Solo\n", + /*132*/ "Trucos en Simulador de Combate\n", + /*133*/ "Trucos en Co-operativo\n", + /*134*/ "Trucos en Contra-Operativa\n", + /*135*/ "Sin honor\n", + /*136*/ "Trucada\n", + /*137*/ "Truco disponible", + /*138*/ "Completa", + /*139*/ "para el truco:", + /*140*/ "en", + /*141*/ "por debajo de", + /*142*/ " o inserta Perfect Dark de Game Boy (r) en un Transfer Pak (tm), conecta el Transfer Pak a cualquier mando, y sal y vuelve a entrar en el men", + /*143*/ "Elige truco para m疽 informacin\n", + /*144*/ "Camarada disponible", + /*145*/ "Gana Oros en las pruebas de tiro para activar las armas cl疽icas.\n", + /*146*/ "Mirilla\n", + /*147*/ "Objetivo\n", + /*148*/ "Alcance de Zoom\n", + /*149*/ "Mostrar Municin\n", + /*150*/ "Funcin Arma\n", + /*151*/ "Bolas de Pintura\n", + /*152*/ "Subttulos\n", + /*153*/ "Tiempo Misin\n", + /*154*/ "Modo\n", + /*155*/ "Corte\n", + /*156*/ "ソQuieres interrumpir\nla misin?\n", + /*157*/ "Joanna en Piel\n", + /*158*/ "Joanna Negociadora\n", + /*159*/ "Elvis (Chaleco)\n", + /*160*/ "Error\n", + /*161*/ "No se puede borrar un\nfichero en uso.\n", + /*162*/ "Cancelar\n", + /*163*/ "Lmite Tiempo:\n", + /*164*/ "Lmite Puntos:\n", + /*165*/ "Lmite P. Equipo:\n", + /*166*/ "。Desafo Completado!\n", + /*167*/ "。Desafo Fallado!\n", + /*168*/ "。Desafo Trucado!\n", + /*169*/ "Subttulos en Escenas\n", + /*170*/ "Subttulos en el Juego\n", + /*171*/ "Pantalla de Ttulo Alternativa\n", + /*172*/ "Empezar Desafo\n", + /*173*/ "Investigacin dataDyne", + /*174*/ "Error\n", + /*175*/ "El Controller Pak\nha sido quitado.\n", + /*176*/ "Intentar Reparacin\n", + /*177*/ "ソQuieres intentar\nreparar este\nController Pak?\n", + /*178*/ "。Puedes perder datos!\n", + /*179*/ "Cancelar\n", + /*180*/ "Reparar\n", + /*181*/ "Reparado con ノxito\n", + /*182*/ "El Controller Pak ha\nsido reparado.\n", + /*183*/ "Reparacin Fallada\n", + /*184*/ "El Controller Pak \nno puede ser reparado.\nNo podr疽 cargar o\nguardar en este\nController Pak.\n", + /*185*/ "H疣dicap Jugador\n", + /*186*/ "BOTONES L/R: ", + /*187*/ "BOTモN C ARRIBA: ", + /*188*/ "BOTONES C I./D.: ", + /*189*/ "BOTモN C ABAJO: ", + /*190*/ "BOTモN A: ", + /*191*/ "BOTモN B: ", + /*192*/ "STICK C.: ", + /*193*/ "BモTON Z: ", + /*194*/ "+ PANEL C.: ", + /*195*/ "APUNTAR", + /*196*/ "CAMBIAR A PUNTAR", + /*197*/ "MIRAR ARRIBA", + /*198*/ "MIRAR ABAJO", + /*199*/ "MIRAR ABAJO", + /*200*/ "MIRAR ARRIBA", + /*201*/ "ADELANTE", + /*202*/ "ATRチS", + /*203*/ "DESP. LATERAL", + /*204*/ "ARMA", + /*205*/ "ACCIモN/RECARGA", + /*206*/ "DISPARO", + /*207*/ "CAMINAR/VOLVER", + /*208*/ "MIRAR", + /*209*/ "CAMINAR/DESP.", + /*210*/ "MIRAR/DESP.", + /*211*/ "COMO BOTONES C", + /*212*/ "Mando 1:", + /*213*/ "Mando 2:", + /*214*/ "Estilo de Control %s %s\n", + /*215*/ "(1 Mando)", + /*216*/ "(2 Mandos)", + /*217*/ "Mant駭 Arma para el men r疳ido.\nMant駭 Accin para cambiar funcin.\nAccin+Disparo cambia temp. la funcin.\nApuntar aporta una mayor precisin.\nApuntar + Botn C Abajo te agacha.\nApuntar + Botn C Arriba te levanta.\n", + /*218*/ "Desactiva todos los Trucos\n", + /*219*/ "Filtro de Lenguaje\n", + /*220*/ "USUARIO:\n", + /*221*/ "CLAVE:\n", + /*222*/ "Oscuridad Perfecta\n", + /*223*/ "Elige Opciones:\n", + /*224*/ "Vel. de Reaccin Enemiga:\n", + /*225*/ "Salud del Enemigo:\n", + /*226*/ "Dao del Enemigo:\n", + /*227*/ "Precisin del Enemigo:\n", + /*228*/ "Aceptar\n", + /*229*/ "Cancelar\n", + /*230*/ "Controller Pak No Encontrado\n", + /*231*/ "Nombre:\n", + /*232*/ "Lugar:\n", + /*233*/ "Nombre Duplicado\n", + /*234*/ "ya tiene\n", + /*235*/ "un fichero nombrado\n", + /*236*/ "Renombrar Fichero\n", + /*237*/ "Cambiar Lugar\n", + /*238*/ "Cancelar\n", + /*239*/ "Cambiar Nombre\n", + /*240*/ "Introduce nuevo nombre:\n", + /*241*/ "El fichero que est疽 copiando\nno puede ser borrado.\n", + /*242*/ "SimShock:%d\n", + /*243*/ "Tiempo Requerido:\n", + /*244*/ "。Nuevo Truco Disponible!:\n", + /*245*/ "Continuar\n", + /*246*/ "Volver a Jugar el Nivel\n", + /*247*/ "Guardar Jugador\n", + /*248*/ "ソGuardar nuevo jugador\ny estadsticas?\n", + /*249*/ "Guardar Ahora\n", + /*250*/ "。No, Gracias!\n", + /*251*/ "Confirmar nombre:\n", + /*252*/ "El fichero guardado ha\nsido borrado debido\na datos corruptos\no daados.\n", + /*253*/ "Continuar\n", + /*254*/ "Error\n", + /*255*/ "No se puede acceder al Cartucho de GB.\nComprueba las conexiones y asegrate\nde que est疽 usando el cartucho de\nGame Boy correcto.\n", + /*256*/ "Cancelar\n", + /*257*/ "Error\n", + /*258*/ "Los datos guardados\n", + /*259*/ "han sido borrados\n", + /*260*/ "porque estaban daados.\n", + /*261*/ "Cancelar\n", + /*262*/ "Elige tu idioma:\n", + /*263*/ "Ingl駸\n", + /*264*/ "Franc駸\n", + /*265*/ "Alem疣\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "I. Americano\n", + /*269*/ "Idioma:\n", + /*270*/ "Idioma\n", + /*271*/ "Estilo C.\n", + /*272*/ "C. Opuesto\n", + /*273*/ "M. Frente\n", + /*274*/ "G. Cabeza\n", + /*275*/ "Auto-Apun.\n", + /*276*/ "C. Apuntar\n", + /*277*/ "Mant.\n", + /*278*/ "Camb.\n", + /*279*/ "Subt. Escenas\n", + /*280*/ "Subt. Juego\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/oatE.c b/src/files/lang/jap-final/oatE.c similarity index 100% rename from src/files/lang/oatE.c rename to src/files/lang/jap-final/oatE.c diff --git a/src/files/lang/oatJ.c b/src/files/lang/jap-final/oatJ.c similarity index 100% rename from src/files/lang/oatJ.c rename to src/files/lang/jap-final/oatJ.c diff --git a/src/files/lang/oatP.c b/src/files/lang/jap-final/oatP.c similarity index 100% rename from src/files/lang/oatP.c rename to src/files/lang/jap-final/oatP.c diff --git a/src/files/lang/oat_str_f.c b/src/files/lang/jap-final/oat_str_f.c similarity index 100% rename from src/files/lang/oat_str_f.c rename to src/files/lang/jap-final/oat_str_f.c diff --git a/src/files/lang/oat_str_g.c b/src/files/lang/jap-final/oat_str_g.c similarity index 100% rename from src/files/lang/oat_str_g.c rename to src/files/lang/jap-final/oat_str_g.c diff --git a/src/files/lang/oat_str_i.c b/src/files/lang/jap-final/oat_str_i.c similarity index 100% rename from src/files/lang/oat_str_i.c rename to src/files/lang/jap-final/oat_str_i.c diff --git a/src/files/lang/oat_str_s.c b/src/files/lang/jap-final/oat_str_s.c similarity index 100% rename from src/files/lang/oat_str_s.c rename to src/files/lang/jap-final/oat_str_s.c diff --git a/src/files/lang/oldE.c b/src/files/lang/jap-final/oldE.c similarity index 100% rename from src/files/lang/oldE.c rename to src/files/lang/jap-final/oldE.c diff --git a/src/files/lang/oldJ.c b/src/files/lang/jap-final/oldJ.c similarity index 100% rename from src/files/lang/oldJ.c rename to src/files/lang/jap-final/oldJ.c diff --git a/src/files/lang/oldP.c b/src/files/lang/jap-final/oldP.c similarity index 100% rename from src/files/lang/oldP.c rename to src/files/lang/jap-final/oldP.c diff --git a/src/files/lang/old_str_f.c b/src/files/lang/jap-final/old_str_f.c similarity index 100% rename from src/files/lang/old_str_f.c rename to src/files/lang/jap-final/old_str_f.c diff --git a/src/files/lang/old_str_g.c b/src/files/lang/jap-final/old_str_g.c similarity index 100% rename from src/files/lang/old_str_g.c rename to src/files/lang/jap-final/old_str_g.c diff --git a/src/files/lang/old_str_i.c b/src/files/lang/jap-final/old_str_i.c similarity index 100% rename from src/files/lang/old_str_i.c rename to src/files/lang/jap-final/old_str_i.c diff --git a/src/files/lang/old_str_s.c b/src/files/lang/jap-final/old_str_s.c similarity index 100% rename from src/files/lang/old_str_s.c rename to src/files/lang/jap-final/old_str_s.c diff --git a/src/files/lang/jap-final/optionsE.c b/src/files/lang/jap-final/optionsE.c new file mode 100644 index 000000000..89c4b331c --- /dev/null +++ b/src/files/lang/jap-final/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Japanese version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/optionsJ.c b/src/files/lang/jap-final/optionsJ.c new file mode 100644 index 000000000..e0de2bcda --- /dev/null +++ b/src/files/lang/jap-final/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "オ\n", + /* 2*/ "しじん\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "x艢セ", + /* 6*/ "潤逐黴ワ縲d", + /* 7*/ "ォ&※☆蜈", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "」捩ルマ°ハ縲ワd畚n", + /* 17*/ "」捩縲マ烙ルd綵n", + /* 18*/ "」捩烙ヒム艨橿ワ\n", + /* 19*/ "」揩ホ√∨♀ワ\n", + /* 20*/ "」捩ワ烙フd♂ワ\n", + /* 21*/ "」捩メネハ縲ワd畚n", + /* 22*/ "」捩ミラミマ\n", + /* 23*/ "」揉禄n", + /* 24*/ "」揆s\n", + /* 25*/ "モ′ワ\n", + /* 26*/ "ムミマ\n", + /* 27*/ "ヨヒマ縲マ\n", + /* 28*/ "捩怙゚ヨロd♀\n", + /* 29*/ "ワ゚d″マ♀\n", + /* 30*/ "ユレマ♀\n", + /* 31*/ "縲マ縲ムdワ縲マ\n", + /* 32*/ "≠ヘ艢レマ\n", + /* 33*/ "ぅう巡s巡彌n", + /* 34*/ "ぅう巡s盾ワ\n", + /* 35*/ "ぅう盾曹窒貼n", + /* 36*/ "§插ヒpqrs\n", + /* 37*/ "§揩ワd♀\n", + /* 38*/ "§揩宴獅貼n", + /* 39*/ "§揀遵\n", + /* 40*/ "§揩曹窒貼n", + /* 41*/ "オミ\n", + /* 42*/ "′≠轢ワマ曾n", + /* 43*/ "′≠轢ワマ箪n", + /* 44*/ "ィ・\n", + /* 45*/ "§捩ワ艢ム$d\n", + /* 46*/ "斧準d♀\n", + /* 47*/ "斧準ワハ綵n", + /* 48*/ "怙「噫準ワ$ム\n", + /* 49*/ "麾它「準ワ$ム\n", + /* 50*/ "モミ斧操準d♀\n", + /* 51*/ "モミ斧操盾曹窒貼n", + /* 52*/ "$ムハ綵n", + /* 53*/ "ロэ痼艢\n", + /* 54*/ "揆桷氈潤園ニdd♀\n", + /* 55*/ "s巡彌n", + /* 56*/ "s盾ワ\n", + /* 57*/ "§揆s\n", + /* 58*/ "°ムヤs\n", + /* 59*/ "ミワユ準d♀\n", + /* 60*/ "┿ヨδ潤逗ムハ綵n", + /* 61*/ "$dレd\n", + /* 62*/ "ワ烙フd♂ワ曾n", + /* 63*/ "ワ烙フd♂ワ箪n", + /* 64*/ "θικ\n", + /* 65*/ "揆桷麾純┳\n", + /* 66*/ "θικャゥ\n", + /* 67*/ "θικラdマ\n", + /* 68*/ "%≠ハラ逐準d♀\n", + /* 69*/ "ムミマq\n", + /* 70*/ "♂ニ艪пヒリハ綵n", + /* 71*/ "ルマ縲dル轢ラ゚早マルマ縲d∵ムだト√⇔⊇リヌ∋ツ", + /* 72*/ "┨kメλυ∈磨エ⇔∩≒÷ルマ縲d∈ムだナ⇔フト⊇ツ", + /* 73*/ "ツぁ", + /* 74*/ "シナ", + /* 75*/ "", + /* 76*/ "d諷$ハラ", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDJ-JPN\n", + /* 84*/ "JPN version 8.9 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "ナムツテ\n", + /* 96*/ "dナム∈ツテナ⇔フト⊇\n", + /* 97*/ "蛟フdナム蚕n", + /* 98*/ "蛟フdモd≠ネマ縲蚕n", + /* 99*/ "ナム蛟フd\n", + /*100*/ "ル¢dセ\n", + /*101*/ "ヱセ\n", + /*102*/ "ルマ縲d$ハラメ蛟フdヨ\n", + /*103*/ "槍アヨdナム\n", + /*104*/ "ルマ°ハ縲ロフd゚dヌ\n", + /*105*/ "ルマ°ハ縲ロフd゚ソ┳ヌ\n", + /*106*/ "$dネラ縲ハ♀ナム\n", + /*107*/ "ルマ縲d$ハラ蛟フd\n", + /*108*/ "ルマ縲d$ハラメd閧о縺ク\nヱニ≫テ∀∵ぁヰリニツ\n", + /*109*/ "ルマ縲d$ハラメツテセ\n", + /*110*/ "ゅ≫\n", + /*111*/ "dユンハ綵n", + /*112*/ "Controller PAK 1\n", + /*113*/ "Controller PAK 2\n", + /*114*/ "Controller PAK 3\n", + /*115*/ "Controller PAK 4\n", + /*116*/ "ムマ蛟フd\n", + /*117*/ "゙ハロヘマ\n", + /*118*/ "ルマ°ハ縲ロフd゚\n", + /*119*/ "ぅbハロヘマ\n", + /*120*/ "wハロヘマ\n", + /*121*/ "ロ轢\n", + /*122*/ "ハロヘマツテ\n", + /*123*/ "ハロヘマ曾n", + /*124*/ "ハロヘマ箪n", + /*125*/ "ハロヘマ貼n", + /*126*/ "ハロヘマ能n", + /*127*/ "ハロヘマ表n", + /*128*/ "ハロヘマ暴n", + /*129*/ "ハロヘマ予n", + /*130*/ "ハロヘマ禄n", + /*131*/ "ハロヘマ兔n", + /*132*/ "ワ%ロヒハロヘマ\n", + /*133*/ "♂d゚≧ムマ┨", + /*134*/ "割リて", + /*135*/ "♂d゚≧ムマxフ", + /*136*/ "割轢", + /*137*/ "♂d゚≧ムマ┨", + /*138*/ "鰍コ", + /*139*/ "ヨヒマ縲マメヨ", + /*140*/ "割アレ", + /*141*/ "ロユ÷", + /*142*/ "割高", + /*143*/ "普劇", + /*144*/ "恰ュ閠", + /*145*/ "モミ斧", + /*146*/ "潟ナば", + /*147*/ "モミ斧", + /*148*/ "鰍ィぁ", + /*149*/ "モミ斧", + /*150*/ "鰍桙麾", + /*151*/ "ミワユε┬┤x", + /*152*/ "鰍ハは", + /*153*/ "θικ┿ヨδ", + /*154*/ "割騾", + /*155*/ "ξぺοリ", + /*156*/ "鰍ス", + /*157*/ "%≠ハラ", + /*158*/ "鰍アご", + /*159*/ "чш", + /*160*/ "潟√", + /*161*/ "ヨヒマ縲マぅう′", + /*162*/ "割档", + /*163*/ "ワリ≧d黽", + /*164*/ "鰍隙斧", + /*165*/ "ワリ≧dメ", + /*166*/ "潟スq", + /*167*/ "ワ゚d″マ♀", + /*168*/ "ムミマャィャ", + /*169*/ "ぅうメ゚ぴ", + /*170*/ "ー噫ォエ", + /*171*/ "スr", + /*172*/ "しじリホ\n", + /*173*/ "しじヌ窶エ\n", + /*174*/ "サiサ\n", + /*175*/ "ヵぴモしじ∈ヌ竅ナリニ∩タ\n", + /*176*/ "ヨヒマン\n", + /*177*/ "しじヌ秉n", + /*178*/ "ぷ¬Σ\n", + /*179*/ "ヨぃい∃の┸\n", + /*180*/ "ヤ£ロヘマ\n", + /*181*/ "ヤd♂ニヤ\n", + /*182*/ "′♂ヤ\n", + /*183*/ "宴ロヌ\n", + /*184*/ "モ螺ヌ\n", + /*185*/ "烽о綵n", + /*186*/ "ンd″ニ≫\n", + /*187*/ "ナムぬね\n", + /*188*/ "サiサ\n", + /*189*/ "メdナムマぬねナリニ∩タ\n", + /*190*/ "モ⊇\n", + /*191*/ "⊇⊇⊃\n", + /*192*/ "宴ロヌ\n", + /*193*/ "逐ゥメ宴ロヌ\n", + /*194*/ "宴ロd♀\n", + /*195*/ "ムπ┴てメヒフメ\n", + /*196*/ "翌ト揩ヤムπ\n", + /*197*/ "ネメ∇√\n", + /*198*/ "翌トろ├\n", + /*199*/ "ろ├ヌ\n", + /*200*/ "ゅ≫\n", + /*201*/ "d♀\n", + /*202*/ "磨瘋ヤ⊃\n", + /*203*/ "モ螺ヌ\n", + /*204*/ "逐ゥメモ螺ヌ\n", + /*205*/ "ろ├メモ予n", + /*206*/ "ろ├∈ケマモ予n", + /*207*/ "<d宦メモ予n", + /*208*/ "、ヌメモ予n", + /*209*/ "の┸d♀モ予n", + /*210*/ "%ムマ縺盾оd♀\n", + /*211*/ "゚焉メモ予n", + /*212*/ "ハロヘマ゚ムメモ予n", + /*213*/ "ゅ≫\n", + /*214*/ "′♂ヤヌ\n", + /*215*/ "怎レム<\n", + /*216*/ "怕タ\n", + /*217*/ "騾ム≦\n", + /*218*/ "逐ゥd♀メ怎畚n", + /*219*/ "ゅ≫\n", + /*220*/ "\n", + /*221*/ "ム♀\n", + /*222*/ "ロ轢\n", + /*223*/ "閧о\n", + /*224*/ "タ\n", + /*225*/ "ル\n", + /*226*/ "゚秉n", + /*227*/ "ヤd♂ニヤヌ\n", + /*228*/ "ワンマ\n", + /*229*/ "它ヲ\n", + /*230*/ "d♀\n", + /*231*/ "ゅ≫\n", + /*232*/ "閠", + /*233*/ "ワ窶ヤ", + /*234*/ "ハ♀マ", + /*235*/ "レメマ♀", + /*236*/ "宴ロヌ\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1-1", + /*240*/ "1-2", + /*241*/ "1-3", + /*242*/ "1-4", + /*243*/ "2-1", + /*244*/ "2-2", + /*245*/ "2-3", + /*246*/ "2-4", + /*247*/ "ハロヘマ\n", + /*248*/ "ィ諠ャツテ\n", + /*249*/ "ィ諠ャ\n", + /*250*/ "℃ワ縲゚ム\n", + /*251*/ "モd≠ネマ綵n", + /*252*/ "ミ♀°マワ綵n", + /*253*/ "$dネラ綵n", + /*254*/ "ヨヒマン\n", + /*255*/ "ぅbハロヘマ醇ヌ\n", + /*256*/ "d≧d準ヤマ\n", + /*257*/ "┻ぶヨメわべ\n", + /*258*/ "ぅbメツテ\n", + /*259*/ "す∠\n", + /*260*/ "ゅ≫\n", + /*261*/ "£ムd", + /*262*/ "ロフマ縲曹", + /*263*/ "ロフマ縲窒", + /*264*/ "ロフマ縲唐", + /*265*/ "ロフマ縲狽", + /*266*/ "wハロヘマ醇ヌ\n", + /*267*/ "d≧d準ヤマ\n", + /*268*/ "w┫£ムd\n", + /*269*/ "す∠\n", + /*270*/ "ゅ≫\n", + /*271*/ "£ムd", + /*272*/ "£ムd", + /*273*/ "ョしじ\n", + /*274*/ "fニ≫\n", + /*275*/ "ニ≫\n", + /*276*/ "しじ\n", + /*277*/ "しじん\n", + /*278*/ "しじルンセ\n", + /*279*/ "£ムdリホセ\n", + /*280*/ "ハロヘマ゚ムセ\n", + /*281*/ "cと≡チエ∨の┸セ\n", + /*282*/ "ほナ∨氣ヌセ\n", + /*283*/ "驍劫・セ\n", + /*284*/ "麾ロヘハ繙ヌセ\n", + /*285*/ "醇ネo黴ハ縲セ\n", + /*286*/ "醇k黴ハ縲セ\n", + /*287*/ "盾ンレ黴ハ縲セ\n", + /*288*/ "潤ネメセ\n", + /*289*/ "ワ゚d縺準゚マ\n", + /*290*/ "げ兔n", + /*291*/ "陪ア\n", + /*292*/ "ラ兔n", + /*293*/ "しじん\n", + /*294*/ "しじ\n", + /*295*/ "しじm┏\n", + /*296*/ "縲ム", + /*297*/ "縺メハロヘマ", + /*298*/ "fニ≫\n", + /*299*/ "ニ≫\n", + /*300*/ "ョしじ\n", + /*301*/ "ワ゚d縺準゚マ\n", + /*302*/ "ムマ蛟フdユ諷$ハラシナЫn", + /*303*/ "ルマ°ハ縲ロフd゚\n", + /*304*/ "縲d蛟マ\n", + /*305*/ "ヤd♂ニヤス′♂ヤ\n", + /*306*/ "ナムぬね\n", + /*307*/ "ヤd♂ニヤス′♂ヤヌl\n", + /*308*/ "ワンマ\n", + /*309*/ "它ヲ\n", + /*310*/ "d♀\n", + /*311*/ "怕タ\n", + /*312*/ "ゅ≫\n", + /*313*/ "橿ァ☆↓欺n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "ルマ°ハ縲ロフd゚ハ♀\n", + /*319*/ "ハロヘマハ♀\n", + /*320*/ "モd\n", + /*321*/ "ヨヒマン\n", + /*322*/ "ルマ縲d$ハラ∵\nに⇒∩≪リヌ∋\n", + /*323*/ "ンd″ぁヰリヌ∋\n", + /*324*/ "d♀ぁヰリヌ∋\n", + /*325*/ "ヱぁヰリヌ∋\n", + /*326*/ "dあレ♭ニ\n", + /*327*/ "ニ♭マテメヌモ\nd♀ト√⇔⊇リニ\n", + /*328*/ "∵瘁瘁リヌ∋\n", + /*329*/ "ルマ縲d$ハラ∵ぱ√⇔⊇≫≡⊂♭ニ\n", + /*330*/ "d閧о縺メヱマんナリナ∨\n", + /*331*/ "d♀モd\n", + /*332*/ "ンd″モd\n", + /*333*/ "d♀モd\n", + /*334*/ "ンd″モd\n", + /*335*/ "d♀モd\n", + /*336*/ "ンd″モd\n", + /*337*/ "d♀モd\n", + /*338*/ "ンd″モd\n", + /*339*/ "モd\n", + /*340*/ "ヱん\n", + /*341*/ "ナムメヱ∵ぁヰリヌ∋\n", + /*342*/ "ルマ縲d$ハラ∵\nナチムだト√⇔\n⊇リニ∩タ\n", + /*343*/ "ヨヒマン\n", + /*344*/ "εタ∵⊆≪リヌ∋\n", + /*345*/ "エ\n", + /*346*/ "ンd″ト√リナ∨\n", + /*347*/ "ィ、\n", + /*348*/ "ンd″mモdなΚ\n", + /*349*/ "⌒⊂巣ャ\n", + /*350*/ "メリ轣マンd″\n", + /*351*/ "ヨヒマン\n", + /*352*/ "d♀mマモd∵\nなΚナリナ∨\n", + /*353*/ "⌒⊂巣ャ\n", + /*354*/ "ヨヒマン\n", + /*355*/ "ハ♀ヨメワ%dワ∵ョャ\n", + /*356*/ "ヒミタニ≫ハ♀メツテセ\n", + /*357*/ "ィ、\n", + /*358*/ "ヨヒマン\n", + /*359*/ "ンd″\n", + /*360*/ "メリ轣マ\nンd″ナリニ∩タ\n", + /*361*/ "騾ム\n", + /*362*/ "ムムモ\n", + /*363*/ "%s∵エ∨ナメ$ハラ∈ムだナ⇔フト⊇\n", + /*364*/ "ンd″ナ∨⊇ルマ縲d$ハラ∈\n♪√∩メルマ縲dマ\n√⇔フト⊇\n", + /*365*/ "ィ、\n", + /*366*/ "ヨヒマン\n", + /*367*/ "リ辭ツテ\n", + /*368*/ "リ軆n", + /*369*/ "εタ\n", + /*370*/ "ナムヱ蚕n", + /*371*/ "ヨヒマン\n", + /*372*/ "シ", + /*373*/ "ナムル¢d\n", + /*374*/ "ル¢dナムメツテ\n", + /*375*/ "宦準゚マ♭ゅ≫\n", + /*376*/ "ナムヱ\n", + /*377*/ "ヱナムメツテ\n", + /*378*/ "宦準゚マ♭ゅ≫\n", + /*379*/ "サiサ\n", + /*380*/ "テメナム∈ヱナ\n⇔⌒≡∽ナ⊇♭ニ∩タ\n", + /*381*/ "ヨヒマン\n", + /*382*/ "ィ、\n", + /*383*/ "d閧о縺メヱ\n", + /*384*/ "┨ふマテメ\nd閧о縺ク\nヱナリニ∩タ\n", + /*385*/ "ムムモ\n", + /*386*/ "騾ム\n", + /*387*/ "d閧о綵n", + /*388*/ "d閧о縺メヱセ\n", + /*389*/ "閧о綵n", + /*390*/ "%d≠\n", + /*391*/ "宦準゚マ♭ゅ≫\n", + /*392*/ "εタ\n", + /*393*/ "--\n", + /*394*/ "εタ%d≠セ \n", + /*395*/ "εタ%d≠セ %d\n", + /*396*/ "ヨ%d≠セ \n", + /*397*/ "ヨ%d≠セ %d\n", + /*398*/ "テメdメd閧о縺モ\nテメルマ縲d$ハラマよマヨリナリニ\n", + /*399*/ "テメdメd閧о縺クロ≫∨⊥メ\nニ∃εタワ%dワ∵⊆≪リニ\n", + /*400*/ "ルマ縲d$ハラ∵⊇エ⊇♭ニ準ンd″\nニ≫マモ操閧о縲ム逐%d≠п諠ャ♭ニ\n", + /*401*/ "シ掾メb\n", + /*402*/ "ァ☆↓ナム蚕n", + /*403*/ "ァ☆↓モd≠ネマ綵n", + /*404*/ "ル┳モd≠ネマ", + /*405*/ "ハロヘマ゚ムセ", + /*406*/ "烙ヒマ≠", + /*407*/ "烙ヒマ≠", + /*408*/ "烙ヒマ≠", + /*409*/ "烙ヒマ≠", + /*410*/ "烙ヒマ≠", + /*411*/ "烙ヒマ≠", + /*412*/ "烙ヒマ≠", + /*413*/ "烙ヒマ≠", + /*414*/ "烙ヒマ≠", + /*415*/ "烙ヒマ≠操", + /*416*/ "烙ヒマ≠操", + /*417*/ "烙ヒマ≠操", + /*418*/ "烙ヒマ≠操", + /*419*/ "烙ヒマ≠操", + /*420*/ "烙ヒマ≠操", + /*421*/ "烙ヒマ≠操", + /*422*/ "烙ヒマ≠操", + /*423*/ "烙ヒマ≠操", + /*424*/ "烙ヒマ≠操", + /*425*/ "烙ヒマ≠逐", + /*426*/ "烙ヒマ≠逐", + /*427*/ "烙ヒマ≠逐", + /*428*/ "烙ヒマ≠逐", + /*429*/ "烙ヒマ≠逐", + /*430*/ "烙ヒマ≠逐", + /*431*/ "烙ヒマ≠逐", + /*432*/ "烙ヒマ≠逐", + /*433*/ "烙ヒマ≠逐", + /*434*/ "烙ヒマ≠逐", + /*435*/ "烙ヒマ≠凍", + /*436*/ "ワ%ロヒ\n", + /*437*/ "ムマ縲\n", + /*438*/ "ハロヘマ操氏奄о゚≧ムマ┨貼n", + /*439*/ "ハロヘマ逐死ヨヒマ縲マメヨ\n", + /*440*/ "ハロヘマ凍死普劇\n", + /*441*/ "ハロヘマ楳死モミ斧曾n", + /*442*/ "ハロヘマ斧祉ニικ┿ヨδ\n", + /*443*/ "ハロヘマ摩氏凍≠ハラ箪n", + /*444*/ "ハロヘマ沃死ヨヒマ縲マぅう′\n", + /*445*/ "ハロヘマ死ワリ≧d黽\n", + /*446*/ "ハロヘマ凰死ワリ≧dメ\n", + /*447*/ "ナム艢\n", + /*448*/ "ュ⇔∈£ム\n", + /*449*/ "ヤd£蛟マ\n", + /*450*/ "1-1醇セ堰ヨメリて\n", + /*451*/ "1-1醇ウセロ驥フ\n", + /*452*/ "1-2醇セxフヨ\n", + /*453*/ "1-2醇ウセぁう⊇\n", + /*454*/ "1-3醇セヱヲ\n", + /*455*/ "1-3醇ウセ♪テマ∪ぁ∩ツ∩ナ≒タ\n", + /*456*/ "2-1醇セヤ縲ロq\n", + /*457*/ "2-1醇逐セ窿掾メ∀⌒ナ\n", + /*458*/ "2-1醇ウセヨヒマ縲マメおぁ\n", + /*459*/ "3-1醇セ掾タずx\n", + /*460*/ "3-1醇ウセ普劇ヨ\n", + /*461*/ "3-2醇セワ$ムラdラ\n", + /*462*/ "3-2巡ュセd窶ニマ\n", + /*463*/ "3-2醇ウセクケ\n", + /*464*/ "4-1醇セ∃ΓΔ\n", + /*465*/ "4-1醇ウセホ濬n", + /*466*/ "4-2醇セヨフd縲タ∃ルマ窶臀n", + /*467*/ "4-2醇ウセおぁ\n", + /*468*/ "4-3醇セワエ\n", + /*469*/ "4-3巡ュセモ′ワメ翌瘁ロ\n", + /*470*/ "4-3醇ウセ桙歃n", + /*471*/ "5-1醇セメャ\n", + /*472*/ "5-1醇ウセフヘ\n", + /*473*/ "5-2醇セワ縲烙ヒマワ\n", + /*474*/ "5-2巡ュセ♀ハヨマ\n", + /*475*/ "5-2醇ウセlキあい\n", + /*476*/ "5-3醇セツ∨\n", + /*477*/ "5-3醇ウセ″マ♀メ╂Σ\n", + /*478*/ "6-1醇セユ∨≪メ≧ム°d\n", + /*479*/ "6-1醇ウセчшヨ\n", + /*480*/ "6-2醇セшマ⇔\n", + /*481*/ "6-2巡ュセ√\n", + /*482*/ "6-2醇ウセヱ\n", + /*483*/ "7-1醇セ$d窶ニ掾メ蚕n", + /*484*/ "7-1醇ウセラ驕フエ\n", + /*485*/ "8-1醇セロ≒∝√メ蚕n", + /*486*/ "8-1醇ウセノタヨ\n", + /*487*/ "9-1醇セメ掾メ蚕n", + /*488*/ "9-1醇ウセ≠ヘミマ臀n", + /*489*/ "モマ♂ニマ\n", + /*490*/ "ロ轢\n", + /*491*/ "ラdラ%d\n", + /*492*/ "゚dハ繙ツテ\n", + /*493*/ "w∈ほニ∀Ηπ\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/optionsP.c b/src/files/lang/jap-final/optionsP.c new file mode 100644 index 000000000..5395c7e03 --- /dev/null +++ b/src/files/lang/jap-final/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_f.c b/src/files/lang/jap-final/options_str_f.c new file mode 100644 index 000000000..ae50a4297 --- /dev/null +++ b/src/files/lang/jap-final/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Succ鑚\n", + /* 1*/ "Inachev饅n", + /* 2*/ "Echec\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terre:", + /* 6*/ " pr馼istoire", + /* 7*/ "rare pr駸ente", + /* 8*/ "Rouge\n", + /* 9*/ "Jaune\n", + /* 10*/ "Bleu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Rose\n", + /* 15*/ "Marron\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna imper\n", + /* 18*/ "Joanna Robe\n", + /* 19*/ "Joanna Robe courte\n", + /* 20*/ "Joanna Htesse\n", + /* 21*/ "Joanna Plong馥\n", + /* 22*/ "Joanna Scaphandre\n", + /* 23*/ "Joanna Arctique\n", + /* 24*/ "Joanna Laborantin\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Technicien IC H\n", + /* 34*/ "Technicien IC F\n", + /* 35*/ "Soldat IC\n", + /* 36*/ "Commando dataDyne\n", + /* 37*/ "Femme Garde dataDyne\n", + /* 38*/ "S馗urit dataDyne\n", + /* 39*/ "Infanterie dataDyne\n", + /* 40*/ "Troupes dataDyne\n", + /* 41*/ "Secr騁aire\n", + /* 42*/ "Tenue de Bureau\n", + /* 43*/ "Tenue de Bureau\n", + /* 44*/ "N馮ociateur\n", + /* 45*/ "Sniper dataDyne\n", + /* 46*/ "Garde G5\n", + /* 47*/ "Garde SWAT G5\n", + /* 48*/ "Agent CIA\n", + /* 49*/ "Agent FBI\n", + /* 50*/ "Garde Secteur 51\n", + /* 51*/ "Soldat Secteur 51\n", + /* 52*/ "Pilote\n", + /* 53*/ "Ensemble\n", + /* 54*/ "Garde du Corps NSA\n", + /* 55*/ "Technicien Homme\n", + /* 56*/ "Technicien Femme\n", + /* 57*/ "Technicien dataDyne\n", + /* 58*/ "Bio technicien\n", + /* 59*/ "Garde Alaska\n", + /* 60*/ "Pilote AF One\n", + /* 61*/ "Steward\n", + /* 62*/ "Htesse\n", + /* 63*/ "Chef Htesse\n", + /* 64*/ "Le pr駸ident\n", + /* 65*/ "Groom NSA\n", + /* 66*/ "S馗urit Pr駸ident\n", + /* 67*/ "Clone Pr駸ident\n", + /* 68*/ "Garde Pelagic II\n", + /* 69*/ "Soldat Maian\n", + /* 70*/ "Smoking\n", + /* 71*/ "- Pas de Manette branch馥 dans le port 1 -", + /* 72*/ "Eteindre et brancher une manette", + /* 73*/ "DETECTE", + /* 74*/ "NON DETECTE", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Identification Produit Nintendo 64\n", + /* 78*/ "ID Produit:\n", + /* 79*/ "Code Produit:\n", + /* 80*/ "Variante:\n", + /* 81*/ "D騅eloppeur:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "Le Logo Rareware et Perfect Dark sont des trademarks Rare Ltd.\n", + /* 88*/ "Pr駸ent en Dolby Surround. Dolby et le double-D\nsont des trademarks des laboratoires Dolby.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choisissez votre r饌lit饅n", + /* 97*/ "Nouveau...\n", + /* 98*/ "Nouvel Agent...\n", + /* 99*/ "Fichier\n", + /*100*/ "Copier:\n", + /*101*/ "Effacer:\n", + /*102*/ "Effacer notes de jeu...\n", + /*103*/ "Fichier un joueur agent\n", + /*104*/ "Fichier param鑼res simulateur combat\n", + /*105*/ "Fichier joueur simulateur combat\n", + /*106*/ "Fichier PerfcetHead\n", + /*107*/ "Controller Pak\n", + /*108*/ "Utiliser cet 馘iteur pour effacer les notes de jeu\nde votre Controller Pak.\n", + /*109*/ "Choisir le Controller Pak 馘iter:\n", + /*110*/ "Sortie\n", + /*111*/ "Cartouche\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missions Solo\n", + /*118*/ "Simulateur de Combat\n", + /*119*/ "Coop駻atif\n", + /*120*/ "Contre-Op駻ation\n", + /*121*/ "Cin駑a\n", + /*122*/ "S駘ection Mission\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Missions sp馗iales\n", + /*133*/ "Centre dataDyne", + /*134*/ "- D馭ection", + /*135*/ "Recherche dataDyne", + /*136*/ "- Enqu黎e", + /*137*/ "Centre dataDyne", + /*138*/ "- Extraction", + /*139*/ "Villa Carrington", + /*140*/ "- Otage", + /*141*/ "Chicago", + /*142*/ "- Furtif", + /*143*/ "Immeuble G5", + /*144*/ "- Reconnaissance", + /*145*/ "Secteur 51", + /*146*/ "- Infiltration", + /*147*/ "Secteur 51", + /*148*/ "- Sauvetage", + /*149*/ "Secteur 51", + /*150*/ "- Fuite", + /*151*/ "Base A駻ienne", + /*152*/ "- Espionnage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorisme", + /*155*/ "Site du Crash", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Abysses", + /*160*/ "- Eliminer la menace", + /*161*/ "Institut Carrington", + /*162*/ "- D馭ense", + /*163*/ "Croiseur", + /*164*/ "- Assaut", + /*165*/ "Ruines Skedars", + /*166*/ "- Autel Combat", + /*167*/ "Blonde: la vengeance", + /*168*/ "SOS Maian", + /*169*/ "Sauver l'Institut", + /*170*/ "GUERRE!", + /*171*/ "Le Duel", + /*172*/ "Statut\n", + /*173*/ "Abandonner!\n", + /*174*/ "Attention\n", + /*175*/ "Voulez-vous abandonner la mission?\n", + /*176*/ "Annuler\n", + /*177*/ "Abandonner\n", + /*178*/ "Inventaire\n", + /*179*/ "Armes Disponibles\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Vid駮\n", + /*183*/ "Contrle\n", + /*184*/ "Affichage\n", + /*185*/ "Triche\n", + /*186*/ "Sauvegarder jeu\n", + /*187*/ "Changer d'Agent...\n", + /*188*/ "Attention\n", + /*189*/ "Voulez charger un autre agent?\n", + /*190*/ "Oui\n", + /*191*/ "Non\n", + /*192*/ "Options de contrle\n", + /*193*/ "Contrle Joueur 2\n", + /*194*/ "Style de contrle\n", + /*195*/ "Vis馥 invers馥\n", + /*196*/ "Regard t黎e\n", + /*197*/ "Vue t黎e\n", + /*198*/ "Auto-ciblage\n", + /*199*/ "Contrle cible\n", + /*200*/ "Retour\n", + /*201*/ "Fixe\n", + /*202*/ "Alt.\n", + /*203*/ "Options d'affichage\n", + /*204*/ "Affichage Joueur 2\n", + /*205*/ "Vis馥 sur 馗ran\n", + /*206*/ "Toujours montrer cible\n", + /*207*/ "Montrer port馥 zoom\n", + /*208*/ "Munitions affich馥s\n", + /*209*/ "Montrer fonction arme\n", + /*210*/ "Paintball\n", + /*211*/ "Sous-titre\n", + /*212*/ "Afficher temps mission\n", + /*213*/ "Retour\n", + /*214*/ "Options Vid駮\n", + /*215*/ "Taille 馗ran\n", + /*216*/ "Ratio\n", + /*217*/ "Haute-Res\n", + /*218*/ "Split 馗ran 2 joueurs\n", + /*219*/ "Retour\n", + /*220*/ "Plein\n", + /*221*/ "Large\n", + /*222*/ "Cin駑a\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Options Audio\n", + /*228*/ "Son\n", + /*229*/ "Musique\n", + /*230*/ "Mode Son\n", + /*231*/ "Retour\n", + /*232*/ "Mono", + /*233*/ "St駻駮", + /*234*/ "Casque", + /*235*/ "Surround", + /*236*/ "Contrle\n", + /*237*/ "Simple\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "S駘ection Difficult饅n", + /*249*/ "Difficult饅n", + /*250*/ "Meilleur Temps\n", + /*251*/ "Agent\n", + /*252*/ "Agent Sp馗ial\n", + /*253*/ "Agent Perfect\n", + /*254*/ "Annuler\n", + /*255*/ "Options Coop駻atif\n", + /*256*/ "Radar Actif\n", + /*257*/ "Binme Prot馮饅n", + /*258*/ "Binme Perfect\n", + /*259*/ "Continuer\n", + /*260*/ "Annuler\n", + /*261*/ "Humain", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Options Contre-Op駻ation\n", + /*267*/ "Radar Actif\n", + /*268*/ "Contre-Op駻ation\n", + /*269*/ "Continuer\n", + /*270*/ "Annuler\n", + /*271*/ "Joueur 1", + /*272*/ "Joueur 2", + /*273*/ "Briefing\n", + /*274*/ "Accepter\n", + /*275*/ "Refuser\n", + /*276*/ "Succ鑚\n", + /*277*/ "Echec\n", + /*278*/ "Statut Mission:\n", + /*279*/ "Statut Agent:\n", + /*280*/ "Temps Mission:\n", + /*281*/ "Arme de pr馘ilection:\n", + /*282*/ "Victimes:\n", + /*283*/ "Pr馗ision:\n", + /*284*/ "Total de tirs:\n", + /*285*/ " Tirs T黎e:\n", + /*286*/ " Tirs Corps:\n", + /*287*/ " Tirs Membres:\n", + /*288*/ " Autres:\n", + /*289*/ "Appuyer sur START\n", + /*290*/ "D馗馘饅n", + /*291*/ "Actif\n", + /*292*/ "Suspendu\n", + /*293*/ "Echec\n", + /*294*/ "Termin饅n", + /*295*/ "Abandon\n", + /*296*/ "Recommencer", + /*297*/ "Prochaine Mission", + /*298*/ "Accepter\n", + /*299*/ "Refuser\n", + /*300*/ "Objectifs\n", + /*301*/ "Appuyer sur START\n", + /*302*/ "Menu petit mais Perfect\n", + /*303*/ "Simulateur de Combat\n", + /*304*/ "Entranement\n", + /*305*/ "Audio / Vid駮\n", + /*306*/ "Changer d'Agent\n", + /*307*/ "Audio / Visuel\n", + /*308*/ "Son\n", + /*309*/ "Musique\n", + /*310*/ "Mode Son\n", + /*311*/ "Ratio\n", + /*312*/ "Retour\n", + /*313*/ "< Vide >\n", + /*314*/ "SUP", + /*315*/ "MAJ", + /*316*/ "ANNULER", + /*317*/ "OK", + /*318*/ "Visages de Simulateurs de Combat\n", + /*319*/ "Visages Mission\n", + /*320*/ "Erreur\n", + /*321*/ "Annuler\n", + /*322*/ "Controller Pak\nnon d騁ect.\n", + /*323*/ "Fichier non sauvegard.\n", + /*324*/ "Fichier non chargeable.\n", + /*325*/ "Impossible d'effacer le fichier.\n", + /*326*/ "Plus de m駑oire.\n", + /*327*/ "Ce joueur est d駛濬ncharg pour cette partie.\n", + /*328*/ "a 騁 enlev.\n", + /*329*/ "Controller Pak est d馭ectueux ou mal ins駻.\n", + /*330*/ "Effacement des notes 馗hou.\n", + /*331*/ "Erreur charg. jeu\n", + /*332*/ "Erreur sauv. jeu\n", + /*333*/ "Erreur charg. joueur\n", + /*334*/ "Erreur sauv. joueur\n", + /*335*/ "Erreur chargement PerfectHead\n", + /*336*/ "Erreur sauvegarde PerfectHead\n", + /*337*/ "Erreur de lecture de fichier\n", + /*338*/ "Erreur d'馗riture de fichier\n", + /*339*/ "Erreur\n", + /*340*/ "Echec Effacement\n", + /*341*/ "Impossible d'effacer le fichier.\n", + /*342*/ "- V駻ifier que le Controller Pak est\nins駻 correctement.\n", + /*343*/ "Annuler\n", + /*344*/ "Il n'y a plus de place.\n", + /*345*/ "Cool!\n", + /*346*/ "Fichier sauvegard.\n", + /*347*/ "OK\n", + /*348*/ "Une erreur est survenue\npendant la sauvegarde.\n", + /*349*/ "Essayer encore\n", + /*350*/ "Sauver autre emplacement\n", + /*351*/ "Annuler\n", + /*352*/ "Une erreur est survenue\npendant le chargement.\n", + /*353*/ "Essayer encore\n", + /*354*/ "Annuler\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Sauvegarde\n", + /*360*/ "Voulez-vous\nsauvegarder votre\nfichier ailleurs?\n", + /*361*/ "Oui\n", + /*362*/ "Non\n", + /*363*/ "Ins駻ez le\nController Pak\ncontenant: %s dans une manette.\n", + /*364*/ "Ins駻ez le\nController Pak\nde vos sauvegardes\n dans une manette.\n", + /*365*/ "OK\n", + /*366*/ "Annuler\n", + /*367*/ "Choix emplacement\n", + /*368*/ "Lieu\n", + /*369*/ "Dispo\n", + /*370*/ "Effacer Fichiers...\n", + /*371*/ "Annuler\n", + /*372*/ "Satur", + /*373*/ "Copier fichiers\n", + /*374*/ "Choix fichier copier:\n", + /*375*/ "Bouton B pour sortir.\n", + /*376*/ "Effacer Fichier\n", + /*377*/ "Choix fichier effacer:\n", + /*378*/ "Bouton B pour sortir.\n", + /*379*/ "Attention\n", + /*380*/ "Etes-vous sr de\nvouloir effacer?\n", + /*381*/ "Annuler\n", + /*382*/ "OK\n", + /*383*/ "Effacer Notes\n", + /*384*/ "Etes-vous sr\nde vouloir effacer\nces notes?\n", + /*385*/ "Non\n", + /*386*/ "Oui\n", + /*387*/ "Notes de jeu\n", + /*388*/ "Effacer notes de jeu:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Bouton B pour sortir.\n", + /*392*/ "Vide\n", + /*393*/ "--\n", + /*394*/ "Pages Libres: \n", + /*395*/ "Pages libres: %d\n", + /*396*/ "Pages utilis馥s: \n", + /*397*/ "Pages utilis馥s: %d\n", + /*398*/ "D駛 un fichier Perfect Dark.\n", + /*399*/ "Assez de place pour sauver Perfect Dark.\n", + /*400*/ "Controller Pak trop plein pour sauver: 1 note\net 28 pages requises.\n", + /*401*/ "Entrer Nom Agent\n", + /*402*/ "Nouveau...\n", + /*403*/ "Nouvel Agent...\n", + /*404*/ "Nouvelle Recrue", + /*405*/ "Temps Mission:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Sp馗ial\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - Centre dataDyne\n", + /*439*/ "Mission 2 - Villa Carrington\n", + /*440*/ "Mission 3 - Immeuble G5\n", + /*441*/ "Mission 4 - Secteur 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Institut Carrington\n", + /*445*/ "Mission 8 - Croiseur Skedar\n", + /*446*/ "Mission 9 - Ruines Skedars\n", + /*447*/ "Finale\n", + /*448*/ "Jouer Tous\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Op駻ation Dark\n", + /*451*/ "1:1 Conclusion - Descente rapide\n", + /*452*/ "1:2 Intro - En bas\n", + /*453*/ "1:2 Conclusion - Bonjour docteur\n", + /*454*/ "1:3 Intro - Bonne nuit\n", + /*455*/ "1:3 Conclusion - Tu vas o, toi?\n", + /*456*/ "2:1 Intro - N馮ocie-moi 軋!\n", + /*457*/ "2:1 Intro 2 - A un fil\n", + /*458*/ "2:1 Conclusion - Carrington sauv饅n", + /*459*/ "3:1 Intro - Sombre all馥\n", + /*460*/ "3:1 Conclusion - G5 investi\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Sp馗ial - Conspiration\n", + /*463*/ "3:2 Conclusion - Sortie de secours\n", + /*464*/ "4:1 Intro - Sale vid駮\n", + /*465*/ "4:1 Conclusion - A n馮liger\n", + /*466*/ "4:2 Intro - Perles de sagesse\n", + /*467*/ "4:2 Conclusion - Sous la lame\n", + /*468*/ "4:3 Intro - Gaz!\n", + /*469*/ "4:3 Sp馗ial - R騅eil d'Elvis\n", + /*470*/ "4:3 Conclusion - Fuite\n", + /*471*/ "5:1 Intro - Haute altitude\n", + /*472*/ "5:1 Conclusion - D馗ollage\n", + /*473*/ "5:2 Intro - Derni鑽e chance\n", + /*474*/ "5:2 Sp馗ial - Arrimage\n", + /*475*/ "5:2 Conclusion - Plus de choix\n", + /*476*/ "5:3 Intro - Horizons rouges\n", + /*477*/ "5:3 Conclusion - Monstre blond\n", + /*478*/ "6:1 Intro - Infiltration\n", + /*479*/ "6:1 Conclusion - Profondeurs\n", + /*480*/ "6:2 Intro - Plus profond\n", + /*481*/ "6:2 Sp馗ial - Virus!\n", + /*482*/ "6:2 Conclusion - En arri鑽e!\n", + /*483*/ "7:1 Intro - Salut de victoire\n", + /*484*/ "7:1 Conclusion - Course libert饅n", + /*485*/ "8:1 Intro - Piqu!\n", + /*486*/ "8:1 Conclusion - Des ennuis\n", + /*487*/ "9:1 Intro - Air calme\n", + /*488*/ "9:1 Conclusion - J'te tiens!\n", + /*489*/ "Fin de s駲uence\n", + /*490*/ "Cin駑a\n", + /*491*/ "Occult. %d\n", + /*492*/ "Choisir Cible\n", + /*493*/ "Score de Frags\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_g.c b/src/files/lang/jap-final/options_str_g.c new file mode 100644 index 000000000..e83caad68 --- /dev/null +++ b/src/files/lang/jap-final/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Komplettiert\n", + /* 1*/ "Nicht komplettiert\n", + /* 2*/ "Fehlgeschlagen\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Die Erde:", + /* 6*/ " ...in pr臧istorischer Zeit", + /* 7*/ "Rare pr舖entiert", + /* 8*/ "Rot\n", + /* 9*/ "Gelb\n", + /* 10*/ "Blau\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Braun\n", + /* 16*/ "Joanna im Kampfanzug\n", + /* 17*/ "Joanna im Trenchcoat\n", + /* 18*/ "Joanna im Partykleid\n", + /* 19*/ "Joanna im Kleid (zerrissen)\n", + /* 20*/ "Joanna als Stewardess\n", + /* 21*/ "Joanna im Neoprenanzug\n", + /* 22*/ "Joanna - Tauchger舩\n", + /* 23*/ "Joanna im Polar-Outfit\n", + /* 24*/ "Joanna als Labortechniker\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maianer\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington im Anzug\n", + /* 29*/ "Mr. Blond\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI-Labortechniker m.\n", + /* 34*/ "CI-Labortechniker w.\n", + /* 35*/ "CI-Soldat\n", + /* 36*/ "dataDyne Elitesoldat\n", + /* 37*/ "Weibliche dataDyne Wache\n", + /* 38*/ "dataDyne Security-Mann\n", + /* 39*/ "dataDyne Infanterist\n", + /* 40*/ "dataDyne Soldat\n", + /* 41*/ "Sekret舐in\n", + /* 42*/ "Brokleidung\n", + /* 43*/ "lockere Brokleidung\n", + /* 44*/ "Unterh舅dlerin\n", + /* 45*/ "dataDyne Scharfschtze\n", + /* 46*/ "G5-Wache\n", + /* 47*/ "G5-SWAT-Wache\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Wache\n", + /* 51*/ "Area 51 Soldat\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "M舅nlicher Labortechniker\n", + /* 56*/ "Weiblicher Labortechniker\n", + /* 57*/ "dataDyne Labortechniker\n", + /* 58*/ "Biotechniker\n", + /* 59*/ "Alaska-Wache\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Chef-Stewardess\n", + /* 64*/ "Der Pr舖ident\n", + /* 65*/ "NSA Lakai\n", + /* 66*/ "Pr舖identenwache\n", + /* 67*/ "Pr舖ident\"en Klon\n", + /* 68*/ "Pelagic II Wache\n", + /* 69*/ "Maianischer Soldat\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- Kein Controller in Controller-Port 1 -", + /* 72*/ "Schalten Sie aus und schlie゚en Sie einen Controller an.", + /* 73*/ "GEFUNDEN", + /* 74*/ "NICHT GEFUNDEN", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "W臧le deine Wahrheit\n", + /* 97*/ "Neu...\n", + /* 98*/ "Neuer Agent...\n", + /* 99*/ "Speicher\n", + /*100*/ "Kopieren:\n", + /*101*/ "Lschen:\n", + /*102*/ "Spielstand wird gelscht...\n", + /*103*/ "Solo-Missionen Speicherst舅de\n", + /*104*/ "Kampfsimulator Einstellung Speicherst舅de\n", + /*105*/ "Kampfsimulator Spielerdaten\n", + /*106*/ "PerfectHead-Speicherst舅de\n", + /*107*/ "Controller Pak Men\n", + /*108*/ "Dieses Men dient dazu, Speicherst舅de von den\n Controller Paks zu lschen.\n", + /*109*/ "W臧len Sie das Controller Pak:\n", + /*110*/ "Abbruch\n", + /*111*/ "Spielmodul\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Men\n", + /*117*/ "Solo-Missionen\n", + /*118*/ "Multiplayer\n", + /*119*/ "Teamwork\n", + /*120*/ "Counter Operative-Modus\n", + /*121*/ "Filmsequenzen\n", + /*122*/ "Missionsauswahl\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Spezialmissionen\n", + /*133*/ "dataDyne", + /*134*/ "- Abtrnnig", + /*135*/ "dataDyne", + /*136*/ "- Ermittlung", + /*137*/ "dataDyne", + /*138*/ "- Ausbruch", + /*139*/ "Carrington Villa", + /*140*/ "- Geisel Nr. 1", + /*141*/ "Chicago", + /*142*/ "- Unter Tarnung", + /*143*/ "G5-Building", + /*144*/ "- Aufkl舐ung", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rettung", + /*149*/ "Area 51", + /*150*/ "- Flucht", + /*151*/ "Sttzpunkt", + /*152*/ "- Spionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismus", + /*155*/ "Absturzstelle", + /*156*/ "- Konfrontation", + /*157*/ "Pelagic II", + /*158*/ "- Erforschung", + /*159*/ "Tiefsee", + /*160*/ "- Abwendung", + /*161*/ "Carrington Institut", + /*162*/ "- Verteidigung", + /*163*/ "Das Schiff", + /*164*/ "- Verdeckter Angriff", + /*165*/ "Skedar-Ruinen", + /*166*/ "- Der Schrein", + /*167*/ "Mr. Blonds Rache", + /*168*/ "Maianisches SOS", + /*169*/ "Die ワbernahme", + /*170*/ "KRIEG!", + /*171*/ "Das Duell", + /*172*/ "Status\n", + /*173*/ "Abbruch!\n", + /*174*/ "ACHTUNG!\n", + /*175*/ "Mchten Sie die Mission wirklich abbrechen?\n", + /*176*/ "NEIN\n", + /*177*/ "JA\n", + /*178*/ "Inventar\n", + /*179*/ "Verfgbare Waffen\n", + /*180*/ "Optionen\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Steuerung\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Spiel speichern\n", + /*187*/ "Agent wechseln...\n", + /*188*/ "ACHTUNG!\n", + /*189*/ "Mchten Sie wirklich andere Agenten-Daten laden?\n", + /*190*/ "Ja\n", + /*191*/ "Nein\n", + /*192*/ "Steuerungsoptionen\n", + /*193*/ "Steuerung Spieler 2\n", + /*194*/ "Art der Steuerung\n", + /*195*/ "Blick nach oben/unten\n", + /*196*/ "Geradeausschauen\n", + /*197*/ "Kopfbewegung\n", + /*198*/ "Auto-Visier\n", + /*199*/ "Fadenkreuz-Ausricht.\n", + /*200*/ "Zurck\n", + /*201*/ "Halten\n", + /*202*/ "Umschalten\n", + /*203*/ "Display-Optionen\n", + /*204*/ "Spieler 2 anzeigen\n", + /*205*/ "Sicht on-screen\n", + /*206*/ "Ziel immer anzeigen\n", + /*207*/ "Zoom-Bereich anzeigen\n", + /*208*/ "Munition on-screen\n", + /*209*/ "Waffenfunktion anzeigen\n", + /*210*/ "Farbklecks\n", + /*211*/ "Untertitel\n", + /*212*/ "Missionszeit anzeigen\n", + /*213*/ "Zurck\n", + /*214*/ "Video-Optionen\n", + /*215*/ "Screen-Gr゚e\n", + /*216*/ "Verh舁tnis\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Spieler Splitscreen\n", + /*219*/ "Zurck\n", + /*220*/ "Vollbild\n", + /*221*/ "Breitbild\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertikal\n", + /*227*/ "Audio-Optionen\n", + /*228*/ "Soundeffekte\n", + /*229*/ "Musik\n", + /*230*/ "Sound\n", + /*231*/ "Zurck\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Kopfhrer", + /*235*/ "Surround", + /*236*/ "Steuerung\n", + /*237*/ "Einh.\n", + /*238*/ "Beidh.\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "W臧le den Schwierigkeitsgrad\n", + /*249*/ "Schwierigkeitsgrad\n", + /*250*/ "Beste Zeit\n", + /*251*/ "Agent\n", + /*252*/ "Spezialagent\n", + /*253*/ "Perfekter Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Teamwork-Optionen\n", + /*256*/ "Radar Ein\n", + /*257*/ "Teamspieler verletzbar\n", + /*258*/ "Perfekter Kumpel\n", + /*259*/ "Weiter\n", + /*260*/ "Abbrechen\n", + /*261*/ "Menschlich", + /*262*/ "1 Simulant", + /*263*/ "2 Simulanten", + /*264*/ "3 Simulanten", + /*265*/ "4 Simulanten", + /*266*/ "Counter Operative-Optionen\n", + /*267*/ "Radar Ein\n", + /*268*/ "Counter Operative\n", + /*269*/ "Weiter\n", + /*270*/ "Abbrechen\n", + /*271*/ "Spieler 1", + /*272*/ "Spieler 2", + /*273*/ "ワberblick\n", + /*274*/ "Annehmen\n", + /*275*/ "Ablehnen\n", + /*276*/ "Komplettiert\n", + /*277*/ "Fehlgeschlagen\n", + /*278*/ "Missions-Status:\n", + /*279*/ "Status der Agentin:\n", + /*280*/ "Missions-Zeit:\n", + /*281*/ "Bevorzugte Waffe:\n", + /*282*/ "Hits:\n", + /*283*/ "Pr艘.:\n", + /*284*/ "Schsse:\n", + /*285*/ " Kopf:\n", + /*286*/ " Rumpf:\n", + /*287*/ " Gliedm.:\n", + /*288*/ " Andere:\n", + /*289*/ "Drcke START\n", + /*290*/ "Gefallen\n", + /*291*/ "ワberlebt\n", + /*292*/ "Abgebrochen\n", + /*293*/ "Fehlgeschlagen\n", + /*294*/ "Komplettiert\n", + /*295*/ "Abgebrochen\n", + /*296*/ "Neuer Versuch", + /*297*/ "N臘hste Mission", + /*298*/ "Akzeptieren\n", + /*299*/ "Ablehnen\n", + /*300*/ "Ziele\n", + /*301*/ "Drcke START\n", + /*302*/ "Kleines aber feines Men\n", + /*303*/ "Kampfsimulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Agent wechseln\n", + /*307*/ "Audio/Video\n", + /*308*/ "Sound\n", + /*309*/ "Musik\n", + /*310*/ "Sound\n", + /*311*/ "Verh舁tnis\n", + /*312*/ "Zurck\n", + /*313*/ "< Leer >\n", + /*314*/ "ENTF", + /*315*/ "SHIFT", + /*316*/ "ABBR", + /*317*/ "OK", + /*318*/ "Kampfsimulator-Kpfe\n", + /*319*/ "Kpfe in den Missionen\n", + /*320*/ "Fehler\n", + /*321*/ "Abbruch\n", + /*322*/ "Es wurde kein\nController Pak in den\nControllern gefunden.\n", + /*323*/ "Spielstand wurde nicht gespeichert.\n", + /*324*/ "Spielstand wurde nicht geladen.\n", + /*325*/ "Spielstand konnte nicht gelscht werden.\n", + /*326*/ "Zu wenig Speicherplatz.\n", + /*327*/ "Diese Daten sind bereits\ngeladen worden.\n", + /*328*/ "wurde entfernt.\n", + /*329*/ "Controller Pak ist besch臈igt oder nicht richtig eingelegt.\n", + /*330*/ "Lschvorgang konnte nicht durchgefhrt werden.\n", + /*331*/ "Ladefehler\n", + /*332*/ "Speicherfehler\n", + /*333*/ "Ladefehler Spieler\n", + /*334*/ "Speicherfehler Spieler\n", + /*335*/ "Fehler w臧rend des Ladens von PerfectHead.\n", + /*336*/ "Fehler w臧rend des Speicherns von PerfectHead.\n", + /*337*/ "Fehler w臧rend des Lesevorgangs.\n", + /*338*/ "Fehler w臧rend des Schreibvorgangs.\n", + /*339*/ "Fehler\n", + /*340*/ "Lschvorgang nicht erfolgreich.\n", + /*341*/ "Spielstand konnte nicht gelscht werden.\n", + /*342*/ "- ワberprfen Sie, ob das Controller Pak is\nkorrekt eingelegt ist.\n", + /*343*/ "Abbrechen\n", + /*344*/ "Es ist nicht genug Platz vorhanden.\n", + /*345*/ "Cool!\n", + /*346*/ "Spiel gespeichert.\n", + /*347*/ "OK\n", + /*348*/ "W臧rend des Speicherns ereignete\nsich ein Fehler.\n", + /*349*/ "Versuche es nochmals.\n", + /*350*/ "Anderen Speicherplatz w臧len\n", + /*351*/ "Abbrechen\n", + /*352*/ "W臧rend des Ladens ereignete\nsich ein Fehler.\n", + /*353*/ "Wiederholen\n", + /*354*/ "Abbrechen\n", + /*355*/ "Es wird Platz fr den Kopf bentigt.\n", + /*356*/ "W臧len Sie einen Kopf, der berschrieben werden soll:\n", + /*357*/ "OK\n", + /*358*/ "Abbrechen\n", + /*359*/ "Speichern\n", + /*360*/ "Mchten Sie die Daten\nwoanders speichern?\n", + /*361*/ "Ja\n", + /*362*/ "Nein\n", + /*363*/ "Bitte legen Sie das\nController Pak\nmit den %s ein.\n", + /*364*/ "Bitte legen Sie das\nController Pak ein,\nauf dem Sie speichern mchten.\n", + /*365*/ "OK\n", + /*366*/ "Abbrechen\n", + /*367*/ "Speicherplatz w臧len\n", + /*368*/ "Wo!\n", + /*369*/ "Pl舩ze\n", + /*370*/ "Lschen...\n", + /*371*/ "Abbrechen\n", + /*372*/ "Voll", + /*373*/ "Spielstand kopieren\n", + /*374*/ "W臧len Sie den zu kopierenden Spielstand:\n", + /*375*/ "Abbruch\n", + /*376*/ "Spielstand lschen\n", + /*377*/ "Welchen Spielstand:\n", + /*378*/ "Abbruch\n", + /*379*/ "ACHTUNG!\n", + /*380*/ "Mchten Sie diesen Spielstand\nwirklich lschen?\n", + /*381*/ "Abbrechen\n", + /*382*/ "OK\n", + /*383*/ "Spielerdaten lschen\n", + /*384*/ "Mchten Sie diese Spielerdaten\nwirklich lschen?\n", + /*385*/ "Nein\n", + /*386*/ "Ja\n", + /*387*/ "Spielerdaten\n", + /*388*/ "Spielerdaten lschen:\n", + /*389*/ "Daten\n", + /*390*/ "Seiten\n", + /*391*/ "Abbruch\n", + /*392*/ "Frei\n", + /*393*/ "--\n", + /*394*/ "Freie Pl舩ze: \n", + /*395*/ "Freie Pl舩ze: %d\n", + /*396*/ "Belegte Pl舩ze: \n", + /*397*/ "Belegte Pl舩ze: %d\n", + /*398*/ "Es existiert bereits ein Speicherstand.\n", + /*399*/ "Es steht ausreichend freier\nSpeicher zur Verfgung.\n", + /*400*/ "Das Controller Pak ist zu voll, um das Spiel zu\nspeichern. Es werden 28 freie Pl舩ze bentigt.\n", + /*401*/ "Geben Sie den Namen des Agenten ein!\n", + /*402*/ "Neu...\n", + /*403*/ "Neuer Agent...\n", + /*404*/ "Neuer Rekrut", + /*405*/ "Missionszeit:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Zentrale\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5-Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institut\n", + /*445*/ "Mission 8 - Skedar Schiff\n", + /*446*/ "Mission 9 - Skedar Ruinen\n", + /*447*/ "Finale\n", + /*448*/ "Zeig mir alles!\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Die Dunkelheit\n", + /*451*/ "1:1 Outro - Ein rascher Abstieg\n", + /*452*/ "1:2 Intro - Abw舐ts!\n", + /*453*/ "1:2 Outro - Das Treffen\n", + /*454*/ "1:3 Intro - Licht aus\n", + /*455*/ "1:3 Outro - Wohin geht's?\n", + /*456*/ "2:1 Intro - Verhandle DARワBER!\n", + /*457*/ "2:1 Intro 2 - Am seidenen Faden\n", + /*458*/ "2:1 Outro - Carringtons Rettung\n", + /*459*/ "3:1 Intro - Dunkle Gassen\n", + /*460*/ "3:1 Outro - Das Eindringen\n", + /*461*/ "3:2 Intro - Die Perfektion\n", + /*462*/ "3:2 Special - Die Verschwrung\n", + /*463*/ "3:2 Outro - ワber die Feuerleiter\n", + /*464*/ "4:1 Intro - Video-Gemeinheiten\n", + /*465*/ "4:1 Outro - Lose Enden\n", + /*466*/ "4:2 Intro - Perlen der Weisheit\n", + /*467*/ "4:2 Outro - Unterm Messer\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Das Erwachen\n", + /*470*/ "4:3 Outro - Die Flucht\n", + /*471*/ "5:1 Intro - ワber den Wolken\n", + /*472*/ "5:1 Outro - Der Abflug\n", + /*473*/ "5:2 Intro - Die letzte Chance\n", + /*474*/ "5:2 Special - Das Andockmanver\n", + /*475*/ "5:2 Outro - Keine Wahl\n", + /*476*/ "5:3 Intro - Roter Horizont\n", + /*477*/ "5:3 Outro - Der blonde Freak\n", + /*478*/ "6:1 Intro - Wer schleicht da?\n", + /*479*/ "6:1 Outro - In der Tiefe\n", + /*480*/ "6:2 Intro - Noch tiefer\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Der Weg nach oben\n", + /*483*/ "7:1 Intro - Salut\n", + /*484*/ "7:1 Outro - In die Freiheit\n", + /*485*/ "8:1 Intro - Entfhrt\n", + /*486*/ "8:1 Outro - トrger voraus\n", + /*487*/ "9:1 Intro - Ruhe vor dem Sturm\n", + /*488*/ "9:1 Outro - Hab dich!\n", + /*489*/ "Endsequenz\n", + /*490*/ "Cinema\n", + /*491*/ "Tarnung %d\n", + /*492*/ "Zielauswahl\n", + /*493*/ "Hits\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_i.c b/src/files/lang/jap-final/options_str_i.c new file mode 100644 index 000000000..ad87b6209 --- /dev/null +++ b/src/files/lang/jap-final/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Compiuto\n", + /* 1*/ "Incompleto\n", + /* 2*/ "Fallito\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terra:", + /* 6*/ " nella preistoria", + /* 7*/ "Rare presenta", + /* 8*/ "Rosso\n", + /* 9*/ "Giallo\n", + /* 10*/ "Blu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azzurro\n", + /* 13*/ "Arancio\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrone\n", + /* 16*/ "Jo in tuta da lotta\n", + /* 17*/ "Jo in impermeabile\n", + /* 18*/ "Jo in abito da sera\n", + /* 19*/ "Jo in abito strappato\n", + /* 20*/ "Jo come hostess\n", + /* 21*/ "Jo in muta da sub\n", + /* 22*/ "Jo con bombole da sub\n", + /* 23*/ "Jo in tenuta polare\n", + /* 24*/ "Jo in camice\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington in smoking\n", + /* 29*/ "Mr Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Tecnico di lab. CI (uomo)\n", + /* 34*/ "Tecnico di lab. CI (donna)\n", + /* 35*/ "Soldato CI\n", + /* 36*/ "Soldato d'assalto dD\n", + /* 37*/ "Guardia (donna) dD\n", + /* 38*/ "Sicurezza dataDyne\n", + /* 39*/ "Fanteria dataDyne\n", + /* 40*/ "Soldato dataDyne\n", + /* 41*/ "Segretaria\n", + /* 42*/ "Vestito da ufficio\n", + /* 43*/ "Vestito casual\n", + /* 44*/ "Negoziatore\n", + /* 45*/ "Cecchino dataDyne\n", + /* 46*/ "Guardia G5\n", + /* 47*/ "Guardia SWAT G5\n", + /* 48*/ "Agente CIA\n", + /* 49*/ "Agente FBI\n", + /* 50*/ "Guardia Area 51\n", + /* 51*/ "Soldato Area 51\n", + /* 52*/ "Pilota\n", + /* 53*/ "Tute\n", + /* 54*/ "Guardia del corpo NSA\n", + /* 55*/ "Tecnico di lab. (uomo)\n", + /* 56*/ "Tecnico di lab. (donna)\n", + /* 57*/ "Tecnico di lab. dD\n", + /* 58*/ "Tecnico biologico\n", + /* 59*/ "Guardia dell'Alaska\n", + /* 60*/ "Pilota Air Force One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hostess\n", + /* 63*/ "Hostess capo\n", + /* 64*/ "Presidente\n", + /* 65*/ "Lacch NSA\n", + /* 66*/ "Sicurezza presidenziale\n", + /* 67*/ "Clone del Presidente\n", + /* 68*/ "Guardia Pelagic II\n", + /* 69*/ "Soldato Maian\n", + /* 70*/ "Giacca elegante\n", + /* 71*/ "nessun Controller nella presa 1", + /* 72*/ "spegni la console e collega un Controller", + /* 73*/ "PRESENTE", + /* 74*/ "ASSENTE", + /* 75*/ "tm", + /* 76*/ "EXPANSION PAK N64", + /* 77*/ "Identificazione prodotto Nintendo 64\n", + /* 78*/ "ID prodotto:\n", + /* 79*/ "Codice prodotto:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Ideatore:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Versione PAL 8.7 finale\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "I logo Rareware e Perfect Dark sono trademark di Rare Ltd.\n", + /* 88*/ "Presentato in Dolby Surround. Dolby e il simbolo\ndoppia D sono trademark di Dolby Laboratories.", + /* 89*/ "Usa Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback fornito con Miles Sound System da\nRAD Game Tools, Inc. tecnologia di compressione audio MPEG Layer-3\nsu licenza di Fraunhofer IIS e THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "Design Rare nel futuro <<<\n", + /* 94*/ "Edito da Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Scegli la tua realt濬n", + /* 97*/ "Nuovo...\n", + /* 98*/ "Nuovo agente...\n", + /* 99*/ "File di gioco\n", + /*100*/ "Copia:\n", + /*101*/ "Cancella:\n", + /*102*/ "Cancella dati gioco...\n", + /*103*/ "File missioni individuali\n", + /*104*/ "File impostaz. simulatore lotta\n", + /*105*/ "File giocatore simulatore lotta\n", + /*106*/ "File testaPerfect\n", + /*107*/ "Menu Controller Pak\n", + /*108*/ "Usalo per cancellare i dati di gioco\ndai Controller Pak.\n", + /*109*/ "Scegli Controller Pak:\n", + /*110*/ "Esci\n", + /*111*/ "Cassetta gioco\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missioni individuali\n", + /*118*/ "Simulatore lotta\n", + /*119*/ "Collaborazione\n", + /*120*/ "Tutti contro tutti!\n", + /*121*/ "Cinema\n", + /*122*/ "Seleziona Missione\n", + /*123*/ "Missione 1\n", + /*124*/ "Missione 2\n", + /*125*/ "Missione 3\n", + /*126*/ "Missione 4\n", + /*127*/ "Missione 5\n", + /*128*/ "Missione 6\n", + /*129*/ "Missione 7\n", + /*130*/ "Missione 8\n", + /*131*/ "Missione 9\n", + /*132*/ "Missioni speciali\n", + /*133*/ "QG dataDyne", + /*134*/ "- Ribellione", + /*135*/ "Ricerca dataDyne", + /*136*/ "- L'indagine", + /*137*/ "QG dataDyne", + /*138*/ "- Salvataggio", + /*139*/ "Villa Carrington", + /*140*/ "- L'ostaggio nー1", + /*141*/ "Chicago", + /*142*/ "- In incognito", + /*143*/ "Edificio G5", + /*144*/ "- Ricognizione", + /*145*/ "Area 51", + /*146*/ "- L'infiltrazione", + /*147*/ "Area 51", + /*148*/ "- Salvataggio", + /*149*/ "Area 51", + /*150*/ "- La fuga", + /*151*/ "Base aerea", + /*152*/ "- Lo spionaggio", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Luogo del disastro", + /*156*/ "- Lo scontro", + /*157*/ "Pelagic II", + /*158*/ "- L'esplorazione", + /*159*/ "Negli abissi", + /*160*/ "- La minaccia", + /*161*/ "Carrington Institute", + /*162*/ "- La difesa", + /*163*/ "Astronave d'assalto", + /*164*/ "- Attacco", + /*165*/ "Rovine Skedar", + /*166*/ "- Tempio di guerra", + /*167*/ "La vendetta di Mr Blonde", + /*168*/ "L'SOS Maian", + /*169*/ "Il riscatto dell'istituto", + /*170*/ "GUERRA!", + /*171*/ "Il duello", + /*172*/ "Situazione\n", + /*173*/ "Interruzione!\n", + /*174*/ "Attenzione!\n", + /*175*/ "Vuoi interrompere la missione?\n", + /*176*/ "Annulla\n", + /*177*/ "Interrompi\n", + /*178*/ "Inventario\n", + /*179*/ "Armi disponibili\n", + /*180*/ "Opzioni\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Comandi\n", + /*184*/ "Visualizza\n", + /*185*/ "Trucchi\n", + /*186*/ "Salva gioco\n", + /*187*/ "Cambia agente...\n", + /*188*/ "Attenzione!\n", + /*189*/ "Vuoi caricare un altro agente?\n", + /*190*/ "S\n", + /*191*/ "No\n", + /*192*/ "Opzioni comandi\n", + /*193*/ "Comandi giocatore 2\n", + /*194*/ "Modalit comandi\n", + /*195*/ "Inv. punto vista\n", + /*196*/ "Vista in avanti\n", + /*197*/ "Rotazione testa\n", + /*198*/ "Mira automatica\n", + /*199*/ "Mirino\n", + /*200*/ "Esci\n", + /*201*/ "Tieni premuto\n", + /*202*/ "Attiva/Disattiva\n", + /*203*/ "Visualizza opzioni\n", + /*204*/ "Comandi giocatore 2\n", + /*205*/ "Vista su schermo\n", + /*206*/ "Obiettivo sempre\n", + /*207*/ "Area zoom\n", + /*208*/ "Munizioni\n", + /*209*/ "Funzioni arma\n", + /*210*/ "Macchia colorata\n", + /*211*/ "Didascalia\n", + /*212*/ "Tempo missione\n", + /*213*/ "Esci\n", + /*214*/ "Opzioni video\n", + /*215*/ "Dimensioni schermo\n", + /*216*/ "Rapporto\n", + /*217*/ "Alta risoluzione\n", + /*218*/ "Diviso per 2 giocatori\n", + /*219*/ "Esci\n", + /*220*/ "Intero\n", + /*221*/ "Allargato\n", + /*222*/ "Cinema\n", + /*223*/ "Normale\n", + /*224*/ "16:9\n", + /*225*/ "Orizzontale\n", + /*226*/ "Verticale\n", + /*227*/ "Opzioni audio\n", + /*228*/ "Suono\n", + /*229*/ "Musica\n", + /*230*/ "Modalit suono\n", + /*231*/ "Esci\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Cuffie", + /*235*/ "Surround", + /*236*/ "Comandi\n", + /*237*/ "Singolo\n", + /*238*/ "Doppio\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Istruzioni\n", + /*248*/ "Seleziona difficolt濬n", + /*249*/ "Difficolt濬n", + /*250*/ "Tempo migliore\n", + /*251*/ "Agente\n", + /*252*/ "Agente speciale\n", + /*253*/ "Agente Perfect\n", + /*254*/ "Annulla\n", + /*255*/ "Opzioni collaborazione\n", + /*256*/ "Radar acceso\n", + /*257*/ "Fuoco sugli amici\n", + /*258*/ "AmicoPerfect\n", + /*259*/ "Continua\n", + /*260*/ "Annulla\n", + /*261*/ "Umano", + /*262*/ "Un replicante", + /*263*/ "2 replicanti", + /*264*/ "3 replicanti", + /*265*/ "4 replicanti", + /*266*/ "Tutti contro tutti!\n", + /*267*/ "Radar acceso\n", + /*268*/ "Tutti contro tutti!\n", + /*269*/ "Continua\n", + /*270*/ "Annulla\n", + /*271*/ "Giocat. 1", + /*272*/ "Giocat. 2", + /*273*/ "Panoramica\n", + /*274*/ "Accetta\n", + /*275*/ "Rifiuta\n", + /*276*/ "Compiuto\n", + /*277*/ "Fallito\n", + /*278*/ "Risultati missione:\n", + /*279*/ "Stato agente:\n", + /*280*/ "Tempo missione:\n", + /*281*/ "Arma pi usata:\n", + /*282*/ "Vittime:\n", + /*283*/ "Accuratezza:\n", + /*284*/ "Colpi totali:\n", + /*285*/ " Colpi al capo:\n", + /*286*/ " Colpi al corpo:\n", + /*287*/ " Colpi agli arti:\n", + /*288*/ " Altro:\n", + /*289*/ "Premi START\n", + /*290*/ "Deceduto\n", + /*291*/ "Attivo\n", + /*292*/ "Fuggito\n", + /*293*/ "Fallito\n", + /*294*/ "Compiuto\n", + /*295*/ "Interrotto\n", + /*296*/ "Riprova", + /*297*/ "Missione seguente", + /*298*/ "Accetta\n", + /*299*/ "Rifiuta\n", + /*300*/ "Obiettivi\n", + /*301*/ "Premi START\n", + /*302*/ "Menu breve e conciso\n", + /*303*/ "Simulatore\n", + /*304*/ "Addestramento\n", + /*305*/ "Audio/Video\n", + /*306*/ "Cambia agente\n", + /*307*/ "Audio/Video\n", + /*308*/ "Suono\n", + /*309*/ "Musica\n", + /*310*/ "Modalit suono\n", + /*311*/ "Rapporto\n", + /*312*/ "Esci\n", + /*313*/ "< Vuoto >\n", + /*314*/ "CANC", + /*315*/ "MAIU", + /*316*/ "ANNULLA", + /*317*/ "OK", + /*318*/ "Testi simulatore\n", + /*319*/ "Teste missione\n", + /*320*/ "Errore\n", + /*321*/ "Annulla\n", + /*322*/ "Controller Pak assente\nda tutti i Controller.\n", + /*323*/ "File non salvato.\n", + /*324*/ "File non caricato.\n", + /*325*/ "Impossibile cancellare file.\n", + /*326*/ "Memoria esaurita.\n", + /*327*/ "Giocatore gi caricato\nnel gioco.\n", + /*328*/ "rimosso.\n", + /*329*/ "Controller Pak danneggiato o in posizione errata.\n", + /*330*/ "Impossibile cancellare dati gioco.\n", + /*331*/ "Errore caric. gioco\n", + /*332*/ "Errore salv. gioco\n", + /*333*/ "Errore caric. giocat.\n", + /*334*/ "Errore salv. giocat.\n", + /*335*/ "Errore caric. testaPerfect\n", + /*336*/ "Errore salv. testaPerfect\n", + /*337*/ "Errore lettura file\n", + /*338*/ "Errore scrittura file\n", + /*339*/ "Errore\n", + /*340*/ "Non cancellato\n", + /*341*/ "Impossibile cancellare.\n", + /*342*/ "- Controlla che il Controller Pak \nsia inserito correttamente.\n", + /*343*/ "Annulla\n", + /*344*/ "Spazio esaurito.\n", + /*345*/ "Perfetto!\n", + /*346*/ "File salvato.\n", + /*347*/ "OK\n", + /*348*/ "Errore durante il \nsalvataggio!\n", + /*349*/ "Riprova\n", + /*350*/ "Salva altrove\n", + /*351*/ "Annulla\n", + /*352*/ "Errore durante il \ncaricamento!\n", + /*353*/ "Riprova\n", + /*354*/ "Annulla\n", + /*355*/ "Serve spazio per la testa\n", + /*356*/ "Scegli una testa da caricare:\n", + /*357*/ "OK\n", + /*358*/ "Annulla\n", + /*359*/ "Salva\n", + /*360*/ "Vuoi salvare il file\naltrove?\n", + /*361*/ "S\n", + /*362*/ "No\n", + /*363*/ "Inserisci il Controller Pak con il tuo %s in un Controller.\n", + /*364*/ "Inserisci il\nController Pak\ndove vuoi salvare in un Controller.\n", + /*365*/ "OK\n", + /*366*/ "Annulla\n", + /*367*/ "Scegli dove!\n", + /*368*/ "Dove?\n", + /*369*/ "Spazi\n", + /*370*/ "Cancella file...\n", + /*371*/ "Annulla\n", + /*372*/ "Pieno", + /*373*/ "Copia file\n", + /*374*/ "Scegli un file da copiare:\n", + /*375*/ "Premi B per uscire.\n", + /*376*/ "Cancella file\n", + /*377*/ "Che file cancellare?\n", + /*378*/ "Premi B per uscire.\n", + /*379*/ "Attenzione!\n", + /*380*/ "Sicuro di voler\ncancellare il file?\n", + /*381*/ "Annulla\n", + /*382*/ "OK\n", + /*383*/ "Cancella dati gioco\n", + /*384*/ "Sicuro di voler\ncancellare\nquesti dati?\n", + /*385*/ "No\n", + /*386*/ "S\n", + /*387*/ "Dati gioco\n", + /*388*/ "Cancella dati:\n", + /*389*/ "Dati\n", + /*390*/ "Spazi\n", + /*391*/ "Premi B per uscire.\n", + /*392*/ "Vuoto\n", + /*393*/ "--\n", + /*394*/ "Spazi vuoti: \n", + /*395*/ "Spazi vuoti: %d\n", + /*396*/ "Spazi pieni: \n", + /*397*/ "Spazi pieni: %d\n", + /*398*/ "Questo Controller Pak contiene gi濬nun gioco in memoria.\n", + /*399*/ "Spazio sufficiente per\ni dati di Perfect Dark.\n", + /*400*/ "Controller Pak pieno: impossibile salvare dati.\nServono 28 spazi per salvare sul Controller Pak.\n", + /*401*/ "Digita nome agente\n", + /*402*/ "Nuovo...\n", + /*403*/ "Nuovo agente...\n", + /*404*/ "Nuova recluta", + /*405*/ "Tempo missione:", + /*406*/ "Sfida 1", + /*407*/ "Sfida 2", + /*408*/ "Sfida 3", + /*409*/ "Sfida 4", + /*410*/ "Sfida 5", + /*411*/ "Sfida 6", + /*412*/ "Sfida 7", + /*413*/ "Sfida 8", + /*414*/ "Sfida 9", + /*415*/ "Sfida 10", + /*416*/ "Sfida 11", + /*417*/ "Sfida 12", + /*418*/ "Sfida 13", + /*419*/ "Sfida 14", + /*420*/ "Sfida 15", + /*421*/ "Sfida 16", + /*422*/ "Sfida 17", + /*423*/ "Sfida 18", + /*424*/ "Sfida 19", + /*425*/ "Sfida 20", + /*426*/ "Sfida 21", + /*427*/ "Sfida 22", + /*428*/ "Sfida 23", + /*429*/ "Sfida 24", + /*430*/ "Sfida 25", + /*431*/ "Sfida 26", + /*432*/ "Sfida 27", + /*433*/ "Sfida 28", + /*434*/ "Sfida 29", + /*435*/ "Sfida 30", + /*436*/ "Speciale\n", + /*437*/ "Prologo\n", + /*438*/ "Missione 1 - QG dataDyne\n", + /*439*/ "Missione 2 - Villa Carrington\n", + /*440*/ "Missione 3 - Edificio G5\n", + /*441*/ "Missione 4 - Area 51\n", + /*442*/ "Missione 5 - Air Force One\n", + /*443*/ "Missione 6 - Pelagic II\n", + /*444*/ "Missione 7 - Carrington Institute\n", + /*445*/ "Missione 8 - Astronave d'assalto Skedar\n", + /*446*/ "Missione 9 - Rovine Skedar\n", + /*447*/ "Finale\n", + /*448*/ "Mostra tutto!\n", + /*449*/ "Prologo\n", + /*450*/ "1:1 Prologo - Al buio\n", + /*451*/ "1:1 Epilogo - Discesa rapida\n", + /*452*/ "1:2 Prologo - Avanti!\n", + /*453*/ "1:2 Epilogo - L'incontro\n", + /*454*/ "1:3 Prologo - A luci spente\n", + /*455*/ "1:3 Epilogo - Dove si va?\n", + /*456*/ "2:1 Prologo - Il negoziato\n", + /*457*/ "2:1 Prologo 2 - Sul filo del rasoio\n", + /*458*/ "2:1 Epilogo - Il salvataggio\n", + /*459*/ "3:1 Prologo - Vicoli bui\n", + /*460*/ "3:1 Epilogo - Irruzione G5\n", + /*461*/ "3:2 Prologo - La perfezione\n", + /*462*/ "3:2 Speciale - La cospirazione\n", + /*463*/ "3:2 Epilogo - Uscita antincendio\n", + /*464*/ "4:1 Prologo - Interferenze\n", + /*465*/ "4:1 Epilogo - Lasciamo perdere...\n", + /*466*/ "4:2 Prologo - Perle di saggezza\n", + /*467*/ "4:2 Epilogo - Sotto i ferri\n", + /*468*/ "4:3 Prologo - Gas!\n", + /*469*/ "4:3 Speciale - Il risveglio\n", + /*470*/ "4:3 Epilogo - La fuga\n", + /*471*/ "5:1 Prologo - Ad alta quota\n", + /*472*/ "5:1 Epilogo - Il decollo\n", + /*473*/ "5:2 Prologo - L'ultima possibilit濬n", + /*474*/ "5:2 Speciale - L'attracco\n", + /*475*/ "5:2 Epilogo - L'inevitabile\n", + /*476*/ "5:3 Prologo - Orizzonte rosso\n", + /*477*/ "5:3 Epilogo - Il fanatico biondo\n", + /*478*/ "6:1 Prologo - Chi va l?\n", + /*479*/ "6:1 Epilogo - Negli abissi\n", + /*480*/ "6:2 Prologo - Ancora pi gi\n", + /*481*/ "6:2 Speciale - Virus!\n", + /*482*/ "6:2 Epilogo - La risalita\n", + /*483*/ "7:1 Prologo - L'ambasciata\n", + /*484*/ "7:1 Epilogo - Fuga per la libert濬n", + /*485*/ "8:1 Prologo - Prigioniera\n", + /*486*/ "8:1 Epilogo - Guai in vista\n", + /*487*/ "9:1 Prologo - Venti di guerra\n", + /*488*/ "9:1 Epilogo - Fatto!\n", + /*489*/ "Fine sequenza\n", + /*490*/ "Cinema\n", + /*491*/ "Mimesi %d\n", + /*492*/ "Scegli obiettivo\n", + /*493*/ "Uccisioni\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_s.c b/src/files/lang/jap-final/options_str_s.c new file mode 100644 index 000000000..487d1222e --- /dev/null +++ b/src/files/lang/jap-final/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Completado\n", + /* 1*/ "No completado\n", + /* 2*/ "Fallado\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "tierra:", + /* 6*/ " prehistoria", + /* 7*/ "rare presenta", + /* 8*/ "Rojo\n", + /* 9*/ "Amarillo\n", + /* 10*/ "Azul\n", + /* 11*/ "Magenta\n", + /* 12*/ "Az. Claro\n", + /* 13*/ "Naranja\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrn\n", + /* 16*/ "Joanna de Combate\n", + /* 17*/ "Joanna con Gabardina\n", + /* 18*/ "Joanna de Gala\n", + /* 19*/ "Joanna de Fiesta\n", + /* 20*/ "Joanna Azafata\n", + /* 21*/ "Joanna Traje Isot駻mico\n", + /* 22*/ "Joanna con Escafandra\n", + /* 23*/ "Joanna con Traje Polar\n", + /* 24*/ "Joanna Cientfica\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington de Gala\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "T馗nico Masculino del IC\n", + /* 34*/ "T馗nico Femenino del IC\n", + /* 35*/ "Soldado del IC\n", + /* 36*/ "Tropa Asalto dataDyne\n", + /* 37*/ "Guarda de dataDyne\n", + /* 38*/ "Seguridad de dataDyne\n", + /* 39*/ "Infantera de dataDyne\n", + /* 40*/ "Soldado de dataDyne\n", + /* 41*/ "Secretaria\n", + /* 42*/ "Ropa de Oficina\n", + /* 43*/ "Ropa Normal\n", + /* 44*/ "Negociadora\n", + /* 45*/ "Francotirador dataDyne\n", + /* 46*/ "Guarda del G5\n", + /* 47*/ "Guarda SWAT del G5\n", + /* 48*/ "Agente de la CIA\n", + /* 49*/ "Agente del FBI\n", + /* 50*/ "Guarda del チrea 51\n", + /* 51*/ "Soldado del チrea 51\n", + /* 52*/ "Piloto\n", + /* 53*/ "Mono de Trabajo\n", + /* 54*/ "Guardaespaldas de la ANS\n", + /* 55*/ "T馗nico Masculino Lab.\n", + /* 56*/ "T馗nico Femenino Lab.\n", + /* 57*/ "T馗nico del Lab. dataDyne\n", + /* 58*/ "Biot馗nico\n", + /* 59*/ "Guarda de Alaska\n", + /* 60*/ "Piloto del Air Force One\n", + /* 61*/ "Auxiliar\n", + /* 62*/ "Azafata\n", + /* 63*/ "Azafata Jefe\n", + /* 64*/ "El Presidente\n", + /* 65*/ "Lacayo de la ANS\n", + /* 66*/ "Seguridad Presidencial\n", + /* 67*/ "Clon del Presidente\n", + /* 68*/ "Guarda del Pelagic II\n", + /* 69*/ "Soldado Maian\n", + /* 70*/ "Esmoquin\n", + /* 71*/ "- no hay mando conectado a la ranura 1 -", + /* 72*/ "por favor, apaga la consola y conecta un mando", + /* 73*/ "DETECTADO", + /* 74*/ "NO DETECTADO", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Elige Tu Realidad\n", + /* 97*/ "Nuevo...\n", + /* 98*/ "Nuevo Agente...\n", + /* 99*/ "Ficheros de Juego\n", + /*100*/ "Copiar:\n", + /*101*/ "Borrar:\n", + /*102*/ "Borrar Notas de Juego...\n", + /*103*/ "Fichero de Agente Un Jugador\n", + /*104*/ "Fichero de Opciones del Simulador\n", + /*105*/ "Ficheros de Jugador del Simulador\n", + /*106*/ "Ficheros PerfectHead\n", + /*107*/ "Men Controller Pak\n", + /*108*/ "Usa este men para borrar notas de juego\nde tus Controller Pak.\n", + /*109*/ "Elige Controller Pak a Editar:\n", + /*110*/ "Salir\n", + /*111*/ "Cartucho\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Men Perfecto\n", + /*117*/ "Misiones Solo\n", + /*118*/ "Simulador de Combate\n", + /*119*/ "Co-Operativo\n", + /*120*/ "Contra-Operativa\n", + /*121*/ "Pelculas\n", + /*122*/ "Selecciona Misin\n", + /*123*/ "Misin 1\n", + /*124*/ "Misin 2\n", + /*125*/ "Misin 3\n", + /*126*/ "Misin 4\n", + /*127*/ "Misin 5\n", + /*128*/ "Misin 6\n", + /*129*/ "Misin 7\n", + /*130*/ "Misin 8\n", + /*131*/ "Misin 9\n", + /*132*/ "Asignaciones Especiales\n", + /*133*/ "Central dataDyne", + /*134*/ "- Comienzo", + /*135*/ "Lab. dataDyne", + /*136*/ "- Investigacin", + /*137*/ "Central dataDyne", + /*138*/ "- Extraccin", + /*139*/ "Villa Carrington", + /*140*/ "- Reh駭 Uno", + /*141*/ "Chicago", + /*142*/ "- Sigilo", + /*143*/ "Edificio G5", + /*144*/ "- Reconocimiento", + /*145*/ "チrea 51", + /*146*/ "- Infiltracin", + /*147*/ "チrea 51", + /*148*/ "- Rescate", + /*149*/ "チrea 51", + /*150*/ "- Escape", + /*151*/ "Base A駻ea", + /*152*/ "- Espionaje", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Lugar del Impacto", + /*156*/ "- Confrontacin", + /*157*/ "Pelagic II", + /*158*/ "- Exploracin", + /*159*/ "Mar Profundo", + /*160*/ "- Anular Amenaza", + /*161*/ "Instituto Carrington", + /*162*/ "- Defensa", + /*163*/ "Nave de Ataque", + /*164*/ "- Asalto", + /*165*/ "Ruinas Skedar", + /*166*/ "- Templo", + /*167*/ "Venganza de Mr. Blonde", + /*168*/ "SOS Maian", + /*169*/ "Retomando el Instituto", + /*170*/ "。GUERRA!", + /*171*/ "El Duelo", + /*172*/ "Estatus\n", + /*173*/ "。Abortar!\n", + /*174*/ "Cuidado\n", + /*175*/ "ソQuieres abortar la misin?\n", + /*176*/ "Cancelar\n", + /*177*/ "Abortar\n", + /*178*/ "Inventario\n", + /*179*/ "Armas Disponibles\n", + /*180*/ "Opciones\n", + /*181*/ "Audio\n", + /*182*/ "Vdeo\n", + /*183*/ "Controles\n", + /*184*/ "Pantalla\n", + /*185*/ "Trucos\n", + /*186*/ "Guardar Juego\n", + /*187*/ "Cambiar Agente...\n", + /*188*/ "Cuidado\n", + /*189*/ "ソQuieres cargar otro agente?\n", + /*190*/ "S\n", + /*191*/ "No\n", + /*192*/ "Opciones de Control\n", + /*193*/ "Controles Jugador 2\n", + /*194*/ "Estilo de Control\n", + /*195*/ "Control Opuesto\n", + /*196*/ "Mirar al Frente\n", + /*197*/ "Giro de Cabeza\n", + /*198*/ "Auto-Apuntar\n", + /*199*/ "Control Apuntar\n", + /*200*/ "Volver\n", + /*201*/ "Mantener\n", + /*202*/ "Cambiar\n", + /*203*/ "Opciones de Pantalla\n", + /*204*/ "Pantalla Jugador 2\n", + /*205*/ "Mirilla en Pantalla\n", + /*206*/ "Siempre Muestra Objetivo\n", + /*207*/ "Mostrar Alcance del Zoom\n", + /*208*/ "Municin en Pantalla\n", + /*209*/ "Mostrar Funcin del Arma\n", + /*210*/ "Bolas de Pintura\n", + /*211*/ "Subttulos\n", + /*212*/ "Mostrar Tiempo de Misin\n", + /*213*/ "Volver\n", + /*214*/ "Opciones de Vdeo\n", + /*215*/ "Tamao de Pantalla\n", + /*216*/ "Ratio\n", + /*217*/ "Alta Resolucin\n", + /*218*/ "Pantalla Partida 2 Jugadores\n", + /*219*/ "Volver\n", + /*220*/ "Completa\n", + /*221*/ "Panor疥ica\n", + /*222*/ "Cine\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Opciones de Audio\n", + /*228*/ "Sonido\n", + /*229*/ "Msica\n", + /*230*/ "Modo de Sonido\n", + /*231*/ "Volver\n", + /*232*/ "Mono", + /*233*/ "Est駻eo", + /*234*/ "Cascos", + /*235*/ "Surround", + /*236*/ "Controles\n", + /*237*/ "Simple\n", + /*238*/ "Doble\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Informe\n", + /*248*/ "Elegir Dificultad\n", + /*249*/ "Dificultad\n", + /*250*/ "Mejor Tiempo\n", + /*251*/ "Agente\n", + /*252*/ "Agente Especial\n", + /*253*/ "Agente Perfecto\n", + /*254*/ "Cancelar\n", + /*255*/ "Opciones Modo Cooperativo\n", + /*256*/ "Radar S\n", + /*257*/ "Fuego Amigo\n", + /*258*/ "Compaero Perfecto\n", + /*259*/ "Continuar\n", + /*260*/ "Cancelar\n", + /*261*/ "Humano", + /*262*/ "1 Simulante", + /*263*/ "2 Simulantes", + /*264*/ "3 Simulantes", + /*265*/ "4 Simulantes", + /*266*/ "Opciones Contra-Operativa\n", + /*267*/ "Radar S\n", + /*268*/ "Contra-Operativa\n", + /*269*/ "Continuar\n", + /*270*/ "Cancelar\n", + /*271*/ "Jugador 1", + /*272*/ "Jugador 2", + /*273*/ "Visin General\n", + /*274*/ "Aceptar\n", + /*275*/ "Declinar\n", + /*276*/ "Completado\n", + /*277*/ "Fallado\n", + /*278*/ "Estatus de Misin:\n", + /*279*/ "Estatus de Agente:\n", + /*280*/ "Tiempo de Misin:\n", + /*281*/ "Arma Preferida:\n", + /*282*/ "Muertos:\n", + /*283*/ "Precisin:\n", + /*284*/ "Total Disparos:\n", + /*285*/ " Disp. Cabeza:\n", + /*286*/ " Disp. Cuerpo:\n", + /*287*/ " Disp. Miembros:\n", + /*288*/ " Otros:\n", + /*289*/ "Pulsa START\n", + /*290*/ "Difunto\n", + /*291*/ "Activo\n", + /*292*/ "Anulado\n", + /*293*/ "Fallada\n", + /*294*/ "Completada\n", + /*295*/ "Abortada\n", + /*296*/ "Reintentar", + /*297*/ "Sig. Misin", + /*298*/ "Aceptar\n", + /*299*/ "Declinar\n", + /*300*/ "Objetivos\n", + /*301*/ "Pulsa START\n", + /*302*/ "Men Pequeo pero Perfecto\n", + /*303*/ "Simulador de Combate\n", + /*304*/ "Entrenamiento\n", + /*305*/ "Audio/Vdeo\n", + /*306*/ "Cambiar Agente\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sonido\n", + /*309*/ "Msica\n", + /*310*/ "Modo de Sonido\n", + /*311*/ "Ratio\n", + /*312*/ "Volver\n", + /*313*/ "< Vaco >\n", + /*314*/ "SUPR", + /*315*/ "MAY.", + /*316*/ "SALIR", + /*317*/ "OK", + /*318*/ "Cabezas Simulador Combate\n", + /*319*/ "Cabezas de Misiones\n", + /*320*/ "Error\n", + /*321*/ "Cancelar\n", + /*322*/ "El Controller Pak\nno se encontr\nen ningn mando.\n", + /*323*/ "El fichero no ha sido salvado.\n", + /*324*/ "El fichero no se cargar.\n", + /*325*/ "No se puede borrar el fichero.\n", + /*326*/ "Sin memoria.\n", + /*327*/ "Este jugador ya ha sido\ncargado en este juego.\n", + /*328*/ "ha sido quitado.\n", + /*329*/ "El Controller Pak est daado o mal insertado.\n", + /*330*/ "Fall el borrado de la Nota de Juego.\n", + /*331*/ "Error Cargando\n", + /*332*/ "Error Guardando\n", + /*333*/ "Error Cargando\n", + /*334*/ "Error Guardando\n", + /*335*/ "Error Cargando\n", + /*336*/ "Error Guardando\n", + /*337*/ "Error Leyendo\n", + /*338*/ "Error Escribiendo\n", + /*339*/ "Error\n", + /*340*/ "Borrar Fallado\n", + /*341*/ "No se puede borrar el fichero.\n", + /*342*/ "- Comprueba que el Controller Pak\nest insertado correctamente.\n", + /*343*/ "Cancelar\n", + /*344*/ "No hay espacio.\n", + /*345*/ "。Bien!\n", + /*346*/ "Fichero Guardado.\n", + /*347*/ "Aceptar\n", + /*348*/ "Ha aparecido un error\nal intentar guardar.\n", + /*349*/ "Reintentar\n", + /*350*/ "Guardar en otro Sitio\n", + /*351*/ "Cancelar\n", + /*352*/ "Ha aparecido un error\nal intentar cargar.\n", + /*353*/ "Reintentar\n", + /*354*/ "Cancelar\n", + /*355*/ "Necesitas Espacio para la Cabeza\n", + /*356*/ "Elige una cabeza para cargar encima:\n", + /*357*/ "Aceptar\n", + /*358*/ "Cancelar\n", + /*359*/ "Guardar\n", + /*360*/ "ソQuieres guardar tu\nfichero en otro sitio?\n", + /*361*/ "S\n", + /*362*/ "No\n", + /*363*/ "Por favor, inserta el Controller Pak que contiene tu %s en cualquier mando.\n", + /*364*/ "Por favor, inserta el\nController Pak\ndonde est駸 salvando\nen cualquier mando.\n", + /*365*/ "Aceptar\n", + /*366*/ "Cancelar\n", + /*367*/ "Elige Lugar\n", + /*368*/ "Dnde\n", + /*369*/ "Espacios\n", + /*370*/ "Borrar Ficheros...\n", + /*371*/ "Cancelar\n", + /*372*/ "Completo", + /*373*/ "Copiar Fichero\n", + /*374*/ "Elige fichero a copiar:\n", + /*375*/ "Pulsa B para salir.\n", + /*376*/ "Borrar Fichero\n", + /*377*/ "Elige fichero a borrar:\n", + /*378*/ "Pulsa B para salir.\n", + /*379*/ "Cuidado\n", + /*380*/ "ソSeguro que quieres\nborrar este fichero?\n", + /*381*/ "Cancelar\n", + /*382*/ "Aceptar\n", + /*383*/ "Borrar Nota de Juego\n", + /*384*/ "ソEst疽 seguro de\nque quieres borrar\nesta nota de juego?\n", + /*385*/ "No\n", + /*386*/ "S\n", + /*387*/ "Notas de Juego\n", + /*388*/ "Borra Notas de Juego:\n", + /*389*/ "Nota\n", + /*390*/ "P疊inas\n", + /*391*/ "Pulsa B para salir.\n", + /*392*/ "Vaco\n", + /*393*/ "--\n", + /*394*/ "P疊inas Libres: \n", + /*395*/ "P疊inas Libres: %d\n", + /*396*/ "P疊inas Usadas: \n", + /*397*/ "P疊inas Usadas: %d\n", + /*398*/ "Ya existe informacin de Perfect Dark\nen este Controller Pak.\n", + /*399*/ "Hay espacio suficiente para\nnotas de Perfect Dark.\n", + /*400*/ "El Controller Pak est demasiado lleno - 1 nota\ny 28 p疊inas son necesarias para guardar.\n", + /*401*/ "Introduce Nombre del Agente\n", + /*402*/ "Nuevo...\n", + /*403*/ "Nuevo Agente...\n", + /*404*/ "Nuevo Recluta", + /*405*/ "Tiempo de Misin:", + /*406*/ "Desafo 1", + /*407*/ "Desafo 2", + /*408*/ "Desafo 3", + /*409*/ "Desafo 4", + /*410*/ "Desafo 5", + /*411*/ "Desafo 6", + /*412*/ "Desafo 7", + /*413*/ "Desafo 8", + /*414*/ "Desafo 9", + /*415*/ "Desafo 10", + /*416*/ "Desafo 11", + /*417*/ "Desafo 12", + /*418*/ "Desafo 13", + /*419*/ "Desafo 14", + /*420*/ "Desafo 15", + /*421*/ "Desafo 16", + /*422*/ "Desafo 17", + /*423*/ "Desafo 18", + /*424*/ "Desafo 19", + /*425*/ "Desafo 20", + /*426*/ "Desafo 21", + /*427*/ "Desafo 22", + /*428*/ "Desafo 23", + /*429*/ "Desafo 24", + /*430*/ "Desafo 25", + /*431*/ "Desafo 26", + /*432*/ "Desafo 27", + /*433*/ "Desafo 28", + /*434*/ "Desafo 29", + /*435*/ "Desafo 30", + /*436*/ "Especial\n", + /*437*/ "Introduccin\n", + /*438*/ "Misin 1 - Central dataDyne\n", + /*439*/ "Misin 2 - Villa Carrington\n", + /*440*/ "Misin 3 - Edificio G5\n", + /*441*/ "Misin 4 - チrea 51\n", + /*442*/ "Misin 5 - Air Force One\n", + /*443*/ "Misin 6 - Pelagic II\n", + /*444*/ "Misin 7 - Instituto Carrington\n", + /*445*/ "Misin 8 - Nave de Ataque Skedar\n", + /*446*/ "Misin 9 - Ruinas Skedar\n", + /*447*/ "Final\n", + /*448*/ "Mostrar Todo\n", + /*449*/ "Introduccin\n", + /*450*/ "Intro 1:1 - En la Oscuridad\n", + /*451*/ "Final 1:1 - Descenso R疳ido\n", + /*452*/ "Intro 1:2 - Bajando\n", + /*453*/ "Final 1:2 - El Doctor\n", + /*454*/ "Intro 1:3 - Luces Fuera\n", + /*455*/ "Final 1:3 - ソDnde vas?\n", + /*456*/ "Intro 2:1 - 。Negocia esto!\n", + /*457*/ "Intro 2 2:1 - Vida en Lnea\n", + /*458*/ "Final 2:1 - Carrington Rescatado\n", + /*459*/ "Intro 3:1 - Callejn Oscuro\n", + /*460*/ "Final 3:1 - Entrando al G5\n", + /*461*/ "Intro 3:2 - Armas y Poses\n", + /*462*/ "Especial 3:2 - Conspiracin\n", + /*463*/ "Final 3:2 - Salida de Incendios\n", + /*464*/ "Intro 4:1 - Vdeos\n", + /*465*/ "Final 4:1 - Sin Salida\n", + /*466*/ "Intro 4:2 - Perlas de Sabidura\n", + /*467*/ "Final 4:2 - A Cuchillo\n", + /*468*/ "Intro 4:3 - 。Gas!\n", + /*469*/ "Especial 4:3 - Elvis Despierta\n", + /*470*/ "Final 4:3 - Escape\n", + /*471*/ "Intro 5:1 - Gran Altitud\n", + /*472*/ "Final 5:1 - Despegue\n", + /*473*/ "Intro 5:2 - レltima Oportunidad\n", + /*474*/ "Especial 5:2 - Atraque\n", + /*475*/ "Final 5:2 - Sin Opciones\n", + /*476*/ "Intro 5:3 - Horizontes Rojos\n", + /*477*/ "Final 5:3 - Manaco Rubio\n", + /*478*/ "Intro 6:1 - Sube a Bordo\n", + /*479*/ "Final 6:1 - Descendiendo\n", + /*480*/ "Intro 6:2 - M疽 Profundo\n", + /*481*/ "Especial 6:2 - 。Virus!\n", + /*482*/ "Final 6:2 - Saliendo\n", + /*483*/ "Intro 7:1 - Saludo Victorioso\n", + /*484*/ "Final 7:1 - Ayudando a Escapar\n", + /*485*/ "Intro 8:1 - 。Atrapada!\n", + /*486*/ "Final 8:1 - Buscando Problemas\n", + /*487*/ "Intro 9:1 - Aire en Calma\n", + /*488*/ "Final 9:1 - 。Te pill!\n", + /*489*/ "Secuencia Final\n", + /*490*/ "Pelculas\n", + /*491*/ "Oculto %d\n", + /*492*/ "Escoge Objetivo\n", + /*493*/ "Puntuacin\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pamE.c b/src/files/lang/jap-final/pamE.c similarity index 100% rename from src/files/lang/pamE.c rename to src/files/lang/jap-final/pamE.c diff --git a/src/files/lang/jap-final/pamJ.c b/src/files/lang/jap-final/pamJ.c new file mode 100644 index 000000000..910425da6 --- /dev/null +++ b/src/files/lang/jap-final/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nぉ∵けラ♪λえナ⇔チ√∨♂d゚メ∪∩驕÷瘁焉メу┗∵⇒⊇マゎ≒∩マト√∨ツθ∃モムミマメ∵>メшマ∨∝エ⇔⊇≫ツが∀テメモ=エ∀┝エ⇔モ⊇≫∵≠純τマΧイ∈ぷエ⇔⊇≫メÅツοリテメン゚マロハ£モ÷ワリ≧d∀≠ェ⌒ナ≒∃⊇♭瘁焉マぅbナ⇔⊇≫♂d゚≧ムマメ繧香諤≦cネナ⇔⊇≫ツ\n\n|ヨヒマ縲マセ\n\nゆe∵宦痺香轤レエ∨fメルンモ≦пマ∪♪∽チタ⌒メÅエ∨ツテメ♂d゚マ⌒∀♯タゆeモ♭タ≫ÅツワチメΣ閨クメロ⇔ツ閨クぼエ∨ツテメшメθ∃ハΣモ=ネメづυ∈モ≫∩メモムミママぷエ⇔⊇≫ツテ√モン゚マ∀ユ†√≫ラリメΧイ∈ぷエ∨Å∵<普モリÅ┝エ⇔⊇≫ツナ∩ナテテマモ≠艪メァΔ∈ニ≫≡⊂∃く⌒∃ワ┸∵tヮト√⇔⊇≫メÅエエ\n\n|しじ操セ窶#d゚d∈づてヌ≡\n\n窶#d゚d∈づてトヌ√†÷ン゚マロハ£メm♭ぼチテ∀∵♭タ∃∩エ∨モミヨム♭タ≫ツ″ハラト√⇔⊇≫ルマ縲ddヨ⌒∃∋∀∩ぼタツ≫Å∽⊂ツ\n\n|しじ逐セくウワ┸メてロ∈こごヌ≡\n\nけマ⌒噤∨宦メワ┸マ掾ナ⇔Åツf栫ト√∨レd煕ルンマ≡√†=テメワ┸モ<с∈ルホニ≫⊇メb∈シワマニ≫テ∀∵♭タ≫∀⊇⊂メÅツ⌒ナ⊆メコ∃ワリ≧d∵テ√∈みナ⇔ナリ⊃†≠艨モ巣唐ΝΞ♭黽メ烙∀∃エ⇔ナリ⊂Å∽⊂ツュ⇔モぉマ∩∩エ⇔⊇≫メÅエ準祉nメモ轢d驕香クュ⇔ばぱナ⇔⊇ツ†=ネメワ┸メてロ∈こご♭タ≫♭⊆∽⊂ツ⊇チ⇒∩メ驕香マ掾ナ⇔モ<マケメの┸♭モばぱ♭タ∃⊇∩⌒ナ√∃⊇∵蚕n\n|しじ凍セルマ縲dd∈l表n\nルマ縲dd∩≒ワリ≧d∈せпマcヒナ⇔=橿ラ゚dヨヒメ┳氏クぴтニ≫マ≠ヒ∵≒∃⊇≡⊂マニ≫メÅツ瘁焉諱テ√∈栫閨ノ⊥マ♪∋∃档みσ∈ヨΧナ⇔⊇≫∩∝∩≒∃⊇メ♭≦ニマΨ∈⇒ツ⇔チ√ツ\n\n|しじ楳セ♀ラ゚dヨヒ∈ナマ\n\nテ√モ♀ラ゚dヨヒ∵⊆メ┷ヨ♭⇔∨を怐メくウσたÅツぽメ┳死∈°ハラミハ£♂d゚∈エ⇔ぴтニ≫メÅツ♀ラ゚dヨヒモルマ縲d∈ぴтナ÷ン゚マロハ£∈lキニ≫テ∀∵♭タ≫モÅツ\n\n|しじ斧セン゚マロハ£∩≒桙氈ヌ≡\n\nン゚マロハ£∈♪∋∃♭⌒⊇⊇∩≒ばぱナ⇔÷モ′ワ=橿ラ゚dヨヒ∀cマ♀ハヨマ℃ムリ♭ラ驕竅メÅツつ‡%≠ハラ秩クエ⇔шリ♭ヒ∵√†≦ク⊃メラd=d∵ぉ∨¬∈らエ⇔⊇≫♭⊆∽⊂ツ\n\nEND\n", + /* 1*/ "ン゚マロハ£\n", + /* 2*/ "|ワ竄пbhセ\n\nぉ∵けラ♪λえナ⇔チ√∨♂d゚メ∪∩驕÷瘁焉メу┗∵⇒⊇マゎ≒∩マト√∨ツθ∃モムミマメ∵>メшマ∨∝エ⇔⊇≫ツが∀テメモ=エ∀┝エ⇔モ⊇≫∵≠純τマΧイ∈ぷエ⇔⊇≫メÅツοリテメン゚マロハ£モ÷ワリ≧d∀≠ェ⌒ナ≒∃⊇♭瘁焉マぅbナ⇔⊇≫♂d゚≧ムマメ繧香諤≦cネナ⇔⊇≫ツ\n\n|ヨヒマ縲マセ\n\nゆe∵宦痺香轤レエ∨fメルンモ≦пマ∪♪∽チタ⌒メÅエ∨ツテメ♂d゚マ⌒∀♯タゆeモ♭タ≫ÅツワチメΣ閨クメロ⇔ツ閨クぼエ∨ツテメшメθ∃ハΣモ=ネメづυ∈モ≫∩メモムミママぷエ⇔⊇≫ツテ√モン゚マ∀ユ†√≫ラリメΧイ∈ぷエ∨Å∵<普モリÅ┝エ⇔⊇≫ツナ∩ナテテマモ≠艪メァΔ∈ニ≫≡⊂∃く⌒∃ワ┸∵tヮト√⇔⊇≫メÅエエ\n\n|しじ操セ窶#d゚d∈づてヌ≡\n\n窶#d゚d∈づてトヌ√†÷ン゚マロハ£メm♭ぼチテ∀∵♭タ∃∩エ∨モミヨム♭タ≫ツ″ハラト√⇔⊇≫ルマ縲ddヨ⌒∃∋∀∩ぼタツ≫Å∽⊂ツ\n\n|しじ逐セくウワ┸メてロ∈こごヌ≡\n\nけマ⌒噤∨宦メワ┸マ掾ナ⇔Åツf栫ト√∨レd煕ルンマ≡√†=テメワ┸モ<с∈ルホニ≫⊇メb∈シワマニ≫テ∀∵♭タ≫∀⊇⊂メÅツ⌒ナ⊆メコ∃ワリ≧d∵テ√∈みナ⇔ナリ⊃†≠艨モ巣唐ΝΞ♭黽メ烙∀∃エ⇔ナリ⊂Å∽⊂ツュ⇔モぉマ∩∩エ⇔⊇≫メÅエ準モ′ワ∃≒∧メワ┸メてロ∈こご♭タ≫モÅツぽ∀cマルマ縲ddマユ∩⊃エ\n\n|しじ凍セルマ縲dd∈l表n\nルマ縲dd∩≒ワリ≧d∈せпマcヒナ⇔=橿ラ゚dヨヒメ┳氏クぴтニ≫マ≠ヒ∵≒∃⊇≡⊂マニ≫メÅツ瘁焉諱テ√∈栫閨ノ⊥マ♪∋∃档みσ∈ヨΧナ⇔⊇≫∩∝∩≒∃⊇メ♭≦ニマΨ∈⇒ツ⇔チ√ツ\n\n|しじ楳セン゚マロハ£∩≒桙氈ヌ≡\n\nン゚マロハ£∈♪∋∃♭⌒⊇⊇∩≒ばぱナ⇔÷モ′ワ=橿ラ゚dヨヒ∀cマ♀ハヨマ℃ムリ♭ラ驕竅メÅツつ‡%≠ハラ秩クエ⇔шリ♭ヒ∵√†≦ク⊃メラd=d∵ぉ∨¬∈らエ⇔⊇≫♭⊆∽⊂ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nぉ∵けラ♪λえナ⇔チ√∨♂d゚メ∪∩驕÷瘁焉メу┗∵⇒⊇マゎ≒∩マト√∨ツθ∃モムミマメ∵>メшマ∨∝エ⇔⊇≫ツが∀テメモ=エ∀┝エ⇔モ⊇≫∵≠純τマΧイ∈ぷエ⇔⊇≫メÅツοリテメン゚マロハ£モ÷ワリ≧d∀≠ェ⌒ナ≒∃⊇♭瘁焉マぅbナ⇔⊇≫♂d゚≧ムマメ繧香諤≦cネナ⇔⊇≫ツ\n\n|ヨヒマ縲マセ\n\nゆe∵宦痺香轤レエ∨fメルンモ≦пマ∪♪∽チタ⌒メÅエ∨ツテメ♂d゚マ⌒∀♯タゆeモ♭タ≫ÅツワチメΣ閨クメロ⇔ツ閨クぼエ∨ツテメшメθ∃ハΣモ=ネメづυ∈モ≫∩メモムミママぷエ⇔⊇≫ツテ√モン゚マ∀ユ†√≫ラリメΧイ∈ぷエ∨Å∵<普モリÅ┝エ⇔⊇≫ツナ∩ナテテマモ≠艪メァΔ∈ニ≫≡⊂∃く⌒∃ワ┸∵tヮト√⇔⊇≫メÅエエ\n\n|しじ操セ窶#d゚d∈づてヌ≡\n\n窶#d゚d∈づてトヌ√†÷ン゚マロハ£メm♭ぼチテ∀∵♭タ∃∩エ∨モミヨム♭タ≫ツ″ハラト√⇔⊇≫ルマ縲ddヨ⌒∃∋∀∩ぼタツ≫Å∽⊂ツ\n\n|しじ逐セくウワ┸メてロ∈こごヌ≡\n\nけマ⌒噤∨宦メワ┸マ掾ナ⇔Åツf栫ト√∨レd煕ルンマ≡√†=テメワ┸モ<с∈ルホニ≫⊇メb∈シワマニ≫テ∀∵♭タ≫∀⊇⊂メÅツ⌒ナ⊆メコ∃ワリ≧d∵テ√∈みナ⇔ナリ⊃†≠艨モ巣唐ΝΞ♭黽メ烙∀∃エ⇔ナリ⊂Å∽⊂ツュ⇔モぉマ∩∩エ⇔⊇≫メÅエ準モ′ワ∃≒∧メワ┸メてロ∈こご♭タ≫モÅツぽ∀cマルマ縲ddマユ∩⊃エ\n\n|しじ凍セン゚マロハ£∩≒桙氈ヌ≡\n\nン゚マロハ£∈♪∋∃♭⌒⊇⊇∩≒ばぱナ⇔÷モ′ワ=橿ラ゚dヨヒ∀cマ♀ハヨマ℃ムリ♭ラ驕竅メÅツつ‡%≠ハラ秩クエ⇔шリ♭ヒ∵√†≦ク⊃メラd=d∵ぉ∨¬∈らエ⇔⊇≫♭⊆∽⊂ツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "窶#d゚d∈づてヌ≡\n", + /* 6*/ "くウワ┸メてロ∈こごヌ≡\n", + /* 7*/ "ルマ縲dd∈l表n", + /* 8*/ "♀ラ゚dヨヒ∈ナマ\n", + /* 9*/ "ン゚マロハ£∩≒桙氈ヌ≡\n", + /* 10*/ "テ√♭テメメm∈\n⌒エ∀裸ウマてツ≫エ\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "⊆√∵♀ラ゚dヨヒ∃∋Å∽ツ\n┨ふマぽ∈ぴт♭タ≫メ∩∃蚕n", + /* 13*/ "テテ∩≒ワマラ驕ホタオエ\n", + /* 14*/ "モ′ワ∵ほト√∨\n", + /* 15*/ "♀ラ゚dヨヒ∵ほト√∨\n", + /* 16*/ "ン゚マロハ£∩≒桙氈タ∨\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "トッ=テメも∈エ⇔÷dメロэm\nワリ≧d∈ぞ♯ツ∃⊇♭チ√エ\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "ン゚マメくウワ┸メてロ∈こごナ∨\n", + /* 21*/ "ルマ縲dd∈l普ナ∨\n", + /* 22*/ "♀ラ゚dヨヒメ┳氏謔メтナ∨\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "°ハラミハ£♂d゚\n", + /* 26*/ "°ハラミハ£♂d゚\n", + /* 27*/ "\n", + /* 28*/ "テテメ$轢∈宴ロニ√†\nくウワ┸∈こご♭タ∧⊂Åツ\n", + /* 29*/ "ト⊆÷窶#d゚d∈て∩ニツ\n", + /* 30*/ "窶#d゚d∈づてナ∨\n", + /* 31*/ "∪∩ナ⊇∃ッ<栫ワ⊇∃⊇ツ\n", + /* 32*/ "リマゥ∩ムツ\nqエ∨=ワ∃⊇∝蚕n", + /* 33*/ "iヮワ⌒⊇∃⊇メ∩∃タ\n縲オ∃⊇ツ\n", + /* 34*/ "タエ∀ョマモ栫ソ⊇≫モ≡ツ\nユ°dナ⇔ツ\n", + /* 35*/ "ト⊆リ⊥≫∝≡ツ瘁焉觸n≠ヒナ⇔テ∃⊇nマ蚕n", + /* 36*/ "メムワツぁ\n", + /* 37*/ "んナ∨∩ナ≒エ\n", + /* 38*/ "テ£なてテ◯∽\n◆○〒ヒカエエ凰・▼↓\np◇・、ヤ◇カナ浴梳ネヨネ\n££%凍ヨ≧チ準メ死メヌ項エエ\n", + /* 39*/ "♀ラ゚dヨヒタ純ニモヤタ\nテテメ£∈┏⊥≒√≫タ\n", + /* 40*/ "⊆ッツ∃∋∀∩θモヤÅツ\nナ∩ナくウワ┸∵Åエ\npぉ∨¬メこごロэモンтト√蚕n", + /* 41*/ "♪⊂⊇⊂テ∀タ\n", + /* 42*/ "£∈┏⊥≫∨⊥マ\nヴ∵♭タ≫テ∀モ氏ヤ∀⇒蚕np死死祉普ソ≒ン゚マロハ£∈」ばニ≫ツ\nケÅ∵<煤諠浴煥」なニ≫ナ∩∃⊇ツ\npΑ∈ナ⇔⊇≫ンモ∃⊇ツ\nニ∬マ桙氈ニ≫メÅツ\npぉ∀cマ凵ツ⇔⊂√ナ∩エ∨≡ツ\nト≡∃≒潤ヘミマ艢≧dラツ\n", + /* 43*/ "ン゚マメくウワ┸メてロ∈こごナ∨\n", + /* 44*/ "、ィ∵≧マ∝√∨盾ュウワ┸メテマョャ\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pamP.c b/src/files/lang/jap-final/pamP.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/jap-final/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_f.c b/src/files/lang/jap-final/pam_str_f.c new file mode 100644 index 000000000..f6ce2d90c --- /dev/null +++ b/src/files/lang/jap-final/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'oc饌n Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alli馥 forc馥: la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif 1: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle de Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif 3: - S馗uriser la Salle de Contrle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrle afin de pouvoir restaurer la personnalit du Dr. Caroll sans interruption. Nous ne savons pas quelles s馗urit駸 ont 騁 mises en place pour emp鹹her cette op駻ation, alors soyez prudente.\n\n|Objectif 4: - Restaurer la personnalit du Dr. Caroll\n\nC'est la derni鑽e 騁ape du plan d'urgence mis en place par le Dr. Caroll durant le debriefing la villa. Restaurer sa personnalit l'I.A. lui permettra de reprendre le contrle de l'enveloppe dou馥 de raison et d'autres parties du vaisseau.\n\n|Objectif 5: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 1*/ "VAISSEAU CETAN\n", + /* 2*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'oc饌n Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alli馥 forc馥: la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais exist.\n\n|Objectif 1: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle de Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif 3: - S馗uriser la Salle de Contrle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrle afin de pouvoir restaurer la personnalit du Dr. Caroll sans interruption. Nous ne savons pas quelles s馗urit駸 ont 騁 mises en place pour emp鹹her cette op駻ation, alors soyez prudente.\n\n|Objectif 4: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'oc饌n Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alli馥 forc馥: la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif 1: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle de Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif 3: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R饌ctiver t駘駱orteurs\n", + /* 6*/ "Neutraliser Super-Arme Cetan\n", + /* 7*/ "S馗uriser la Salle de Contrle\n", + /* 8*/ "Restaurer la personnalit du Dr. Caroll\n", + /* 9*/ "S'馗happer du vaisseau cetan\n", + /* 10*/ "Cela nous aidera nous d駱lacer plus\n vite dans ce vaisseau.\n", + /* 11*/ "Ce camouflage corporel nous aidera nous \nprot馮er des d馭enses automatiques.\n", + /* 12*/ "Voil le Dr. Caroll. Voyons voir si nous \npouvons inverser le processus.\n", + /* 13*/ "On doit se barrer d'ici!\n", + /* 14*/ "Elvis a 騁 tu.\n", + /* 15*/ "Dr. Caroll a 騁 tu.\n", + /* 16*/ "Evacuation du vaisseau Cetan r騏ssie.\n", + /* 17*/ "Elvis a d騅errouill la porte.\n", + /* 18*/ "Tiens, prends cette arme et tiens ces Skedars distance pendant que je travaille.\n", + /* 19*/ "Camouflage corporel obtenu.\n", + /* 20*/ "Super-Arme Cetan neutralis馥.\n", + /* 21*/ "Salle de Contrle s馗uris馥.\n", + /* 22*/ " Personnalit du Dr. Caroll restaur馥.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disque sauvegarde\n", + /* 26*/ "Un disque sauvegarde \n", + /* 27*/ "\n", + /* 28*/ "Un peu de sabotage ne ferait pas de mal\n ce truc.\n", + /* 29*/ "Il est temps de r饌ctiver ces t駘駱orteurs.\n", + /* 30*/ "T駘駱orteurs r饌ctiv駸.\n", + /* 31*/ "C'est bizarre, il n'y a personne dans le coin.\n", + /* 32*/ "Pas de traces de combat. Pas de douilles ou d'impacts d'armes feu.\n", + /* 33*/ "Ca n'a pas de sens. Il devrait au moins y avoir une arri鑽e-garde.\n", + /* 34*/ "Il doit y avoir quelqu'un plus loin. Couvre-moi.\n", + /* 35*/ "C'est parti... J'esp鑽e que la dataDyne n'a rien pr騅u pour emp鹹her 軋...\n", + /* 36*/ "Virus d騁ect.\n", + /* 37*/ "Ca m'apprendra, tiens...\n", + /* 38*/ "Lancement des contre-mesures. Lancem...***ooOOoh!!***aaAAh!!***aaAAAhh!! ***ooOOoh!!***YaaAAAhh!!***YEEAaAaAaAAAaAAaAHHH!!***\n", + /* 39*/ "Dr. Caroll? Avez-vous repris le contrle? Pouvez-vous arr黎er le programme?\n", + /* 40*/ "En effet, me voil de retour, tr鑚 ch鑽e. Le programme est lanc depuis trop longtemps pour que je puisse l'arr黎er. Il n'y a qu'une seule issue maintenant.\n", + /* 41*/ "Que voulez-vous dire?\n", + /* 42*/ "Quand le programme sera termin, j'aurai le contrle d'une arme extr麥ement puissante. Cette arme ne doit pas exister. Je dois par cons駲uent d騁ruire le vaisseau cetan et moi avec, malheureusement. Joanna... Nous n'avons ni le choix ni le temps d'en discuter. Allez-y! Evitez les Skedars et vous aurez le temps de vous 馗happer. Ce fut un honneur de travailler avec vous. Adieu, Joanna Dark.\n", + /* 43*/ "La Super-Arme Cetan a 騁 neutralis馥.\n", + /* 44*/ "Munitions 駱uis馥s - arme ennemie ne peut 黎re d騁ruite.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_g.c b/src/files/lang/jap-final/pam_str_g.c new file mode 100644 index 000000000..ce54ba24b --- /dev/null +++ b/src/files/lang/jap-final/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Zerstren Sie alle Kraftknoten innerhalb des Schiffes. Nur so knnen Sie die Waffe au゚er Kraft setzen. Einige dieser Knoten knnten sich aber au゚erhalb menschlicher Reichweite befinden.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persnlichkeit ungestrt restaurieren knnen. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Restaurieren Sie Dr. Carolls Persnlichkeitsprofil!\n\nDies ist die letzte Stufe des Notfallplans, ber den uns Dr. Caroll bei seinem Aufenthalt in der Villa informiert hat. Wenn seine Persnlichkeit mit der Codeknacker-Einheit verbunden ist, erlangt er nicht nur wieder die Kontrolle ber den Sapienten, sondern auch ber manche Teile des Cetanischen Schiffs.\n\n|5. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 1*/ "CETANISCHES SCHIFF\n", + /* 2*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben,besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persnlichkeit ungestrt restaurieren knnen. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Reaktivieren Sie die Teleporter!\n", + /* 6*/ "Machen Sie die Waffe funktionsunf臧ig!\n", + /* 7*/ "Sichern Sie den Kontrollraum!\n", + /* 8*/ "Restaurieren Sie Dr. Caroll!\n", + /* 9*/ "Flchten Sie aus dem Schiff!\n", + /* 10*/ "Auf diese Weise kommen wir innerhalb des Schiffs\nschneller voran.\n", + /* 11*/ "Diese Tarnkappe schtzt uns vor den automatischen\nVerteidigungsanlagen.\n", + /* 12*/ "Da ist Dr. Caroll. Wir mssen versuchen,\nseine Persnlichkeit wieder herzustellen.\n", + /* 13*/ "Wir mssen hier raus!\n", + /* 14*/ "Elvis wurde eliminiert.\n", + /* 15*/ "Dr. Caroll wurde zerstrt.\n", + /* 16*/ "Evakuierung erfolgreich\n", + /* 17*/ "Elvis hat die Tr entriegelt.\n", + /* 18*/ "Hier, nimm diese Waffe und halte mir die Skedar\nvom Leib, w臧rend ich hier arbeite.\n", + /* 19*/ "Tarnkappe wurde aufgenommen.\n", + /* 20*/ "Die Cetanische Waffe wurde funktionsunf臧ig gemacht.\n", + /* 21*/ "Kontrollraum wurde gesichert.\n", + /* 22*/ "Dr. Carolls Presnlichkeitsprofil wurde restauriert.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Sicherungsdiskette\n", + /* 26*/ "Eine Sicherungsdiskette\n", + /* 27*/ "\n", + /* 28*/ "Ich glaube, ein klein wenig Sabotage w舐e hier \ndurchaus angebracht.\n", + /* 29*/ "Wir sollten nun diese Teleporter reaktivieren.\n", + /* 30*/ "Teleporter wurde reaktiviert.\n", + /* 31*/ "Irgendwas ist hier faul. Es ist niemand zu sehen.\n", + /* 32*/ "Keine Spuren eines Kampfes. Keine leeren Patronenhlsen oder Einschusslcher.\n", + /* 33*/ "Aber es sollte zumindest noch eine Wache hier sein. Das macht alles keinen Sinn.\n", + /* 34*/ "Vielleicht finden wir weiter drinnen noch jemanden. Gib mir Deckung.\n", + /* 35*/ "Ich hoffe, dass dataDyne nichts unternommen hat, um zu verhindern, dass...\n", + /* 36*/ "Virus entdeckt.\n", + /* 37*/ "Ich und mein gro゚es Mundwerk.\n", + /* 38*/ "Gegenma゚nahmen werden eingeleitet. Gegenma...*** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Haben Sie sich wieder unter Kontrolle? Knnen Sie das Programm stoppen?\n", + /* 40*/ "Ich habe mich wieder unter Kontrolle. Aber das Programm l舫ft schon zu lange. Ich kann es jetzt nicht mehr unterbrechen. Es gibt jetzt nur noch eine Mglichkeit.\n", + /* 41*/ "Wovon sprechen Sie?\n", + /* 42*/ "Wenn das Programm durchgelaufen ist, bin ich der einzige, der diese schreckliche Waffe kontrollieren kann. Ich darf nicht l舅ger existieren. Das Cetanische Schiff muss mit mir zerstrt werden. Es gibt leider keine Alternative, Joanna. Glauben Sie mir! Gehen Sie! Weichen Sie den Skedar aus und flchten Sie! Es war mir eine gro゚e Ehre, mit Ihnen zu arbeiten. Leben Sie wohl, Joanna Dark.\n", + /* 43*/ "Die Cetanische Waffe wurde funktionsunf臧ig gemacht.\n", + /* 44*/ "Munition verschwendet - Die Waffe kann nicht funktionsunf臧ig gemacht werden.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_i.c b/src/files/lang/jap-final/pam_str_i.c new file mode 100644 index 000000000..b95cc1948 --- /dev/null +++ b/src/files/lang/jap-final/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Devi disattivare l'arma distruggendo i punti nevralgici di comando sparsi per l'astronave. Attenta: talvolta le armi normali non fuzioneranno.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Restituisci il cervello al Dr. Caroll\n\nQuesta l'ultima fase del piano di contingenza presentato dal Dr. Caroll durante il suo rapporto alla villa. Riportando il suo cervello alla struttura del decodificatore gli sar restituita la facolt di comando sul Sapiente e su quelle parti dell'astronave Cetan inglobate dal decodificatore. \n\n|Obiettivo 5: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 1*/ "ASTRONAVE CETAN\n", + /* 2*/ "|Situazione:\n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscir a sabotare l'unit di comando dell'arma.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscir a sabotare l'unit di comando dell'arma.\n\n|Obiettivo 3: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva i teleportali\n", + /* 6*/ "Disattiva la megabomba Cetan \n", + /* 7*/ "Controlla la sala comandi\n", + /* 8*/ "Restituisci il cervello al Dr. Caroll \n", + /* 9*/ "Fuga dall'astronave Cetan\n", + /* 10*/ "Questo ci aiuter a fare il giro \ndell'astronave pi velocemente.\n", + /* 11*/ "Questa immuno-maschera ci protegger \ndalle difese automatiche.\n", + /* 12*/ "Ecco il Dr. Caroll! Vediamo se riusciamo \nancora a recuperarlo.\n", + /* 13*/ "Dobbiamo uscire di qua! Presto!\n", + /* 14*/ "Elvis stato ucciso.\n", + /* 15*/ "Il Dr. Caroll stato ucciso.\n", + /* 16*/ "Evacuazione dall'astronave Cetan riuscita.\n", + /* 17*/ "Elvis ha aperto la porta.\n", + /* 18*/ "To'! Prendi questa e tienimi lontano \nquegli Skedar mentre sto lavorando.\n", + /* 19*/ "Trovata immuno-maschera.\n", + /* 20*/ "Disattivata megabomba Cetan.\n", + /* 21*/ "Sala comandi sotto controllo.\n", + /* 22*/ "Restituito il cervello al Dr. Caroll.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco di backup\n", + /* 26*/ "Disco di backup\n", + /* 27*/ "\n", + /* 28*/ "Sembra che un po' di sabotaggio \nnon possa fargli che bene! \n", + /* 29*/ "ネ ora di riattivare questi teleportali.\n", + /* 30*/ "I teleportali sono stati riattivati.\n", + /* 31*/ "Non normale! Non si vede anima viva!\n", + /* 32*/ "Tutto tranquillo!!! Niente bossoli, niente tracce di proiettili!\n", + /* 33*/ "Ma ci deve essere almeno qualche retroguardia... Non ha senso!!!\n", + /* 34*/ "Ci deve essere qualcuno all'interno. Coprimi!\n", + /* 35*/ "Ecco! Spero solo che la dataDyne non abbia fatto niente per impedire...\n", + /* 36*/ "Trovato un virus.\n", + /* 37*/ "Io e la mia linguaccia!!!\n", + /* 38*/ "Contromisure adottate... Contromi...***(cric... cric... crac... ecc...)*** Non ci posso credere! Quei vandali mi hanno manipolato i circuiti... ***AAAHIIIAAA... cric... crac...\n", + /* 39*/ "Dr. Caroll? Riprenda il controllo di s! Riesce a fermare il programma?\n", + /* 40*/ "S, s, ci sono, mia cara! Ma ho paura che il programma sia andato troppo oltre per poterlo fermare adesso. C' un sola via d'uscita!\n", + /* 41*/ "Cosa significa?\n", + /* 42*/ "Quando il programma avr finito, sar ingrado di comandare una bomba potentissima! Non posso permettermi di restare in vita! Devo distruggere i Cetan e con loro me stesso, sfortunatamente! Mi spiace, Joanna... Non c' altro modo e neanche tempo di discutere la cosa! Ora va! Evita gli Skedar e avrai tutto il tempo di fuggire. ネ stato un onore lavorare con te. Addio, Joanna Dark!\n", + /* 43*/ "La megabomba Cetan stata disattivata.\n", + /* 44*/ "Operazione fallita: megabomba ancora attiva.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_s.c b/src/files/lang/jap-final/pam_str_s.c new file mode 100644 index 000000000..e5346c7b7 --- /dev/null +++ b/src/files/lang/jap-final/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Depende de ti: destruye los nodos de energa a lo largo de la nave, y el arma dejar de ser operativa. Algunos estar疣 fuera del alcance de las armas normales.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegrate de que la Sala de Control est libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qu salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, as que ten cuidado.\n\n|Objetivo Cuatro: - Restaurar la Personalidad del Dr. Caroll\n\nノsta es la ltima fase del plan de contingencia que el Dr. Caroll adelant durante su informe en la Villa. Restaurar su personalidad a la del creador de cdigos de apertura reafirmar su control sobre el caparazn inteligente y aquellas partes de la nave Cetan que como 'rompedor de cdigos' es capaz de tomar.\n\n|Objetivo Cinco: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 1*/ "NAVE CETAN\n", + /* 2*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Elvis sabotear los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegrate de que la Sala de Control est libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qu salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, as que ten cuidado.\n\n|Objetivo Cuatro: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Elvis sabotear los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar los teleportales\n", + /* 6*/ "Desactivar la mega-arma Cetan\n", + /* 7*/ "Asegurar la sala de control\n", + /* 8*/ "Restaurar personalidad del Dr. Caroll\n", + /* 9*/ "Escapar de la nave Cetan\n", + /* 10*/ "Esto nos ayudar a recorrer la \nnave m疽 r疳ido.\n", + /* 11*/ "Este disfraz de anticuerpos nos proteger \nde las defensas autom疸icas.\n", + /* 12*/ "Ah est el Dr. Caroll. Veamos si podemos \narreglar lo que le hicieron.\n", + /* 13*/ "。Tenemos que salir de aqu!\n", + /* 14*/ "Elvis ha muerto.\n", + /* 15*/ "El Dr. Caroll ha muerto.\n", + /* 16*/ "Evacuacin de la nave Cetan exitosa.\n", + /* 17*/ "Elvis ha abierto la puerta.\n", + /* 18*/ "Aqu. Coge este arma y mant駭 a los Skedar \nalejados de m mientras trabajo.\n", + /* 19*/ "M疽cara de anticuerpos obtenida.\n", + /* 20*/ "La mega-arma Cetan ha sido desactivada.\n", + /* 21*/ "La Sala de Control ha sido asegurada.\n", + /* 22*/ "La personalidad del Dr. Caroll ha sido restaurada.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco de seguridad\n", + /* 26*/ "Un disco de seguridad\n", + /* 27*/ "\n", + /* 28*/ "Parece que esto puede beneficiarnos para \nun pequeo sabotaje.\n", + /* 29*/ "Es hora de reactivar esos teleportales.\n", + /* 30*/ "Los teleportales han sido reactivados.\n", + /* 31*/ "Esto no es normal. No hay nadie por aqu.\n", + /* 32*/ "No hay seales de lucha. No hay casquillos o agujeros de bala.\n", + /* 33*/ "Pero debera haber un guarda al menos. No tiene sentido.\n", + /* 34*/ "Debe haber alguien m疽 adelante. Cbreme.\n", + /* 35*/ "All vamos. Espero que dataDyne no haya hecho nada para prevenir esto...\n", + /* 36*/ "Virus detectado.\n", + /* 37*/ "。Qu bocaza tengo!\n", + /* 38*/ "Iniciando contramedidas. Inician.....*** 。。ooOOoh!! *** 。。eeEEe!! *** 。。aaAhh!! *** 。。oOOoh!! *** 。。aAArRrgghh!! *** 。。YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "ソDr. Caroll? ソTiene el control de nuevo? ソPuede detener el programa?\n", + /* 40*/ "S, estoy de vuelta, cario. Pero el programa ha estado en marcha demasiado como para detenerlo completamente. Slo existe una manera de acabar con esto...\n", + /* 41*/ "ソQu quiere decir?\n", + /* 42*/ "Cuando el programa haya acabado, tendr el control de un arma devastadoramente poderosa. No puede permitirse mi existencia. As que debo destruir la nave Cetan y a m mismo con ella. Lo siento, Joanna... No hay otra manera, ni tiempo para discutirlo. Vete. Esquiva a los Skedar y tendr疽 tiempo para escapar. Ha sido un honor trabajar contigo. Adis, Joanna Dark.\n", + /* 43*/ "La mega-arma Cetan ha sido inutilizada.\n", + /* 44*/ "Municin desperdiciada - incapaz de desactivar la mega-arma.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/peteE.c b/src/files/lang/jap-final/peteE.c similarity index 100% rename from src/files/lang/peteE.c rename to src/files/lang/jap-final/peteE.c diff --git a/src/files/lang/jap-final/peteJ.c b/src/files/lang/jap-final/peteJ.c new file mode 100644 index 000000000..4095cb42c --- /dev/null +++ b/src/files/lang/jap-final/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\n斧ルd#dロヘマモ=奄о゚≧ムマメみけÅ∀か∝√⇔⊇≫ツ≧ネマモcgヤメ⌒氏サ⇔⊇≫メ♭≠曹秩メマモ┛Χ∵ョャÅツゆeメрщy∩≒メマ≡≫∀=劇メnvメiヮ∵ヌン掾ソ≒∩∃≪コヲト√⇔⊇≫メ♭≠゚ナ⊇q⊇∵ニァト√≫ツ\n\n|ヨヒマ縲マセ\n\nョ≠早メ縲d蛟マ∈ゃ⊃⇔⊇≫Å∽⊂タ巡d汲凵ソ≒メ∩≒リホ∵ぬ∝エ⇔⊇∃ツ√†=コメンメх∵マ⇒モÅツ⌒⊂巣ホ≠浴メiヮ¥ハ縺謔クヒ∈$縲dナ⇔⊇≫メÅ∵=テ√マモ∃≫チぞ♯∩∃⊇≡⊂マツ\n\n|しじ操セδカミム窶∈ぴψヌ≡\n\nぉメ┴てマけ∵ツ⇔ゆe∵えエ∨рщy∵<ツカミム窶メエ∨ミ゚ハロフリdワ∈閼獅クメmマ゙ナ⇔⊇≫ツ∧テマモぉ∵ヵぴメしじ∈メぼニ≫ヒ♭ョャ∃ュ⇔メ痰о∵ヨΧト√⇔⊇≫モÅツ\n\n|しじ逐セ≠ママなΖ┸∈ンハ綵n\nぉ∵テテマヰ≫ォナ掾マ÷ムマワ縲d縺マ≠マ∵ナ∨ツテメ≠マメヰ∨リ轣クΒ♭せど♭タ≫≡⊂マ≦翌求マなΖ┸∈ンハ縺ニ≫メÅツ\n\n|しじ凍セ桙麾d縺クせぜヌ≡\n\n普劇メ辟イマ∝√⇔⊇∃⊇クケ∵⊆≫ツテ√モぉ∵′∩≒桙氈ニ≫∀タマ⇒モÅツ″ハラト√∨♀ミマd繞」、∈宦瘁ヒツ<♭」ば♭タ≫≡⊂├ヮ∈ナ⇔∪チメÅツ」マ♭ひ≪マΨ♯∩√≫メ∈栫閨ノ⊥÷d窶ニマ∵ウ∝エ∨Β♭づ」ニ≫≡⊂マツ\n\n|しじ楳セ゚ラロd∈⊇てロqрレ\n\nが∩ト∝∫∈づテヌ†÷普劇メ∈iヮナ⇔⊇≫瘁焉諱ニ∬メリエ⇔チ≫Å∽⊂ツテ√∈⊂リチ窿ナ≡⊂ツ浴ナ⇔⊇≫゚ラロdメヤd縺逗ムハ縲£マ♂d゚マユ∈エ⇔メムワ∈ンハ縺ナ≠シチ♭」な∈づテトヌ≫メÅツ\n\n|しじ斧セ普劇ヨыヌ≡\n\n普劇メメぞチマ⊇≫iヮワ∵≠獅潤マρ≫モ℃d゚dメルマ縲d$轢∈るれナ⇔∪≪≦蜈諱マы♭タ≫リホ♭モ∃⊇ツ゚ラロd∈」なトヌ≫てロq∵Τ┯ニ√†iヮワ∂∧メメ┳eモρ≪マγ‡ぁナ⇔チ≫モÅツ∧メマ>ラ⊇∨リリマ∃エ⇔⊇≫♀ミ∩≒ыニ≫メÅツcgヤメヨご∈煤ス⇔モ∃≒∃⊇テ∀∈≠閨縺ホ⊇≡⊂マツ\n\nEND\n", + /* 1*/ "ロユ÷\n\n", + /* 2*/ "|ワ竄пbhセ\n\n斧ルd#dロヘマモ=奄о゚≧ムマメみけÅ∀か∝√⇔⊇≫ツ≧ネマモcgヤメ⌒氏サ⇔⊇≫メ♭≠曹秩メマモ┛Χ∵ョャÅツゆeメрщy∩≒メマ≡≫∀=劇メnvメiヮ∵ヌン掾ソ≒∩∃≪コヲト√⇔⊇≫メ♭≠゚ナ⊇q⊇∵ニァト√≫ツ\n\n|ヨヒマ縲マセ\n\nョ≠早メ縲d蛟マ∈ゃ⊃⇔⊇≫Å∽⊂タ巡d汲凵ソ≒メ∩≒リホ∵ぬ∝エ⇔⊇∃ツ√†=コメンメх∵マ⇒モÅツ⌒⊂巣ホ≠浴メiヮ¥ハ縺謔クヒ∈$縲dナ⇔⊇≫メÅ∵=テ√マモ∃≫チぞ♯∩∃⊇≡⊂マツ\n\n|しじ操セδカミム窶∈ぴψヌ≡\n\nぉメ┴てマけ∵ツ⇔ゆe∵えエ∨рщy∵<ツカミム窶メエ∨ミ゚ハロフリdワ∈閼獅クメmマ゙ナ⇔⊇≫ツ∧テマモぉ∵ヵぴメしじ∈メぼニ≫ヒ♭ョャ∃ュ⇔メ痰о∵ヨΧト√⇔⊇≫モÅツ\n\n|しじ逐セ桙麾d縺クせぜヌ≡\n\n普劇メ辟イマ∝√⇔⊇∃⊇クケ∵⊆≫ツテ√モぉ∵′∩≒桙氈ニ≫∀タマ⇒モÅツ″ハラト√∨♀ミマd繞」、∈宦瘁ヒツ<♭」ば♭タ≫≡⊂├ヮ∈ナ⇔∪チメÅツ」マ♭ひ≪マΨ♯∩√≫メ∈栫閨ノ⊥÷d窶ニマ∵ウ∝エ∨Β♭づ」ニ≫≡⊂マツ\n\n|しじ凍セ゚ラロd∈⊇てロqрレ\n\nが∩ト∝∫∈づテヌ†÷普劇メ∈iヮナ⇔⊇≫瘁焉諱ニ∬メリエ⇔チ≫Å∽⊂ツテ√∈⊂リチ窿ナ≡⊂ツ浴ナ⇔⊇≫゚ラロdメヤd縺逗ムハ縲£マ♂d゚マユ∈エ⇔メムワ∈ンハ縺ナ≠シチ♭」な∈づテトヌ≫メÅツ\n\n|しじ楳セ普劇ヨыヌ≡\n\n普劇メメぞチマ⊇≫iヮワ∵≠獅潤マρ≫モ℃d゚dメルマ縲d$轢∈るれナ⇔∪≪≦蜈諱マы♭タ≫リホ♭モ∃⊇ツ゚ラロd∈」なトヌ≫てロq∵Τ┯ニ√†iヮワ∂∧メメ┳eモρ≪マγ‡ぁナ⇔チ≫モÅツ∧メマ>ラ⊇∨リリマ∃エ⇔⊇≫♀ミ∩≒ыニ≫メÅツcgヤメヨご∈煤ス⇔モ∃≒∃⊇テ∀∈≠閨縺ホ⊇≡⊂マツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\n斧ルd#dロヘマモ=奄о゚≧ムマメみけÅ∀か∝√⇔⊇≫ツ≧ネマモcgヤメ⌒氏サ⇔⊇≫メ♭≠曹秩メマモ┛Χ∵ョャÅツゆeメрщy∩≒メマ≡≫∀=劇メnvメiヮ∵ヌン掾ソ≒∩∃≪コヲト√⇔⊇≫メ♭≠゚ナ⊇q⊇∵ニァト√≫ツ\n\n|ヨヒマ縲マセ\n\nョ≠早メ縲d蛟マ∈ゃ⊃⇔⊇≫Å∽⊂タ巡d汲凵ソ≒メ∩≒リホ∵ぬ∝エ⇔⊇∃ツ√†=コメンメх∵マ⇒モÅツ⌒⊂巣ホ≠浴メiヮ¥ハ縺謔クヒ∈$縲dナ⇔⊇≫メÅ∵=テ√マモ∃≫チぞ♯∩∃⊇≡⊂マツ\n\n|しじ操セδカミム窶∈ぴψヌ≡\n\nぉメ┴てマけ∵ツ⇔ゆe∵えエ∨рщy∵<ツカミム窶メエ∨ミ゚ハロフリdワ∈閼獅クメmマ゙ナ⇔⊇≫ツ∧テマモぉ∵ヵぴメしじ∈メぼニ≫ヒ♭ョャ∃ュ⇔メ痰о∵ヨΧト√⇔⊇≫モÅツ\n\n|しじ逐セ゚ラロd∈⊇てロqрレ\n\nが∩ト∝∫∈づテヌ†÷普劇メ∈iヮナ⇔⊇≫瘁焉諱ニ∬メリエ⇔チ≫Å∽⊂ツテ√∈⊂リチ窿ナ≡⊂ツ浴ナ⇔⊇≫゚ラロdメヤd縺逗ムハ縲£マ♂d゚マユ∈エ⇔メムワ∈ンハ縺ナ≠シチ♭」な∈づテトヌ≫メÅツ\n\n|しじ凍セ普劇ヨыヌ≡\n\n普劇メメぞチマ⊇≫iヮワ∵≠獅潤マρ≫モ℃d゚dメルマ縲d$轢∈るれナ⇔∪≪≦蜈諱マы♭タ≫リホ♭モ∃⊇ツ゚ラロd∈」なトヌ≫てロq∵Τ┯ニ√†iヮワ∂∧メメ┳eモρ≪マγ‡ぁナ⇔チ≫モÅツ∧メマ>ラ⊇∨リリマ∃エ⇔⊇≫♀ミ∩≒ыニ≫メÅツcgヤメヨご∈煤ス⇔モ∃≒∃⊇テ∀∈≠閨縺ホ⊇≡⊂マツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "δカミム窶∈ぴψヌ≡\n", + /* 10*/ "≠ママなΖ┸∈ンハ綵n", + /* 11*/ "桙麾d縺クせぜヌ≡\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "゚ラロd∈⊇てロqрレ\n", + /* 14*/ "普劇ヨыヌ≡\n", + /* 15*/ "d繞」、∵ナチンハ縺ト√∨\n", + /* 16*/ "d繞」、∵ナチンハ縺ト√⇔⊇リヌ∋\n", + /* 17*/ "よマメムワモンハ縺ト√⇔⊇リニ\n", + /* 18*/ "゚ラロd∩≒黹∃ナ潤奄о゚マユ∵ョャ\n", + /* 19*/ "゚ラロdメヤd縺逗ムハ綵n£マミランワm蚕n", + /* 20*/ "メムワメンハ繧\n", + /* 21*/ "゚ラロdメヤd縺逗ムハ綵n£メノハ\n", + /* 22*/ "゚ラロdヨメル轢ラロヘマ∵麻ョト√∨\n", + /* 23*/ "なΖ┸∵ナチンハ縺ト√∨\n", + /* 24*/ "なΖ┸∵ナチンハ縺ト√⇔⊇リヌ∋\n", + /* 25*/ "しじメぼマあぃモ∃ぢΣ∵ばぱト√∨\n", + /* 26*/ "しじん\n", + /* 27*/ "しじ\n", + /* 28*/ "♂d゚≧ムマメ≠マ∵ぁなナ∨\n", + /* 29*/ "しじん巡メ┳∵ほト√∨\n", + /* 30*/ "Ψ∈⇒ツ∽エ盾焉クぷエ⇔⊇≫エ\n", + /* 31*/ "°ハ=朽リ閨諢ヌナマ∃エ⇔⊇≫エ\n", + /* 32*/ "ムなに純┬∈え≪リニ\n", + /* 33*/ "モ℃d゚d∵ハラト√∨\n", + /* 34*/ "∪⊇≠ェ∈∂エ⇔⊇≫∋Åタ\n", + /* 35*/ "ヴ∈テ∝∵≒∃⊇∃\n", + /* 36*/ "なΖ┸∵なにト√⇔ナリエ∨\n", + /* 37*/ "テ∋マ¬モ\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "d繞」、\n", + /* 41*/ "d繞」、\n", + /* 42*/ "d繞」、∈みマ√∨\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "なΖ┸\n", + /* 46*/ "なΖ┸\n", + /* 47*/ "なΖ┸∈みマ√∨\n", + /* 48*/ "モ℃d゚dメ♀ミ∵ラタリヌ∋\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "♂d゚マユ\n", + /* 52*/ "♂d゚マユ\n", + /* 53*/ "♂d゚マユ∈みマ√∨\n", + /* 54*/ "ト∝∫∈づテナ∨スてロq\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "ナルマ箪n", + /* 58*/ "d繞」、\n", + /* 59*/ "d繞」、∈みマ√∨\n", + /* 60*/ "閼獅クマδカミム窶∈゙ナ⇔∪⊇∨ツ\n", + /* 61*/ "d繞」、∈⊃†=エ¬メ♀ミ⌒\n桙气マ⊃∧⊂Å∝ツ\n", + /* 62*/ "゚ラロdマメムワ∈ンハ縺ナ\nヤd縺逗ムハ縲£∈ノハニ≫∋Åツ\n", + /* 63*/ "テメ$dヨマメモ℃d゚d∵\n普劇ヨメ窒メメÅツ\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "メムぶマ∈せぜナ∨\n", + /* 67*/ "なΖ┸∵なにト√⇔ナリエ∨\n", + /* 68*/ "斧ルd#dロヘマメр求モ\n♂d゚≧ムマ刀ネメ⌒メ∃メÅツ\np氏メうテマ栫謔氣潤ナ\nが∵翼ム∃メ∩∈ナ≫ョャ∵⊆≫ツ\npぉ∵桙氈ニ≫テ∽マモ\nヴメマ♀∵ニ≫Å∽⊂ツ\n", + /* 69*/ "ムイ=準ワ∵⊇⇒⌒か⊂\nマ♀エ⇔栫ホメタ\n", + /* 70*/ "ヵモリÅ≧Å=ヘミマ艢ツ\nρΖ∈ウ⊃≫ツハ♀ハラツ\n", + /* 71*/ "騾ム騾ム=コ≪∵∀蚕n", + /* 72*/ "d繞」、∵≧マ∝√⇔ナリエ∨\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/peteP.c b/src/files/lang/jap-final/peteP.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/jap-final/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_f.c b/src/files/lang/jap-final/pete_str_f.c new file mode 100644 index 000000000..b4a3498b4 --- /dev/null +++ b/src/files/lang/jap-final/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2: - Placer un Pisteur sur la limousine\n\nLa limousine est arriv馥 dans la rue principale peu apr鑚 vous. Toutes les tentatives pour la pister ont 馗hou馥s, il va falloir faire 軋 l'ancienne. Placez le Pisteur sur la limousine. Nous pourrons alors savoir d'o elle vient.\n\n|Objectif 3: - Pr駱arer voie de sortie\n\nIl y a une issue de secours d駸affect馥 l'arri鑽e de l'immeuble du G5 qui vous servira vous enfuir. Pr駱arer le chemin en pla軋nt des explosifs la porte. Pour 騅iter de donner l'alarme, vous devrez d馗lencher la mine une fois le meeting termin.\n\n|Objectif 4: - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 5: - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 1*/ "LES RUES DE CHICAGO\n", + /* 2*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2 - Pr駱arer voie de sortie\n\nIl y a une issue de secours d駸affect馥 l'arri鑽e de l'immeuble du G5 qui vous servira vous enfuir. Pr駱arer le chemin en pla軋nt des explosifs la porte. Pour 騅iter de donner l'alarme, vous devrez d馗lencher la mine une fois le meeting termin.\n\n|Objectif 3 - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 4 - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2: - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 3: - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "R馗up駻er 駲uipement point de largage\n", + /* 10*/ "Placer Pisteur sur limousine\n", + /* 11*/ "Pr駱arer voie de sortie\n", + /* 12*/ "Acqu駻ir cible de diversion\n", + /* 13*/ "Cr馥r diversion\n", + /* 14*/ "Entrer dans l'immeuble du G5\n", + /* 15*/ "Mine bien positionn馥.\n", + /* 16*/ "Mine mal positionn馥.\n", + /* 17*/ "Virus t駘馗harg dans le NavComp.\n", + /* 18*/ "Taxi incontrlable - reprogrammation n馗essaire.\n", + /* 19*/ "Acc鑚 au syst鑪e de navigation du taxi.\n", + /* 20*/ "Virus t駘馗harg.\n", + /* 21*/ "Syst鑪e de navigation taxi reprogramm.\n", + /* 22*/ "Connexion au taxi perdu.\n", + /* 23*/ "Pisteur bien positionn.\n", + /* 24*/ "Pisteur mal positionn.\n", + /* 25*/ "V馼icule crucial d騁ruit.\n", + /* 26*/ "MISSION ECHOUEE\n", + /* 27*/ "MISSION ACCOMPLIE\n", + /* 28*/ "Limousine DataDyne perdue.\n", + /* 29*/ "Mission 馗hou馥 - trop de pertes civiles.\n", + /* 30*/ "Attention - elle a une arme!\n", + /* 31*/ "Y'a une maniaque dans les rues!\n", + /* 32*/ "Alerte Intrus - Envoyez des renforts.\n", + /* 33*/ "Acc鑚 ascenseur scell.\n", + /* 34*/ "H - Qu'est-ce que vous faites l?\n", + /* 35*/ "Pfff. M麥e pas peur!\n", + /* 36*/ "Pisteur remarqu.\n", + /* 37*/ "Salutations, citoyen.\n", + /* 38*/ "Obtenir Mine t駘馗om.\n", + /* 39*/ "Dr. Caroll: \n", + /* 40*/ "Mine t駘馗om\n", + /* 41*/ "Une mine t駘馗om.\n", + /* 42*/ "Mine t駘馗om. obtenue.\n", + /* 43*/ "Obtenir pisteur.\n", + /* 44*/ "Dr Caroll: \n", + /* 45*/ "Pisteur\n", + /* 46*/ "Un pisteur\n", + /* 47*/ "Pisteur obtenu.\n", + /* 48*/ "Les portes ascenseur ne peuvent plus 黎re ouvertes.\n", + /* 49*/ "Obtenir Reprogrammeur.\n", + /* 50*/ "Dr. Caroll: \n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un reprogrammeur\n", + /* 53*/ "Reprogrammeur obtenu.\n", + /* 54*/ "Diversion cr鳬e.\n", + /* 55*/ "Obtenir mine t駘馗om.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Une mine t駘馗om.\n", + /* 59*/ "Mine t駘馗om.\n", + /* 60*/ "Nous avons cach l'駲uipement \ndans une bouche d'馮out.\n", + /* 61*/ "N'importe laquelle de ces portes bloqu馥 \npeut servir de sortie.\n", + /* 62*/ "Reprogrammez ce taxi, c'est un type 2. \nIl devrait 黎re compatible.\n", + /* 63*/ "Cet ascenseur voiture est votre \nseul point d'entr馥.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Une autre diversion a 騁 cr鳬e!\n", + /* 67*/ "Pisteur 騁 d馗ouvert.\n", + /* 68*/ "Nous pensons que le G5 n'est qu'une \ncouverture de la dataDyne et qu'il est \nimpliqu dans ce complot. Je sais que \nCassandra de Vries sera pr駸ente, mais j'ai besoin \nde savoir qui d'autre sera l et de quoi ils \nvont parler. Le temps que vous 騅acuiez, \nles renforts d饕arqueront.\n", + /* 69*/ "Une cavalerie va venir me sauver... \nA qui avez-vous fait appel?\n", + /* 70*/ "Je ne peux rien dire pour l'instant. \nSilence radio! Bonne chance, Joanna!\n", + /* 71*/ "Merci, chef.\n", + /* 72*/ "Mine t駘馗om. g稍h馥.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_g.c b/src/files/lang/jap-final/pete_str_g.c new file mode 100644 index 000000000..9ec3eabc8 --- /dev/null +++ b/src/files/lang/jap-final/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Befestigen Sie das Peilger舩 an der Limousine!\n\nDie Limousine, die auf der Hauptstra゚e steht, ist kurz vor Ihnen eingetroffen. Alle Versuche, ein Peilger舩 anzubringen, sind fehlgeschlagen. Daher muss die Sache wohl auf die altmodische Weise geregelt werden. Platzieren Sie ein Peilger舩 am Wagen, damit wir ihren Weg verfolgen knnen.\n\n|3. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rckseite des G5-Buildings ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als 舫゚erst ntzlich erweisen. In weiterer Folge mssen Sie einen blockierten Durchgang frei sprengen. Sie drfen die Minen allerdings erst znden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|4. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|5. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 1*/ "STRASSEN VON CHICAGO\n", + /* 2*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rckseite des G5-Building ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als 舫゚erst ntzlich erweisen. In weiterer Folge mssen Sie einen blockierten Durchgang frei sprengen. Sie drfen die Minen allerdings erst znden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|3. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|4. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|3. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie die Ausrstung!\n", + /* 10*/ "Befestigen Sie das Peilger舩 am Wagen!\n", + /* 11*/ "Bereiten Sie Ihren Fluchtweg vor!\n", + /* 12*/ "W臧len Sie ein Objekt fr das Ablenkungsmanver!\n", + /* 13*/ "Sorgen Sie fr ein Ablenkungsmanver!\n", + /* 14*/ "Betreten Sie das G5-Building!\n", + /* 15*/ "Mine wurde korrekt platziert.\n", + /* 16*/ "Mine wurde nicht korrekt platziert.\n", + /* 17*/ "Virus wurde bereits installiert.\n", + /* 18*/ "Hover-Cab reagiert nicht - Reprogrammierung erforderlich\n", + /* 19*/ "Zugriff auf das Navigationssystem erfolgt\n", + /* 20*/ "Virus wurde erfolgreich installiert.\n", + /* 21*/ "Navigationssystem wurde reprogrammiert.\n", + /* 22*/ "Verbindung zum Hover-Cab wurde unterbrochen.\n", + /* 23*/ "Peilsender wurde korrekt platziert.\n", + /* 24*/ "Peilsender wurde nicht korrekt platziert.\n", + /* 25*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 26*/ "MISSION FEHLGESCHLAGEN\n", + /* 27*/ "MISSION ERFOLGREICH\n", + /* 28*/ "Die dataDyne-Limousine befindet sich au゚er Reichweite.\n", + /* 29*/ "Mission fehlgeschlagen - Unakzeptable zivile Verluste\n", + /* 30*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 31*/ "Da l舫ft wohl ein Spinner frei herum!\n", + /* 32*/ "Eindringling geortet - Verst舐kung ist unterwegs.\n", + /* 33*/ "Zugriff zum Aufzug ist versiegelt.\n", + /* 34*/ "Hey - Was machen Sie da?\n", + /* 35*/ "Sie machen mir keine Angst.\n", + /* 36*/ "Peilsender wurde gefunden.\n", + /* 37*/ "Sei mir gegr゚t, Brger.\n", + /* 38*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 39*/ "Dr. Carolls\n", + /* 40*/ "Fernznder-Mine\n", + /* 41*/ "Eine Fernznder-Mine\n", + /* 42*/ "Fernznder-Mine aufgenommen\n", + /* 43*/ "Erlangen Sie den Peilsender.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Peilsender\n", + /* 46*/ "Ein Peilsender\n", + /* 47*/ "Peilsender aufgenommen\n", + /* 48*/ "Aufzugstr kann nicht wieder geffnet werden.\n", + /* 49*/ "Erlangen Sie den Programm-Overrider.\n", + /* 50*/ "Dr. Carolls\n", + /* 51*/ "Programm-Overrider\n", + /* 52*/ "Ein Programm-Overrider\n", + /* 53*/ "Programm-Overrider aufgenommen\n", + /* 54*/ "Ablenkungsmanver erfolgreich\n", + /* 55*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Eine Fernznder-Mine\n", + /* 59*/ "Fernznder-Mine aufgenommen\n", + /* 60*/ "Der einzige Ort, an dem wir die Ausrstung sicher unterbringen \nkonnten, ist ein Kanal.\n", + /* 61*/ "Jede dieser blockierten Tren eignet \nsich als Fluchtweg.\n", + /* 62*/ "Reprogrammieren Sie das Taxi! Der Wagen ist vom Typ Mark 2 \nund sollte kompatibel sein.\n", + /* 63*/ "Der einzige Zutritt fr Sie ist der \nAufzug am Parkdeck.\n", + /* 64*/ "EEPROM-Flag wurde gesetzt.\n", + /* 65*/ "EEPROM-Flag wurde gelscht.\n", + /* 66*/ "Es wurde ein alternatives Ablenkungsmanver durchgefhrt!\n", + /* 67*/ "Peilsender wurde entdeckt.\n", + /* 68*/ "Wir vermuten, dass die G5 Corporation nur \nals Tarnung fr dataDyne fungiert. Ich wei゚, \ndass Cassandra de Vries anwesend sein wird. \nAber ich muss wissen, wer au゚erdem an dem \nTreffen teilnimmt und worber gesprochen wird. \nWenn Sie das Geb舫de verlassen, sollte die Hilfe, \ndie ich angefordert habe, eingetroffen sein.\n", + /* 69*/ "Wer ist diese 'Hilfe', auf die Sie sich \nbeziehen?\n", + /* 70*/ "Nicht jetzt, Joanna. Ab jetzt herrscht absolute \nFunkstille. Viel Glck!\n", + /* 71*/ "Hm, herzlichen Dank.\n", + /* 72*/ "Fernznder-Mine wurde verschwendet.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_i.c b/src/files/lang/jap-final/pete_str_i.c new file mode 100644 index 000000000..2e671c664 --- /dev/null +++ b/src/files/lang/jap-final/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Attacca una microspia alla limousine\n\nLa limousine sulla strada principale arrivata poco prima di te. Tutti i tentativi di ricostruirne il percorso sono falliti, quindi bisogner agire nel modo tradizionale. Attacca una microspia alla limousine per poter scoprirne la provenienza.\n\n|Obiettivo 3: - Prepara la via di fuga\n\nDietro all'Edificio G5 c' un'uscita antincendio abbandonata che ti sar sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 4: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 5: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 1*/ "STRADE DI CHICAGO\n", + /* 2*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Prepara la via di fuga\n\nDietro all'Edificio G5 c' un'uscita antincendio abbandonata che ti sar sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 3: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 4: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 3: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Va a prendere l'attrezzatura\n", + /* 10*/ "Attacca una microspia alla limousine\n", + /* 11*/ "Prepara la via di fuga\n", + /* 12*/ "Identifica obiettivo di distrazione\n", + /* 13*/ "Distrai le forze di sicurezza\n", + /* 14*/ "Entra nell'Edificio G5\n", + /* 15*/ "Mina piazzata correttamente\n", + /* 16*/ "Mina in posizione errata\n", + /* 17*/ "Virus gi scaricato nel computer.\n", + /* 18*/ "Computer non risponde: serve riprogrammatore.\n", + /* 19*/ "Accesso al sistema di navigazione.\n", + /* 20*/ "Virus scaricato correttamente.\n", + /* 21*/ "Computer di navigazione riprogrammato.\n", + /* 22*/ "Interrotto collegamento al computer.\n", + /* 23*/ "Microspia piazzata correttamente.\n", + /* 24*/ "Microspia in posizione errata.\n", + /* 25*/ "Distrutto veicolo essenziale alla missione.\n", + /* 26*/ "MISSIONE FALLITA\n", + /* 27*/ "MISSIONE COMPIUTA\n", + /* 28*/ "La limousine dataDyne riuscita a scappare.\n", + /* 29*/ "Missione fallita - Vittime civili inaccettabili.\n", + /* 30*/ "Attenzione! Ha una pistola!\n", + /* 31*/ "ネ pazza! ネ pazza! Rinchiudetela!!!\n", + /* 32*/ "Allarme intrusione - Mandate rinforzi!\n", + /* 33*/ "Bloccato l'accesso all'ascensore.\n", + /* 34*/ "Ehi, cosa stai facendo?\n", + /* 35*/ "Non mi fai paura!\n", + /* 36*/ "La microspia stata scoperta.\n", + /* 37*/ "Saluti!!!\n", + /* 38*/ "Procurati mina a distanza.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina distanza\n", + /* 42*/ "Presa mina a distanza.\n", + /* 43*/ "Procurati microspia.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "Microspia\n", + /* 46*/ "Microspia\n", + /* 47*/ "Presa microspia.\n", + /* 48*/ "Impossibile riaprire porta ascensore.\n", + /* 49*/ "Procurati riprogrammatore.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Riprogramm.\n", + /* 52*/ "Riprogramm.\n", + /* 53*/ "Preso riprogrammatore.\n", + /* 54*/ "Creata la distrazione.\n", + /* 55*/ "Procurati mina a distanza.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Mina distanza\n", + /* 59*/ "Presa mina a distanza.\n", + /* 60*/ "L'unico posto in cui stato possibile \nnascondere gli strumenti era il canale.\n", + /* 61*/ "Una di quelle porte bloccate pu \nessere un'ottima via di fuga.\n", + /* 62*/ "Riprogramma quel taxi: un Mark 2, \ndovrebbe essere compatibile!\n", + /* 63*/ "Quell'ascensore nel parcheggio \n l'unica entrata possibile!\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Creata distrazione alternativa!\n", + /* 67*/ "La microspia stata scoperta.\n", + /* 68*/ "Sospettiamo che la G5 Corporation sia \nsolo una copertura per la dataDyne e per \nchiunque altro sia coinvolto in questo \ncomplotto. So per certo che sar presente \nCassandra de Vries, ma devo anche scoprire \nchi altro ci sar e di che cosa si parler. \nAl momento che uscirai i rinforzi che ho \nrichiesto saranno gi arrivati.\n", + /* 69*/ "Solo una cosa, chi sono questi \n'rinforzi'?\n", + /* 70*/ "Non adesso, Joanna. ネ ora del silenzio \nradio. In bocca al lupo!\n", + /* 71*/ "Grazie tante!!!\n", + /* 72*/ "Sprecata mina a distanza.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_s.c b/src/files/lang/jap-final/pete_str_s.c new file mode 100644 index 000000000..451c3591f --- /dev/null +++ b/src/files/lang/jap-final/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Colocar el Rastreador en la Limusina\n\nLa limusina de la calle principal lleg poco antes que t. Todos los intentos de rastrearla han sido intiles, as que tendremos que hacerlo a la vieja usanza. Coloca un 'bicho' en la limusina para que as podamos rastrear adnde se dirige.\n\n|Objetivo Tres: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detr疽 del Edificio G5 que nos puede ser til para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Cuatro: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cinco: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 1*/ "CALLES DE CHICAGO\n", + /* 2*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detr疽 del Edificio G5 que nos puede ser til para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Tres: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cuatro: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Tres: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Recuperar el equipo\n", + /* 10*/ "Colocar el rastreador en la limusina\n", + /* 11*/ "Preparar la ruta de escape\n", + /* 12*/ "Adquirir blancos de distraccin\n", + /* 13*/ "Crear distraccin mvil\n", + /* 14*/ "Entrar en el edificio G5\n", + /* 15*/ "Mina colocada correctamente.\n", + /* 16*/ "Mina colocada incorrectamente.\n", + /* 17*/ "Virus ya implantado en el Navegador.\n", + /* 18*/ "El aerotaxi no responde: requiere Reprogramacin.\n", + /* 19*/ "Accediendo al sistema de navegacin del aerotaxi.\n", + /* 20*/ "Virus descargado satisfactoriamente.\n", + /* 21*/ "Sistema de navegacin del taxi reprogramado.\n", + /* 22*/ "Conexin con el aerotaxi perdida.\n", + /* 23*/ "'Bicho' Rastreador colocado correctamente.\n", + /* 24*/ "'Bicho' Rastreador colocado incorrectamente.\n", + /* 25*/ "Vehculo crtico de la misin destruido.\n", + /* 26*/ "MISIモN FALLADA\n", + /* 27*/ "MISIモN CONSEGUIDA\n", + /* 28*/ "La limusina de dataDyne ha escapado.\n", + /* 29*/ "Misin fallada: bajas civiles inaceptables.\n", + /* 30*/ "Cuidado. 。Tiene un arma!\n", + /* 31*/ "。Hay un manaco suelto!\n", + /* 32*/ "Alerta de Intruso: refuerzos enviados.\n", + /* 33*/ "Acceso del ascensor sellado.\n", + /* 34*/ "。Hey! ソQu haces?\n", + /* 35*/ "No me asustas.\n", + /* 36*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 37*/ "Bienvenido, ciudadano.\n", + /* 38*/ "Obt駭 la Mina Remota.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Una Mina Remota\n", + /* 42*/ "Mina Remota obtenida.\n", + /* 43*/ "Obt駭 el 'Bicho' Rastreador.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "'Bicho' R.\n", + /* 46*/ "Un 'Bicho' Rastreador\n", + /* 47*/ "'Bicho' Rastreador obtenido.\n", + /* 48*/ "La puerta del ascensor no puede reabrirse.\n", + /* 49*/ "Obt駭 el Reprogramador.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un Reprogramador\n", + /* 53*/ "Reprogramador obtenido.\n", + /* 54*/ "Distraccin en marcha.\n", + /* 55*/ "Obt駭 la Mina Remota.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Una Mina Remota\n", + /* 59*/ "Mina Remota obtenida.\n", + /* 60*/ "El nico lugar donde pudimos asegurar \nel equipo fue en un desage.\n", + /* 61*/ "Cada una de esas puertas bloqueadas \npuede ser una ruta de escape.\n", + /* 62*/ "Reprograma ese taxi: es un Mark 2 \ny debe ser compatible.\n", + /* 63*/ "Ese elevador de coches es el \nnico punto de acceso.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "。Una distraccin alternativa ha sido creada!\n", + /* 67*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 68*/ "Sospechamos que la Corporacin G5 es slo una \ntapadera de dataDyne y que est tambi駭 \nenvuelta en este complot. S que Cassandra \nDe Vries va a estar aqu, pero necesito \nsaber qui駭 m疽 va a venir y sobre qu \nvan a discutir. Una vez salgas, la ayuda \nque solicit estar esperando.\n", + /* 69*/ "ソPero a qu ayuda te est疽 \nrefiriendo?\n", + /* 70*/ "Ahora no, Joanna. Mant駭 la radio en silencio. \n。Buena suerte!\n", + /* 71*/ "Muchas gracias.\n", + /* 72*/ "La Mina Remota ha sido desperdiciada.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobjE.c b/src/files/lang/jap-final/propobjE.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/jap-final/propobjE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobjJ.c b/src/files/lang/jap-final/propobjJ.c new file mode 100644 index 000000000..e9d4191f5 --- /dev/null +++ b/src/files/lang/jap-final/propobjJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s∈みマ√∨\n", + /* 1*/ "%s∈みマ√∨\n", + /* 2*/ "%s∈みマ√∨\n", + /* 3*/ "%s∈みマ√∨\n", + /* 4*/ "%s∈みマ√∨\n", + /* 5*/ "%s∈みマ√∨\n", + /* 6*/ "%s∈みマ√∨\n", + /* 7*/ "%s∈みマ√∨\n", + /* 8*/ "≧″", + /* 9*/ "喝、", + /* 10*/ "ユd縲ハ≠", + /* 11*/ "艢もメ、", + /* 12*/ "ワ凵メ、", + /* 13*/ "み≪カ⊂、", + /* 14*/ "マ烙ヒメ、", + /* 15*/ "リハ繞、", + /* 16*/ "dマリハ", + /* 17*/ "d繞」、", + /* 18*/ "ンマレd」、", + /* 19*/ "ン」、", + /* 20*/ "ルマ°ハ縲艢ム", + /* 21*/ "ルマ°ハ縲艢ム", + /* 22*/ "≧d", + /* 23*/ "ァ¥", + /* 24*/ "究ゥ", + /* 25*/ "%マ」、", + /* 26*/ "ユ°マ」、", + /* 27*/ "ミd", + /* 28*/ "¢縲マ", + /* 29*/ "≧ム艢ム", + /* 30*/ "ワ窶ニハラ", + /* 31*/ "ワ窶ニハラ", + /* 32*/ "なΖ┸", + /* 33*/ "ムラユ", + /* 34*/ "÷d♂マミムヨd", + /* 35*/ "ハ", + /* 36*/ "£ワ烙ハラ」、", + /* 37*/ "ヨd∈みマ√∨\n", + /* 38*/ "ロd♀∈みマ√∨\n", + /* 39*/ "ロd♀\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "テメ♀ミモハラト√⇔⊇リニ\n", + /* 42*/ "", + /* 43*/ "ヤd″", + /* 44*/ "d$dメ、", + /* 45*/ "ワ$ムラdラ", + /* 46*/ "″dワ縺操", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "", + /* 66*/ "ヤd″", + /* 67*/ "d$dメ、", + /* 68*/ "ワ$ムラdラ", + /* 69*/ "″dワ縺操", + /* 70*/ "喝、", + /* 71*/ "ユd縲ハ≠", + /* 72*/ "艢もメ、", + /* 73*/ "ワ凵メ、", + /* 74*/ "み≪カ⊂、", + /* 75*/ "マ烙ヒメ、", + /* 76*/ "リハ繞、", + /* 77*/ "dマリハ", + /* 78*/ "d繞」、", + /* 79*/ "ンマレd」、", + /* 80*/ "ン」、", + /* 81*/ "≧d", + /* 82*/ "ァ¥", + /* 83*/ "究ゥ", + /* 84*/ "ハ", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobjP.c b/src/files/lang/jap-final/propobjP.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/jap-final/propobjP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_f.c b/src/files/lang/jap-final/propobj_str_f.c new file mode 100644 index 000000000..504f77ac0 --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtenu.\n", + /* 1*/ "%s obtenue.\n", + /* 2*/ "", + /* 3*/ "", + /* 4*/ "%s obtenus.\n", + /* 5*/ "%s obtenues.\n", + /* 6*/ "", + /* 7*/ "", + /* 8*/ "Double ", + /* 9*/ "Munitions", + /* 10*/ "Cartouche", + /* 11*/ "Balle Magnum", + /* 12*/ "balle en or", + /* 13*/ "Grenade", + /* 14*/ "Munit. grenade", + /* 15*/ "Roquette", + /* 16*/ "Roquette t黎e cher.", + /* 17*/ "Mine t駘馗om.", + /* 18*/ "Mine prox.", + /* 19*/ "Mine retard.", + /* 20*/ "Couteau combat", + /* 21*/ "Couteaux combat", + /* 22*/ "Fl馗hette", + /* 23*/ "Bombe-N", + /* 24*/ "S馘atif", + /* 25*/ "stylo explosif", + /* 26*/ "malle explosive", + /* 27*/ "fus馥", + /* 28*/ "piton", + /* 29*/ "de dynamite", + /* 30*/ "b穰on ", + /* 31*/ "b穰ons ", + /* 32*/ "mouchard", + /* 33*/ "micro camera", + /* 34*/ "Cl GoldenEye", + /* 35*/ "jeton", + /* 36*/ "plastique", + /* 37*/ "Cl obtenue.\n", + /* 38*/ "Bouclier obtenu.\n", + /* 39*/ "Un bouclier.\n", + /* 40*/ "El駑ent obtenu.\n", + /* 41*/ "Cette porte est ferm馥.\n", + /* 42*/ "Carreau", + /* 43*/ "Orbe", + /* 44*/ "Munit. Reaper", + /* 45*/ "Occulteur", + /* 46*/ "Pilule boost", + /* 47*/ "votre ", + /* 48*/ "Votre ", + /* 49*/ "des ", + /* 50*/ "Des ", + /* 51*/ "des ", + /* 52*/ "Des ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "une ", + /* 60*/ "Une ", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Carreaux", + /* 66*/ "Orbes", + /* 67*/ "Munit. Reaper", + /* 68*/ "Occulteurs", + /* 69*/ "Pilules boost", + /* 70*/ "Munitions", + /* 71*/ "Cartouches", + /* 72*/ "Balles Magnum", + /* 73*/ "Balles en or", + /* 74*/ "Grenades", + /* 75*/ "Munit. grenades", + /* 76*/ "Roquettes", + /* 77*/ "Roquettes t黎e cher.", + /* 78*/ "Mines t駘馗om.", + /* 79*/ "Mines prox.", + /* 80*/ "Mines retard.", + /* 81*/ "Fl馗hettes", + /* 82*/ "Bombes-N", + /* 83*/ "S馘atifs", + /* 84*/ "jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_g.c b/src/files/lang/jap-final/propobj_str_g.c new file mode 100644 index 000000000..bce046735 --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s aufgenommen\n", + /* 1*/ "%s aufgenommen\n", + /* 2*/ "%s aufgenommen\n", + /* 3*/ "%s aufgenommen\n", + /* 4*/ "%s aufgenommen\n", + /* 5*/ "%s aufgenommen\n", + /* 6*/ "%s aufgenommen\n", + /* 7*/ "%s aufgenommen\n", + /* 8*/ "Doppel ", + /* 9*/ "Munition", + /* 10*/ "Magazin", + /* 11*/ "Magnum-Kugel", + /* 12*/ "goldene Kugel", + /* 13*/ "Granate", + /* 14*/ "Granatwerfer-Munition", + /* 15*/ "Rakete", + /* 16*/ "Zielsuch-Rakete", + /* 17*/ "Fernznder-Mine", + /* 18*/ "Ann臧erungs-Mine", + /* 19*/ "Zeitznder-Mine", + /* 20*/ "Kampfmesser", + /* 21*/ "Kampfmesser", + /* 22*/ "Pfeil", + /* 23*/ "N-Bombe", + /* 24*/ "Bet舫bungsgeschoss", + /* 25*/ "Explosiver Kugelschreiber", + /* 26*/ "Explosiver Koffer", + /* 27*/ "Leuchtkugel", + /* 28*/ "Felshaken", + /* 29*/ "Dynamit-", + /* 30*/ "Stab ", + /* 31*/ "St臙e ", + /* 32*/ "Peilsender", + /* 33*/ "Mikro-Kamera", + /* 34*/ "GoldenEye-Schlssel", + /* 35*/ "Symbol", + /* 36*/ "Plastik", + /* 37*/ "Schlssel aufgenommen\n", + /* 38*/ "Schild aufgenommen\n", + /* 39*/ "Ein Schild\n", + /* 40*/ "Etwas wurde aufgenommen.\n", + /* 41*/ "Diese Tr ist verschlossen.\n", + /* 42*/ "Bolzen", + /* 43*/ "Kraftzelle", + /* 44*/ "Reaper-Munition", + /* 45*/ "Tarnkappe", + /* 46*/ "St舐kungs-Pille", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Bolzen", + /* 66*/ "Kraftzellen", + /* 67*/ "Reaper-Munition", + /* 68*/ "Tarnkappen", + /* 69*/ "St舐kungs-Pillen", + /* 70*/ "Munition", + /* 71*/ "Magazin", + /* 72*/ "Magnum-Kugeln", + /* 73*/ "Goldkugeln", + /* 74*/ "Granaten", + /* 75*/ "Granatwerfer-Munition", + /* 76*/ "Raketen", + /* 77*/ "Zielsuch-Raketen", + /* 78*/ "Fernznder-Minen", + /* 79*/ "Ann臧erungs-Minen", + /* 80*/ "Zeitznder-Minen", + /* 81*/ "Pfeile", + /* 82*/ "N-Bomben", + /* 83*/ "Bet舫bungsgeschosse", + /* 84*/ "Jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_i.c b/src/files/lang/jap-final/propobj_str_i.c new file mode 100644 index 000000000..91b90bb2b --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Preso %s\n", + /* 1*/ "Presa %s\n", + /* 2*/ "Presa %s\n", + /* 3*/ "Preso %s\n", + /* 4*/ "Presi %s\n", + /* 5*/ "Prese %s\n", + /* 6*/ "Prese %s\n", + /* 7*/ "Prese %s\n", + /* 8*/ "Doppio ", + /* 9*/ "munizioni", + /* 10*/ "cartuccia", + /* 11*/ "pallottola magnum", + /* 12*/ "pallottola d'oro", + /* 13*/ "granata", + /* 14*/ "granata a giro", + /* 15*/ "missile", + /* 16*/ "missile di ritorno", + /* 17*/ "mina a distanza", + /* 18*/ "mina di prossimit", + /* 19*/ "mina a tempo", + /* 20*/ "pugnale da lotta", + /* 21*/ "pugnali da lotta", + /* 22*/ "freccia", + /* 23*/ "bomba-n", + /* 24*/ "sedativi", + /* 25*/ "penna esplosiva", + /* 26*/ "cassa esplosiva", + /* 27*/ "fiamma", + /* 28*/ "chiodo", + /* 29*/ "di dinamite", + /* 30*/ "carica ", + /* 31*/ "cariche ", + /* 32*/ "cimice", + /* 33*/ "microcamera", + /* 34*/ "chiave GoldenEye", + /* 35*/ "buono", + /* 36*/ "plastica", + /* 37*/ "Presa chiave.\n", + /* 38*/ "Preso scudo.\n", + /* 39*/ "uno scudo.\n", + /* 40*/ "Preso qualcosa.\n", + /* 41*/ "La porta chiusa.\n", + /* 42*/ "dardo", + /* 43*/ "globo", + /* 44*/ "munizioni Falciatore", + /* 45*/ "Dispositivo mimetico", + /* 46*/ "Pillola booster", + /* 47*/ "la ", + /* 48*/ "La ", + /* 49*/ "dei ", + /* 50*/ "Presi ", + /* 51*/ "delle ", + /* 52*/ "Prese ", + /* 53*/ "", + /* 54*/ "Prese ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "un'", + /* 62*/ "Un'", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "dardi", + /* 66*/ "globi", + /* 67*/ "munizioni Falciatore", + /* 68*/ "Dispositivo mimetico", + /* 69*/ "Pillole booster", + /* 70*/ "munizioni", + /* 71*/ "cartucce", + /* 72*/ "pallottole magnum", + /* 73*/ "pallottole d'oro", + /* 74*/ "granate", + /* 75*/ "granate a giro", + /* 76*/ "missili", + /* 77*/ "missili a giro", + /* 78*/ "mine a distanza", + /* 79*/ "mine di prossimit", + /* 80*/ "mine a tempo", + /* 81*/ "frecce", + /* 82*/ "bombe-n", + /* 83*/ "sedativi", + /* 84*/ "gettoni", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_s.c b/src/files/lang/jap-final/propobj_str_s.c new file mode 100644 index 000000000..a197bb941 --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Recogiste %s.\n", + /* 1*/ "Recogiste %s.\n", + /* 2*/ "Recogiste %s.\n", + /* 3*/ "Recogiste %s.\n", + /* 4*/ "Recogiste %s.\n", + /* 5*/ "Recogiste %s.\n", + /* 6*/ "Recogiste %s.\n", + /* 7*/ "Recogiste %s.\n", + /* 8*/ "Doble ", + /* 9*/ "municin", + /* 10*/ "cartucho", + /* 11*/ "bala de magnum", + /* 12*/ "balas doradas", + /* 13*/ "granada", + /* 14*/ "cinto de granadas", + /* 15*/ "cohete", + /* 16*/ "cohete buscador", + /* 17*/ "mina remota", + /* 18*/ "mina de proximidad", + /* 19*/ "mina de tiempo", + /* 20*/ "cuchillo de combate", + /* 21*/ "cuchillos de combate", + /* 22*/ "dardo", + /* 23*/ "bomba-N", + /* 24*/ "sedante", + /* 25*/ "Boli Explosivo", + /* 26*/ "Caja de Explosivos", + /* 27*/ "Bengalas", + /* 28*/ "Pitn", + /* 29*/ "", + /* 30*/ "Cartucho de Dinamita", + /* 31*/ "Cartuchos de Dinamita", + /* 32*/ "Bicho", + /* 33*/ "Microc疥ara", + /* 34*/ "Llave GoldenEye", + /* 35*/ "Ficha", + /* 36*/ "Explosivo Pl疽tico", + /* 37*/ "Has cogido una Llave.\n", + /* 38*/ "Has cogido un Escudo.\n", + /* 39*/ "Un Escudo.\n", + /* 40*/ "Has cogido algo.\n", + /* 41*/ "Esta puerta est cerrada.\n", + /* 42*/ "saeta", + /* 43*/ "orbe", + /* 44*/ "municin Segadora", + /* 45*/ "disp. de ocultacin", + /* 46*/ "reforzador", + /* 47*/ "tu ", + /* 48*/ "Tu ", + /* 49*/ "algunos ", + /* 50*/ "Algunos ", + /* 51*/ "algunas ", + /* 52*/ "Algunas ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "unos", + /* 62*/ "Unos", + /* 63*/ "unas", + /* 64*/ "Unas", + /* 65*/ "saetas", + /* 66*/ "orbes", + /* 67*/ "Municin Segadora", + /* 68*/ "disp. de ocultacin", + /* 69*/ "reforzadores", + /* 70*/ "Municin", + /* 71*/ "cartuchos", + /* 72*/ "balas de magnum", + /* 73*/ "balas doradas", + /* 74*/ "granadas", + /* 75*/ "cintos de granadas", + /* 76*/ "cohetes", + /* 77*/ "cohetes buscadores", + /* 78*/ "minas remotas", + /* 79*/ "minas de proximidad", + /* 80*/ "minas de tiempo", + /* 81*/ "dardos", + /* 82*/ "bombas-N", + /* 83*/ "sedantes", + /* 84*/ "fichas", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/refE.c b/src/files/lang/jap-final/refE.c similarity index 100% rename from src/files/lang/refE.c rename to src/files/lang/jap-final/refE.c diff --git a/src/files/lang/refJ.c b/src/files/lang/jap-final/refJ.c similarity index 100% rename from src/files/lang/refJ.c rename to src/files/lang/jap-final/refJ.c diff --git a/src/files/lang/refP.c b/src/files/lang/jap-final/refP.c similarity index 100% rename from src/files/lang/refP.c rename to src/files/lang/jap-final/refP.c diff --git a/src/files/lang/ref_str_f.c b/src/files/lang/jap-final/ref_str_f.c similarity index 100% rename from src/files/lang/ref_str_f.c rename to src/files/lang/jap-final/ref_str_f.c diff --git a/src/files/lang/ref_str_g.c b/src/files/lang/jap-final/ref_str_g.c similarity index 100% rename from src/files/lang/ref_str_g.c rename to src/files/lang/jap-final/ref_str_g.c diff --git a/src/files/lang/ref_str_i.c b/src/files/lang/jap-final/ref_str_i.c similarity index 100% rename from src/files/lang/ref_str_i.c rename to src/files/lang/jap-final/ref_str_i.c diff --git a/src/files/lang/ref_str_s.c b/src/files/lang/jap-final/ref_str_s.c similarity index 100% rename from src/files/lang/ref_str_s.c rename to src/files/lang/jap-final/ref_str_s.c diff --git a/src/files/lang/ritE.c b/src/files/lang/jap-final/ritE.c similarity index 100% rename from src/files/lang/ritE.c rename to src/files/lang/jap-final/ritE.c diff --git a/src/files/lang/jap-final/ritJ.c b/src/files/lang/jap-final/ritJ.c new file mode 100644 index 000000000..a94817a18 --- /dev/null +++ b/src/files/lang/jap-final/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nθικ∈黻ナ≡⊂∀ニ≫縲マ縺メを怐モよマてタぁナ⇔⊇≫ツ縲マ縺゚≪けマθικ∈縺繧氈ヌ≫∩♪⊂∩♭≠艪メヵΒメ∵スリエ⇔チ≫ツ\n\n|ヨヒマ縲マセ\n\nンモ∃⊇=ヘミマ艢ツ縲マ縺メを怐クこごニ≫∨⊥マ≠ァモγぼδ∩≒θικ∈縺繧氈ト∃チ⇔モ∃≒∃⊇ツ∧メ∨⊥マモ<ニικマ縲マ縺メgΖ∈せΖトヌ≫ョャ∵⊆≫ツみソΣuタリ∩≒氏メ閼驛ー∈ぴψナ⇔<ニικマ蜈ムにヌ≫メÅツ\n\n|しじ操セはヮ┰∈ぴψヌ≡\n\nγぼδメoマ⊆≫みソΣuタリ♭≠ァメはヮ┰∈ぴψニ≫メÅツθικメiヮsモ縲マ縺ヘモ揆ー∃⊇∨⊥≠焉べエ∨≪ナ∃⊇≡⊂Ψ∈⇒ツ≫メÅツ\n\n|しじ逐セθικ∈なにヌ≡\n\nθικメ⊇≫o゚メせ∃リ轣モ∝∩エ⇔⊇∃⊇ツなにナ∨≒≠ァ∵⇒∩∋Å閼驕クθικマにヌ≫メÅツョ縲マ縺゚≪けマ∧テマ∨♪≪チ≡⊂マナ⇔チ√ツト⌒∃チ†÷瘁モかォ∨チルマ<ニικ∈潤ロっ⌒⊂∀ニ≫♭⊆∽⊂ツ\n\n|しじ凍セθικ∈桙氈楳ハ♀リ♭曹蚕n\nγぼδメoマ⊆≫帥高桙气#ハ♀リ♭θικ∈曹氏ヌ≡ツ∧メ<ニικメφュマモッфメ┛Χ∈モ≒⊂メÅツ\n\n|しじ楳セθικ┿ヨδメφュ∈せぜ\n\n縲マ縺メを怐メ水ッモ⇒∩⊥⇔⊇∃⊇∵÷騾ム≠ヒハラ∈ナ⇔チ≫ぃい゚⌒゙⊇∀ニァト√≫ツルラ¢ハ縺マぼエ⇔ぢじsメφュ∈せどヌ≡ツく噤メпル∀∃エ∨リホモ÷ヤd縺逗ムハ縺クづてニ≫メÅツ\n\n|しじ斧セwメγぼδ∈磨痲フヌ\n\nθικ┿ヨδ∀wメδ∈⇒∃⊇♭⊇≫繙ル烙フd″∈磨痲フヌツく⌒みエ宦痺戟サぶマモ>繙ルo∧メ⌒メ∈」、♭ばぱニ≫テ∀Åツ\n\nEND\n", + /* 1*/ "θικ┿ヨδ\n", + /* 2*/ "|ワ竄пbhセ\n\nθικ∈黻ナ≡⊂∀ニ≫縲マ縺メを怐モよマてタぁナ⇔⊇≫ツ縲マ縺゚≪けマθικ∈縺繧氈ヌ≫∩♪⊂∩♭≠艪メヵΒメ∵スリエ⇔チ≫ツ\n\n|ヨヒマ縲マセ\n\nンモ∃⊇=ヘミマ艢ツ縲マ縺メを怐クこごニ≫∨⊥マ≠ァモγぼδ∩≒θικ∈縺繧氈ト∃チ⇔モ∃≒∃⊇ツ∧メ∨⊥マモ<ニικマ縲マ縺メgΖ∈せΖトヌ≫ョャ∵⊆≫ツみソΣuタリ∩≒氏メ閼驛ー∈ぴψナ⇔<ニικマ蜈ムにヌ≫メÅツ\n\n|しじ操セはヮ┰∈ぴψヌ≡\n\nγぼδメoマ⊆≫みソΣuタリ♭≠ァメはヮ┰∈ぴψニ≫メÅツθικメiヮsモ縲マ縺ヘモ揆ー∃⊇∨⊥≠焉べエ∨≪ナ∃⊇≡⊂Ψ∈⇒ツ≫メÅツ\n\n|しじ逐セθικ∈なにヌ≡\n\nθικメ⊇≫o゚メせ∃リ轣モ∝∩エ⇔⊇∃⊇ツなにナ∨≒≠ァ∵⇒∩∋Å閼驕クθικマにヌ≫メÅツョ縲マ縺゚≪けマ∧テマ∨♪≪チ≡⊂マナ⇔チ√ツト⌒∃チ†÷瘁モかォ∨チルマ<ニικ∈潤ロっ⌒⊂∀ニ≫♭⊆∽⊂ツ\n\n|しじ凍セθικ∈桙氈楳ハ♀リ♭曹蚕n\nγぼδメoマ⊆≫帥高桙气#ハ♀リ♭θικ∈曹氏ヌ≡ツ∧メ<ニικメφュマモッфメ┛Χ∈モ≒⊂メÅツ\n\n|しじ楳セwメγぼδ∈磨痲フヌ\n\nθικ┿ヨδ∀wメδ∈⇒∃⊇♭⊇≫繙ル烙フd″∈磨痲フヌツく⌒みエ宦痺戟サぶマモ>繙ルo∧メ⌒メ∈」、♭ばぱニ≫テ∀Åツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nθικ∈黻ナ≡⊂∀ニ≫縲マ縺メを怐モよマてタぁナ⇔⊇≫ツ縲マ縺゚≪けマθικ∈縺繧氈ヌ≫∩♪⊂∩♭≠艪メヵΒメ∵スリエ⇔チ≫ツ\n\n|ヨヒマ縲マセ\n\nンモ∃⊇=ヘミマ艢ツ縲マ縺メを怐クこごニ≫∨⊥マ≠ァモγぼδ∩≒θικ∈縺繧氈ト∃チ⇔モ∃≒∃⊇ツ∧メ∨⊥マモ<ニικマ縲マ縺メgΖ∈せΖトヌ≫ョャ∵⊆≫ツ∧√∩≒<ニικメiヮsモ縲マ縺ヘモ揆ーシ⊇メ♭≠焉べエ∨≪ナ∃⊇≡⊂Ψ∈⇒ツ≫メÅツ\n\n|しじ操セθικ∈なにヌ≡\n\nθικメ⊇≫o゚メせ∃リ轣モ∝∩エ⇔⊇∃⊇ツなにナ∨≒≠ァ∵⇒∩∋Å閼驕クθικマにヌ≫メÅツョ縲マ縺゚≪けマ∧テマ∨♪≪チ≡⊂マナ⇔チ√ツト⌒∃チ†÷瘁モかォ∨チルマ<ニικ∈潤ロっ⌒⊂∀ニ≫♭⊆∽⊂ツ\n\n|しじ逐セθικ∈桙氈楳ハ♀リ♭曹蚕n\nγぼδメoマ⊆≫帥高桙气#ハ♀リ♭θικ∈曹氏ヌ≡ツ∧メ<ニικメφュマモッфメ┛Χ∈モ≒⊂メÅツ\n\n|しじ凍セwメγぼδ∈磨痲フヌ\n\nθικ┿ヨδ∀wメδ∈⇒∃⊇♭⊇≫繙ル烙フd″∈磨痲フヌツく⌒みエ宦痺戟サぶマモ>繙ルo∧メ⌒メ∈」、♭ばぱニ≫テ∀Åツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "はヮ┰∈ぴψヌ≡\n", + /* 6*/ "θικ∈なにヌ≡\n", + /* 7*/ "θικ∈桙氈楳ハ♀リ♭曹蚕n", + /* 8*/ "θικ┿ヨδメφュ∈せぜ\n", + /* 9*/ "wメγぼδ∈磨痲フヌ\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "ミ゚ハロフリdワ\n", + /* 13*/ "ミ゚ハロフリdワ\n", + /* 14*/ "ミ゚ハロフリdワ∈みマ√∨\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "ラワ¥メ\n", + /* 18*/ "ラワ¥メ\n", + /* 19*/ "ラワ¥メ∈みマ√∨\n", + /* 20*/ "mメ┳∨¬∵ワチンムマ∃エ∨\n", + /* 21*/ "ョ麾ィメムだo∵ばぱト√∨\n", + /* 22*/ "ョ麾ィ∈磨痲フニテ∀∵♭タリヌ∋\n", + /* 23*/ "ヤd縺逗ムハ繧テて\n", + /* 24*/ "θικ┿ヨδ∵φヌγぼマエ∨\n", + /* 25*/ "ヤd縺逗ムハ縲ロワ窶∵ばぱト√∨\n", + /* 26*/ "θικ∵ほト√∨\n", + /* 27*/ "$ムハ縺謔ルト√∨\n\n", + /* 28*/ "$ムハ縺謔ィνト√∨\n", + /* 29*/ "θικ┿ヨδモめηナ≡⊂∀ナ⇔⊇≫\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "d繞」、\n", + /* 33*/ "d繞」、\n", + /* 34*/ "d繞」、∈みマ√∨\n", + /* 35*/ "ぉモテテ♭が∈ナ⇔⊇≫メÅム=セト∋ツ\n", + /* 36*/ "d♀マ÷d♀マエ\n", + /* 37*/ "θικ=テテモ♭ニツ縲マ縺觸n⊆∃∨∈黻ナ≡⊂∀ナ⇔⊇≫メ♭ニ≡エ\n", + /* 38*/ "ckヵメモがÅエ\n", + /* 39*/ "ヴ∵桙氈楳ハ♀リ♭曹氏ナリニツ\n⇒⊇⇔ヰ⇔フト⊇ツ\n", + /* 40*/ "閼驕ワシチ┳モな♭タ∃⊇≡ツ\nが∩閼驕モぷエ⇔⊇≫メ∩ムタ\n", + /* 41*/ "テ√モ縲マ縺ヘ∧メc┻∵―nロユ÷♭ぼエ∨d窶ニマメ腐磨ニツ\n", + /* 42*/ "が∀⊇⊂テ∀Å死潤゚ナ><ルモfナ∨ツ\n♪⊂ニ√†⊇⊇メ∩ムタ\n", + /* 43*/ "∪⊇=テテモ蚕n", + /* 44*/ "ムÅエ\n", + /* 45*/ "ck♪⊂∂エ⇔テメγぼδマぢ≪テ∋Å∋Åエ\n", + /* 46*/ "ト⊆∞氏メ閼驗サ∈ぴψナ∃チ¬オム蚕n", + /* 47*/ "≠ヘミマ艢<ニικモ∧メミdÅツ\n", + /* 48*/ "ヲケпルÅ死準ルラ¢ハ縺クр⇔ル⇔チ√エ\n", + /* 49*/ "」、∃≒テメョ麾ィ∈磨痲フヌ≫∩⌒ムツ\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "ミ♀艢マ¢\n", + /* 53*/ "ミ♀艢マ¢\n", + /* 54*/ "ミ♀艢マ¢∈みマ√∨\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "ユd♀ヨd\n", + /* 58*/ "ユd♀ヨd\n", + /* 59*/ "ユd♀ヨd∈みマ√∨\n", + /* 60*/ "ユd÷縺諛フ驕ナ∨\n", + /* 61*/ "ユd÷縺諛ヒ、ナ∨\n", + /* 62*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 63*/ "ミランワレロ準ユd♀ヨd∵ョャ♭ニ\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "縺メユd♀ヨd\n", + /* 67*/ "縺メユd♀ヨd\n", + /* 68*/ "縺メユd♀ヨd∈みマ√∨\n", + /* 69*/ "ン」、∵≧マ∝√⇔ナリエ∨\n", + /* 70*/ "騾ハ騾ハ騾ハ騾エ\n", + /* 71*/ "ヵ∂ぽ∈おぁ∃♪♭タ≫⌒メ∩エ\n", + /* 72*/ "θικ∵わべト√⇔⊇≫エ\n", + /* 73*/ "θικ∞氏メ刀メ∪ヶпモタ\n", + /* 74*/ "縲マ縲÷閧оÅツ\n%≠ハラ秩モメマモナぁト∋エ\npトッ=テメΑモウ∝≪Åツ\n", + /* 75*/ "ナ∩ナ=テ√モ烙ヒマワ♭ニ≡ツ\nΩキメリ∈caマ浴ナ蚕n", + /* 76*/ "ナ⇒テ⊇÷縲マ縲エ\n閧пヘかエ∨∩≒マモ閧пホメÅエ\np∪掾モテメ黶艪ハÅツ\n⊇⊇∩エ潤テメ凍÷茶ャ∀Αモ∩∋ツ\npテ√∵∪掾メくΒメ烙ヒマワÅツ\n", + /* 77*/ "∩ナテリ≪リナ∨<ニικツ\n", + /* 78*/ "ヤメくΒメ烙ヒマワÅ∀タ\n°ユ⊥÷ヨレメÅエ\n", + /* 79*/ "モ′ワ÷モ′ワエ準ョ麾ィ∈\n磨痲フヌ∃⊇∝エ潤ホ∋∀∩ナ⇔エ\n", + /* 80*/ "ィ、=ヘミマ艢ツ盾ノ⇔⇔ムエ\n", + /* 81*/ "ミタ\n", + /* 82*/ "が∈に⇔≪オ⊇⊇メ≡タ\nトエト∀べエ⇔≡エ\n", + /* 83*/ "⊂d∋≦ヤぶ∃⊇蚕nが∩マ⇒∩リエ⇔⇔エ\n", + /* 84*/ "$ムハ縺モφヌγぼ∈宦痰縺ナ∨ツ\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/ritP.c b/src/files/lang/jap-final/ritP.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/jap-final/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_f.c b/src/files/lang/jap-final/rit_str_f.c new file mode 100644 index 000000000..fee1613b8 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser et r馗up駻er l'駲uipement\n\nTrouvez l'駲uipement dissimul dans la soute bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'駲uipe de s馗urit du Pr駸ident est neutre et qu'elle ne doit pas 黎re attaqu馥.\n\n|Objectif 2: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connu. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 3: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - S馗urisez le plan de vol de Air Force One\n\nLes d騁ails du plan de Trent sont encore inconnus, mais nous pensons que l'駲uipage de l'avion sera en danger. Vous devrez acc馘er la cabine de pilotage pour d馗ouvrir ce qu'il pr駱are. Si la situation 馗happe votre contrle, activez l'auto-pilote.\n\n|Objectif 5: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One. La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser et r馗up駻er l'駲uipement\n\nTrouvez l'駲uipement dissimul dans la soute bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'駲uipe de s馗urit du Pr駸ident est neutre et qu'elle ne doit pas 黎re attaqu馥.\n\n|Objectif 2: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connu. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 3: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One. La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connu. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 2: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 3: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One. La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localiser et r馗up駻er 駲uipement\n", + /* 6*/ "Localiser Pr駸ident\n", + /* 7*/ "Placer Pr駸ident dans capsule\n", + /* 8*/ "S馗uriser plan de vol de Air Force One\n", + /* 9*/ "D騁acher OVNI de Air Force One\n", + /* 10*/ "Obtenir mallette.\n", + /* 11*/ "\n", + /* 12*/ "Mallette\n", + /* 13*/ "Mallette\n", + /* 14*/ "Mallette obtenue.\n", + /* 15*/ "Obtenir Arbal鑼e.\n", + /* 16*/ "\n", + /* 17*/ "Arbal鑼e\n", + /* 18*/ "Arbal鑼e\n", + /* 19*/ "Arbal鑼e obtenue.\n", + /* 20*/ "Trop de victimes neutres.\n", + /* 21*/ "Connexion l'OVNI d騁ruite.\n", + /* 22*/ "Impossible de d騁ruire connexion OVNI.\n", + /* 23*/ "Auto-pilote enclench.\n", + /* 24*/ "Air Force One stabilis.\n", + /* 25*/ "Syst鑪e Auto-pilote d騁ruit.\n", + /* 26*/ "Le Pr駸ident est K.O.\n", + /* 27*/ "Pilotes tu駸.\n", + /* 28*/ "Pilotes sauv駸.\n", + /* 29*/ "Air Force One va s'馗raser.\n", + /* 30*/ "Obtenir mine t駘馗om.\n", + /* 31*/ "\n", + /* 32*/ "Mine t駘馗om.\n", + /* 33*/ "Mine t駘馗om.\n", + /* 34*/ "Mine t駘馗om. obtenue.\n", + /* 35*/ "Qui 黎es-vous, jeune fille?\n", + /* 36*/ "Securit, SECURITE!!\n", + /* 37*/ "Mr. le Pr駸ident, vous 黎es en danger. Trent va essayer \nde vous kidnapper.\n", + /* 38*/ "Mais? Que se passe-t-il?!\n", + /* 39*/ "Vous devez gagner sans tarder la capsule de secours! \nSuivez-moi!\n", + /* 40*/ "Avez-vous des preuves pour avancer de tels propos?\n Vos accusations sont tr鑚 graves.\n", + /* 41*/ "Voici l'enregistrement de la r騏nion entre \nTrent et ses sbires conspirateurs.\n", + /* 42*/ "C'est effrayant... Je vous crois. \nQue fait-on maintenant?\n", + /* 43*/ "H, ce n'est pas...\n", + /* 44*/ "C'est un intrus...\n", + /* 45*/ "Comment avez-vous fait pour monter bord?\n", + /* 46*/ "Bon, r馗up駻ons les preuves.\n", + /* 47*/ "Le bureau du Pr駸ident est dans \nle secteur, Joanna.\n", + /* 48*/ "Il y a quelque chose de bizarre... Foncez la cabine de pilotage! \n", + /* 49*/ "Peut-黎re une mine pourrait d騁ruire la connexion l'OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pilule d'adr駭aline\n", + /* 53*/ "Pilule d'adr駭aline\n", + /* 54*/ "Pilule d'adr駭aline obtenue.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Carte\n", + /* 58*/ "Carte\n", + /* 59*/ "Carte obtenue.\n", + /* 60*/ "Soute baiss馥.\n", + /* 61*/ "Soute lev馥.\n", + /* 62*/ "Objet crucial d騁ruit.\n", + /* 63*/ "Acc鑚 refus - Carte ascenseur requise.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Carte ascenseur\n", + /* 67*/ "Carte ascenseur \n", + /* 68*/ "Carte ascenseur obtenue.\n", + /* 69*/ "Mine retardement.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "C'est trop tard, tu ne pourras pas le sauver.\n", + /* 72*/ "Le Pr駸ident est attaqu.\n", + /* 73*/ "Avez-vous r馭l馗hi la proposition que je vous ai pr駸ent馥, monsieur?\n", + /* 74*/ "Ma r駱onse est toujours la m麥e: d駸ol Trent, c'est non. Je ne confierai pas le Pelagic II la dataDyne. Changeons de sujet, voulez-vous!\n", + /* 75*/ "Mais c'est l'occasion en or de montrer que l'Am駻ique a foi en son industrie et que vous 黎es pr黎 les...\n", + /* 76*/ "Ca suffit, quand je dis non c'est non! Je ne vais pas changer d'avis sur ce sujet! Je veux que mes conseillers soient impartiaux, et vous ne me donnez pas cette impression, Trent. Le sujet est clos. C'est votre derni鑽e chance. Je ne reviendrai pas sur ma d馗ision.\n", + /* 77*/ "Comme vous voulez, monsieur.\n", + /* 78*/ "Ma derni鑽e chance? Ha! Pauvre fou. C'騁ait plutt la tienne, cr騁in!\n", + /* 79*/ "Elvis! Elvis! Je n'arrive pas d騁acher ce tube du fuselage! Peux-tu t'en charger?\n", + /* 80*/ "Un jeu d'enfant, Joanna. Regarde-moi faire!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "Regarder quoi? Et si tu faisais dans l'efficace pour une fois, ouvre le feu!\n", + /* 83*/ "Je n'ai plus le choix... Joanna, accroche-toi, 軋 va secouer!\n", + /* 84*/ "Les pilotes ont stabilis Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_g.c b/src/files/lang/jap-final/rit_str_g.c new file mode 100644 index 000000000..0f8ffdee8 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen, ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identen vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrstung!\n\nFinden Sie die Ausrstung, die im Gep臘kraum im Bauch des Flugzeugs fr Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Pr舖identen um neutrale Personen handelt, denen kein Schaden zugefgt werden darf.\n\n|2. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie dem Pr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|4. Ziel: - Sichern Sie die Flugroute der Air Force One!\n\nGenauere Informationen ber Trents Plan sind uns nicht bekannt. Wir vermuten aber, dass sich das Flugpersonal in hchster Gefahr befindet. Gehen Sie ins Cockpit und versichern Sie sich, dass es der Crew gut geht. Im schlimmsten anzunehmenden Fall mssen Sie den Autopiloten aktivieren.\n\n|5. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identen vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrstung!\n\nFinden Sie die Ausrstung, die im Gep臘kraum im Bauch des Flugzeugs fr Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Pr舖identen um neutrale Personen handelt, denen kein Schaden zugefgt werden darf.\n\n|2. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie dem Pr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|4. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identen vorlegen.\n\n|1. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie dem Pr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|2. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|3. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden und bergen Sie die Ausrstung!\n", + /* 6*/ "Finden Sie den Pr舖identen!\n", + /* 7*/ "Bringen Sie den Pr舖identen zur Kapsel!\n", + /* 8*/ "Sichern Sie die Flugroute!\n", + /* 9*/ "Lsen Sie die Verankerung des UFOs!\n", + /* 10*/ "Finden Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer wurde aufgenommen\n", + /* 15*/ "Erlangen Sie die Armbrust!\n", + /* 16*/ "\n", + /* 17*/ "Armbrust\n", + /* 18*/ "Armbrust\n", + /* 19*/ "Armbrust wurde aufgenommen\n", + /* 20*/ "Es sind zu viele neutrale Verluste zu beklagen.\n", + /* 21*/ "Verankerung wurde zerstrt.\n", + /* 22*/ "Verankerung kann nicht gelst werden.\n", + /* 23*/ "Autopilot wurde aktiviert.\n", + /* 24*/ "Der Flug der Air Force One wurde stabilisiert.\n", + /* 25*/ "Der Autopilot wurde zerstrt.\n", + /* 26*/ "Der Pr舖ident wurde schwer verletzt.\n", + /* 27*/ "Die Piloten wurden eliminiert.\n", + /* 28*/ "Die Piloten befinden sich in Sicherheit.\n", + /* 29*/ "Die Air Force One ist im Begriff, abzustrzen.\n", + /* 30*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 31*/ "\n", + /* 32*/ "Fernznder-Mine\n", + /* 33*/ "Fernznder-Mine\n", + /* 34*/ "Fernznder-Mine aufgenommen\n", + /* 35*/ "Wer sind Sie, junge Dame?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, Sie befinden sich in Gefahr. Trent versucht, \nSie zu kidnappen.\n", + /* 38*/ "Was, zur Hlle, war das?\n", + /* 39*/ "Rasch! Wir mssen zur Fluchtkapsel. \nFolgen Sie mir!\n", + /* 40*/ "Sie knnen solche Anschuldigungen nicht vorbringen, ohne\n stichhaltige Beweise zu haben.\n", + /* 41*/ "Ich habe eine Aufzeichnung des Meetings von\nTrent und den anderen Verschwrern.\n", + /* 42*/ "Das ist mehr als berzeugend. Ich vertraue Ihnen.\nWas sollen wir jetzt tun?\n", + /* 43*/ "Hey, das ist nicht...\n", + /* 44*/ "Ein Eindringling...\n", + /* 45*/ "Wie sind Sie an Bord gekommen?\n", + /* 46*/ "Dann suchen wir mal nach dem Beweis.\n", + /* 47*/ "Das Bro des Pr舖identen befindet \nsich auf diesem Level.\n", + /* 48*/ "Irgendetwas stimmt nicht... Sie mssen zum Cockpit!\n", + /* 49*/ "Vielleicht kann das UFO mit einer Mine gelst werden.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalin-Kapsel\n", + /* 53*/ "Adrenalin-Kapsel\n", + /* 54*/ "Adrenalin-Kapsel aufgenommen\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Schlsselkarte\n", + /* 58*/ "Schlsselkarte\n", + /* 59*/ "Schlsselkarte aufgenommen\n", + /* 60*/ "Laderaum wurde abgesenkt.\n", + /* 61*/ "Laderaum wurde angehoben.\n", + /* 62*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 63*/ "Zugriff verweigert - Aufzugs-Karte erforderlich\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Aufzugs-Karte\n", + /* 67*/ "Aufzugs-Karte\n", + /* 68*/ "Aufzugs-Karte aufgenommen\n", + /* 69*/ "Die Zeitznder-Mine wurde ineffektiv eingesetzt.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "Jetzt kannst du ihn nicht mehr retten.\n", + /* 72*/ "Der Pr舖ident wird attackiert.\n", + /* 73*/ "Haben Sie nochmals ber meinen Vorschlag nachgedacht, Sir?\n", + /* 74*/ "Meine Antwort bleibt unver舅dert. Es tut mir leid, Trent, aber ich sage nein. Ich werde die Pelagic II nicht an dataDyne verleihen. Knnen wir uns jetzt bitte anderen Themen zuwenden?\n", + /* 75*/ "Aber das w舐e die beste Gelegenheit, um zu beweisen, dass die Regierung Vertrauen in die amerikanische Industrie hat, und...\n", + /* 76*/ "Verdammt noch mal! Wenn ich nein sage, dann meine ich nein! Ich werde meine Meinung dahingehend nicht 舅dern. Ich brauche meine Berater, um unvoreingenommen zu bleiben. In letzter Zeit haben Sie mir nicht unbedingt unparteiische Ratschl臠e erteilt. Hren Sie nun endlich damit auf. Das ist Ihre letzte Chance.\n", + /* 77*/ "Wie Sie wnschen, Sir.\n", + /* 78*/ "Meine letzte Chance? Ha! Du dummer Narr. Das war DEINE letzte Chance!\n", + /* 79*/ "Elvis! Elvis! Ich kann die Verankerung des UFOs nicht lsen! Kannst du das erledigen?\n", + /* 80*/ "Das ist ein Kinderspiel, Joanna. Pass auf und lerne!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Lerne was? Kannst du endlich mit dem Quatsch aufhren und schie゚en?\n", + /* 83*/ "Ende der Fahnenstange... Joanna, bereite dich auf den Aufprall vor!\n", + /* 84*/ "Die Piloten konnten die Air Force One stabilisieren.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_i.c b/src/files/lang/jap-final/rit_str_i.c new file mode 100644 index 000000000..7bb65c525 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, n tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Accerta rotta di volo Air Force One\n\nNon siamo a conoscenza dei dettagli del piano di Trent, ma riteniamo che il personale di volo sia in pericolo. Va nella cabina di pilotaggio e assicurati che stiano bene. Se accaduto l'irreparabile, attiva il pilota automatico!\n\n|Obiettivo 5: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, n tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 2: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 3: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Trova e recupera l'attrezzatura\n", + /* 6*/ "Localizza il Presidente\n", + /* 7*/ "Porta il Presidente alla capsula\n", + /* 8*/ "Accerta rotta di volo Air Force One\n", + /* 9*/ "Stacca la capsula dall'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati balestra.\n", + /* 16*/ "\n", + /* 17*/ "Balestra\n", + /* 18*/ "Balestra\n", + /* 19*/ "Presa balestra.\n", + /* 20*/ "Implicate vittime civili.\n", + /* 21*/ "Danneggiato collegamento a capsula.\n", + /* 22*/ "Impossibile staccare capsula.\n", + /* 23*/ "Attivato pilota automatico.\n", + /* 24*/ "L'Air Force One stato stabilizzato.\n", + /* 25*/ "Distrutto pilota automatico.\n", + /* 26*/ "Il Presidente stato ucciso.\n", + /* 27*/ "I piloti sono stati uccisi.\n", + /* 28*/ "I piloti sono stati salvati.\n", + /* 29*/ "L'Air Force One sta per schiantarsi.\n", + /* 30*/ "Procurati mina a distanza.\n", + /* 31*/ "\n", + /* 32*/ "Mina distanza\n", + /* 33*/ "Mina distanza\n", + /* 34*/ "Presa mina a distanza.\n", + /* 35*/ "E lei chi sarebbe?\n", + /* 36*/ "Sicurezza, SICUREZZA!!!\n", + /* 37*/ "Signor Presidente, lei in pericolo. Trent sta \ntentando di rapirla!\n", + /* 38*/ "Cosa diavolo stato?!\n", + /* 39*/ "Dobbiamo raggiungere la capsula di salvataggio! \nMi segua!\n", + /* 40*/ "Non pu mica andare in giro a fare certe accuse \nsenza prove concrete!!! Spero che abbia \nuna valida spiegazione!\n", + /* 41*/ "Questa una registrazione della riunione \ntra Trent e gli altri cospiratori!\n", + /* 42*/ "Una prova schiacciante... Sono nelle sue mani! \nCosa dobbiamo fare?\n", + /* 43*/ "Ehi, non ...\n", + /* 44*/ "ネ un intruso...\n", + /* 45*/ "Come diavolo sei salita a bordo?\n", + /* 46*/ "ネ ora di recuperare le prove!\n", + /* 47*/ "L'ufficio del Presidente su \nquesto piano, Joanna!\n", + /* 48*/ "C' qualcosa che non quadra... Devi andare nella cabina di pilotaggio, presto!\n", + /* 49*/ "Forse la capsula si pu staccare con una mina.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Compressa di adrenalina\n", + /* 53*/ "Compressa di adrenalina\n", + /* 54*/ "Presa compressa di adrenalina.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Tessera magnetica\n", + /* 58*/ "Tessera magnetica\n", + /* 59*/ "Presa tessera magnetica.\n", + /* 60*/ "Abbassato bagagliaio.\n", + /* 61*/ "Alzato bagagliaio.\n", + /* 62*/ "Distrutto strumento essenziale alla missione.\n", + /* 63*/ "Accesso negato - Serve tessera ascensore.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Tessera ascensore\n", + /* 67*/ "Tessera ascensore\n", + /* 68*/ "Presa tessera ascensore.\n", + /* 69*/ "La mina a orologeria stata sprecata.\n", + /* 70*/ "Ah, ah, ah , ah!!!\n", + /* 71*/ "Oramai non puoi pi salvarlo!\n", + /* 72*/ "Stanno attaccando il Presidente!!!\n", + /* 73*/ "Ha pi pensato alla proposta che le ho fatto, signore?\n", + /* 74*/ "La mia risposta sempre la stessa, Trent! No, mi dispiace! Non metter il Pelagic II a disposizione della dataDyne. Ora possiamo cambiare argomento, per favore?\n", + /* 75*/ "Ma questa un'occasione d'oro per dimostrare che l'America ha piena fiducia nel suo tessuto industriale e che lo sostiene...\n", + /* 76*/ "Maledizione! Ho detto NO ed NO! Non mi far cambiare idea su questo punto Trent! I miei consiglieri devono essere imparziali e negli ultimi tempi non si pu proprio dire che lei lo sia stato! Lasciamo perdere e dimentichiamo l'accaduto! Questa la sua ultima possibilit, Trent!\n", + /* 77*/ "Come preferisce, signor Presidente!\n", + /* 78*/ "La MIA ultima possibilit? Si sbaglia di grosso: questa era la SUA!\n", + /* 79*/ "Elvis! Elvis! Non riesco a staccare il tubo dalla fusoliera! Tu ce la fai?\n", + /* 80*/ "Elementare, Joanna. Guarda qua!\n", + /* 81*/ "Eee... hop!\n", + /* 82*/ "Guarda cosa? La vuoi piantare di giocare e sparare una buona volta?!\n", + /* 83*/ "Non abbiamo scelta... Joanna, preparati all'impatto!\n", + /* 84*/ "I piloti hanno stabilizzato l'Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_s.c b/src/files/lang/jap-final/rit_str_s.c new file mode 100644 index 000000000..cd2cba581 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, deber疽 sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avin, y tr疇lo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser daados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Cuatro: - Asegurar la Trayectoria de Vuelo del Air Force One\n\nNo se conocen los detalles especficos del plan de Trent, pero se cree que la tripulacin est en peligro. Llega hasta la cabina y asegrate de su bienestar. Si ocurre lo peor, activa el piloto autom疸ico.\n\n|Objetivo Cinco: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avin, y tr疇lo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser daados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Cuatro: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Dos: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Tres: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localizar y recuperar el equipo\n", + /* 6*/ "Localizar al Presidente\n", + /* 7*/ "Llevar al Presidente a la c疳sula\n", + /* 8*/ "Asegurar trayectora del Air Force One\n", + /* 9*/ "Separar el OVNI del Air Force One\n", + /* 10*/ "Obt駭 la Maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obt駭 la Ballesta.\n", + /* 16*/ "\n", + /* 17*/ "Ballesta\n", + /* 18*/ "Ballesta\n", + /* 19*/ "Ballesta obtenida.\n", + /* 20*/ "Has causado demasiadas bajas neutrales.\n", + /* 21*/ "Conexin del OVNI daado.\n", + /* 22*/ "Incapaz de separar el OVNI.\n", + /* 23*/ "El Piloto Autom疸ico ha sido activado.\n", + /* 24*/ "El Air Force One ha sido estabilizado.\n", + /* 25*/ "El Piloto Autom疸ico ha sido destruido.\n", + /* 26*/ "El Presidente ha sido eliminado.\n", + /* 27*/ "Los pilotos han muerto.\n", + /* 28*/ "Los pilotos han sido salvados.\n", + /* 29*/ "El Air Force One est a punto de estrellarse.\n", + /* 30*/ "Obt駭 la mina remota.\n", + /* 31*/ "\n", + /* 32*/ "Mina remota\n", + /* 33*/ "Mina remota\n", + /* 34*/ "Mina remota obtenida.\n", + /* 35*/ "ソQui駭 es usted, jovencita?\n", + /* 36*/ "。。Seguridad, SEGURIDAD!!\n", + /* 37*/ "Sr. Presidente, est usted en peligro. Trent intenta \nsecuestrarle.\n", + /* 38*/ "。Qu demonios es eso!\n", + /* 39*/ "Debemos llevarle a la c疳sula de escape. \nSgame.\n", + /* 40*/ "No puede hacer acusaciones como 駸a sin evidencias.\n ソAsumo que tendr alguna?\n", + /* 41*/ "ノsta es una grabacin de una reunin entre \nTrent y los otros conspiradores.\n", + /* 42*/ "Parece abrumador... Estoy en sus manos. \nソQu hacemos ahora?\n", + /* 43*/ "Hey, t no eres...\n", + /* 44*/ "Es una intrusa...\n", + /* 45*/ "ソCmo ha subido a bordo?\n", + /* 46*/ "Ahora, recuperemos la evidencia.\n", + /* 47*/ "La habitacin del Presidente est en \neste nivel, Joanna.\n", + /* 48*/ "Algo va mal... 。Debes llegar a la cabina!\n", + /* 49*/ "Quiz una mina separe el OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalina\n", + /* 53*/ "Pastilla de Adrenalina\n", + /* 54*/ "Pastilla de Adrenalina obtenida.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Llave magn騁ica\n", + /* 58*/ "Llave magn騁ica \n", + /* 59*/ "Llave magn騁ica obtenida.\n", + /* 60*/ "La baha de carga ha sido bajada.\n", + /* 61*/ "La baha de carga ha sido subida.\n", + /* 62*/ "Objeto crtico de la misin destruido.\n", + /* 63*/ "Acceso denegado: llave magn騁ica del ascensor requerida.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Llave ascensor\n", + /* 67*/ "Llave magn騁ica del ascensor \n", + /* 68*/ "Llave magn騁ica del ascensor obtenida.\n", + /* 69*/ "La mina de tiempo ha sido desperdiciada.\n", + /* 70*/ "Ja, ja, ja, ja, ja.\n", + /* 71*/ "Ahora ya no podr疽 salvarle.\n", + /* 72*/ "Est疣 atacando al Presidente.\n", + /* 73*/ "ソHa reconsiderado algo m疽 la propuesta que le hice, seor?\n", + /* 74*/ "Mi respuesta es la misma: lo siento, Trent, pero no. No quiero prestar el Pelagic II a dataDyne. Por favor, ソpodemos ahora tratar otras cuestiones?\n", + /* 75*/ "Pero 駸ta es una oportunidad de oro para demostrar que Am駻ica tiene fe en sus industrias y que las apoya...\n", + /* 76*/ "。Maldicin! 。He dicho no y significa no! 。No pienso cambiar de opinin! Necesito que mis asesores sean imparciales, y ahora no me est疽 dando la imparcialidad que necesito. D駛alo, y no hablemos m疽 de ello. Es tu ltima oportunidad.\n", + /* 77*/ "Como quiera, seor.\n", + /* 78*/ "ソMi ltima oportunidad? 。Ja! Idiota. Fue la tuya...\n", + /* 79*/ "。Elvis! 。Elvis! 。No puedo soltar ese tubo del fuselaje! ソPuedes hacerlo t?\n", + /* 80*/ "Pan comido, Joanna. 。Mira esto!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "ソMirar, qu? ソQuieres dejar de juguetear? 。Dispara!\n", + /* 83*/ "No hay m疽 opciones... 。Joanna, prep疵ate para el impacto!\n", + /* 84*/ "Los pilotos han estabilizado el Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/runE.c b/src/files/lang/jap-final/runE.c similarity index 100% rename from src/files/lang/runE.c rename to src/files/lang/jap-final/runE.c diff --git a/src/files/lang/runJ.c b/src/files/lang/jap-final/runJ.c similarity index 100% rename from src/files/lang/runJ.c rename to src/files/lang/jap-final/runJ.c diff --git a/src/files/lang/runP.c b/src/files/lang/jap-final/runP.c similarity index 100% rename from src/files/lang/runP.c rename to src/files/lang/jap-final/runP.c diff --git a/src/files/lang/run_str_f.c b/src/files/lang/jap-final/run_str_f.c similarity index 100% rename from src/files/lang/run_str_f.c rename to src/files/lang/jap-final/run_str_f.c diff --git a/src/files/lang/run_str_g.c b/src/files/lang/jap-final/run_str_g.c similarity index 100% rename from src/files/lang/run_str_g.c rename to src/files/lang/jap-final/run_str_g.c diff --git a/src/files/lang/run_str_i.c b/src/files/lang/jap-final/run_str_i.c similarity index 100% rename from src/files/lang/run_str_i.c rename to src/files/lang/jap-final/run_str_i.c diff --git a/src/files/lang/run_str_s.c b/src/files/lang/jap-final/run_str_s.c similarity index 100% rename from src/files/lang/run_str_s.c rename to src/files/lang/jap-final/run_str_s.c diff --git a/src/files/lang/sevE.c b/src/files/lang/jap-final/sevE.c similarity index 100% rename from src/files/lang/sevE.c rename to src/files/lang/jap-final/sevE.c diff --git a/src/files/lang/jap-final/sevJ.c b/src/files/lang/jap-final/sevJ.c new file mode 100644 index 000000000..427930956 --- /dev/null +++ b/src/files/lang/jap-final/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nャィャΖレ∈ゐΖナ∨ツムミマメ黽XD-310372レ∵=コ≫陪♭べξト√∨∀メテ∀Åツ£窶ラ゚d操ムモナムワマdп諢窒メメΚヨÅツ陪メリホセ$閠ムミ゚死宦逐ワ順父゚死它巡套゚死怙ツケエ⇔⊇≫ムミマ∀∧メ窶ラ閠≠d∈「ナ≠浴メ∈┃┏ヌ≡ツ\n\n|しじ操セwメсァ∈┃┏ヌ≡\n\nd∵d♀ニ≫モÅエ∨x艨メムミマθ∵сァマト≒ト√≡⊂∀ナ⇔⊇≫ツ£窶ラ゚d∀ナ⇔メしじ∈ュ⊂ニ≫∨⊥≠ロメk∈せпマ「ナ∃チ⇔モ蚕n\n|しじ逐セψ蛛ト√∨ムミマ∈ばぱ\n\ndメくΒメしじモ÷d∨¬∵x艨マヰ∨nマ⊆≫⌒メュ⇔∈ばぱニ≫テ∀Åツ⌒ナ<栫ソ∵d∨¬メ∵ヨヒマ縲マぅうメなゎ∀=マ⇔⊇≫テ∀マΨ∵⇒⊇∨≒ヨヒマ縲マぅう∵マト≒ト√≫テ∀マ∃≫ツ∧√モ┃┏ナ∃チ⇔モ∃≒∃⊇ツ\n\n|しじ凍セ┻ぶマャィャ∈え√\n\nヨヒマ縲マぅう∵d∈νツ⇔チ√≫モÅツャィャΖレ∈え≫テ∀∵♭タ√†≠ロ≒マdメリ轣ヘリホ∵艨蛛竅∽⊂ツd∵∨♪≪ツ∃⊇リ轣マ⊆≫はu∃♪メ「⌒≠ロ≒∃≒タエ∀♭タ≫エ\n\nEND\n", + /* 1*/ "モミ斧操÷轣求≠臀n", + /* 2*/ "|ワ竄пbhセ\n\nャィャΖレ∈ゐΖナ∨ツムミマメ黽XD-310372レ∵=コ≫陪♭べξト√∨∀メテ∀Åツ£窶ラ゚d操ムモナムワマdп諢窒メメΚヨÅツ陪メリホセ$閠ムミ゚死宦逐ワ順父゚死它巡套゚死怙ツケエ⇔⊇≫ムミマ∀∧メ窶ラ閠≠d∈「ナ≠浴メ∈┃┏ヌ≡ツ\n\n|しじ操セwメсァ∈┃┏ヌ≡\n\nd∵d♀ニ≫モÅエ∨x艨メムミマθ∵сァマト≒ト√≡⊂∀ナ⇔⊇≫ツ£窶ラ゚d∀ナ⇔メしじ∈ュ⊂ニ≫∨⊥≠ロメk∈せпマ「ナ∃チ⇔モ蚕n\n|しじ逐セ┻ぶマャィャ∈え√\n\nヨヒマ縲マぅう∵d∈νツ⇔チ√≫モÅツャィャΖレ∈え≫テ∀∵♭タ√†≠ロ≒マdメリ轣ヘリホ∵艨蛛竅∽⊂ツd∵∨♪≪ツ∃⊇リ轣マ⊆≫はu∃♪メ「⌒≠ロ≒∃≒タエ∀♭タ≫エ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nャィャΖレ∈ゐΖナ∨ツムミマメ黽XD-310372レ∵=コ≫陪♭べξト√∨∀メテ∀Åツ£窶ラ゚d操ムモナムワマdп諢窒メメΚヨÅツ陪メリホセ$閠ムミ゚死宦逐ワ順父゚死它巡套゚死怙ツケエ⇔⊇≫ムミマ∀∧メ窶ラ閠≠d∈「ナ≠浴メ∈┃┏ヌ≡ツ\n\n|しじ操セ┻ぶマャィャ∈え√\n\nヨヒマ縲マぅう∵d∈νツ⇔チ√≫モÅツャィャΖレ∈え≫テ∀∵♭タ√†≠ロ≒マdメリ轣ヘリホ∵艨蛛竅∽⊂ツd∵∨♪≪ツ∃⊇リ轣マ⊆≫はu∃♪メ「⌒≠ロ≒∃≒タエ∀♭タ≫エ\n\nEND\n", + /* 4*/ "wメсァ∈┃┏ヌ≡\n", + /* 5*/ "ψ蛛ト√∨ムミマ∈ばぱ\n", + /* 6*/ "┻ぶマャィャ∈え√\n", + /* 7*/ "сァメ┃┏\n", + /* 8*/ "ムミマメばぱ\n", + /* 9*/ "ャィャΖレメなΖ\n", + /* 10*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 11*/ "ハロヘマん醇сァ=ソ≒桙氓ぃい\n", + /* 12*/ "メ桙麾d繧ネに\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sevP.c b/src/files/lang/jap-final/sevP.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/jap-final/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_f.c b/src/files/lang/jap-final/sev_str_f.c new file mode 100644 index 000000000..0394aff11 --- /dev/null +++ b/src/files/lang/jap-final/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Saboter le labo d'exp駻imentation ennemi\n\nDes exp駻iences sont conduites sur le corps de l'ambassadeur. Je dois mener bien ma t稍he de Protecteur, pour cela je dois d騁ruire ce corps.\n\n|Objectif 2: - D騁ruire le vaisseau maian captur饅n\nMon dernier objectif sera de d騁ruire les restes du vaisseau avec lequel je suis arriv sur Terre. Si quelqu'un d馗ouvre la ressemblance entre nos technologies et celles de l'Institut Carrington nos alli駸 seront en danger et j'aurai 馗hou dans ma mission.\n\n|Objectif 3: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 1*/ "SECTEUR 51, NEVADA, TERRE\n", + /* 2*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Saboter le labo d'exp駻imentation ennemi\n\nDes exp駻iences sont conduites sur le corps de l'ambassadeur. Je dois mener bien ma t稍he de Protecteur, pour cela je dois d騁ruire ce corps.\n\n|Objectif 2: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 4*/ "Saboter labo de tests\n", + /* 5*/ "D騁ruire vaisseau maian captur饅n", + /* 6*/ "Activer le signal de d騁resse\n", + /* 7*/ "Labo de tests sabot.\n", + /* 8*/ "Vaisseau maian captur d騁ruit.\n", + /* 9*/ "Signal de d騁resse activ.\n", + /* 10*/ "Objet crucial d騁ruit.\n", + /* 11*/ "Mission 馗hou馥 - impossible de quitter labo de tests.\n", + /* 12*/ "Voie de sortie alternative activ馥.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_g.c b/src/files/lang/jap-final/sev_str_g.c new file mode 100644 index 000000000..35de19d9a --- /dev/null +++ b/src/files/lang/jap-final/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibende Ausrstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, fr die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Krper Experimente durchgefhrt werden. Um meine Pflicht als Maianischer Protektor zu erfllen, muss ich dafr Sorge tragen, dass der Krper zerstrt wird.\n\n|2. Ziel: - Zerstren Sie das Maianische Schiff!\n\nMein letzter Akt der Pflichterfllung besteht darin, das Schiff, mit dem ich die Erde erreicht habe, zu zerstren. Sollte irgendjemand feststellen, dass die sich an Bord befindliche Technologie der des Carrington Instituts 臧nlich ist, geraten unsere Verbndeten auf der Erde in Gefahr, und meine Mission ist gescheitert.\n\n|3. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 1*/ "AREA 51, NEVADA, ERDE\n", + /* 2*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibende Ausrstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, fr die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Krper Experimente durchgefhrt werden. Um meine Pflicht als Maianischer Protektor zu erfllen, muss ich dafr Sorge tragen, dass der Krper zerstrt wird.\n\n|2. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibende Ausrstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 4*/ "Sabotieren Sie das Experiment!\n", + /* 5*/ "Zerstren Sie das Maianische Schiff!\n", + /* 6*/ "Senden Sie ein Notsignal!\n", + /* 7*/ "Medizinisches Experiment wurde sabotiert.\n", + /* 8*/ "Das Maianische Schiff wurde zerstrt.\n", + /* 9*/ "Notsignal wurde gesendet.\n", + /* 10*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 11*/ "MISSION FEHLGESCHLAGEN - Flucht ist nicht mehr mglich.\n", + /* 12*/ "Es wurde eine alternative Fluchtroute gefunden.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_i.c b/src/files/lang/jap-final/sev_str_i.c new file mode 100644 index 000000000..904104465 --- /dev/null +++ b/src/files/lang/jap-final/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Elimina la navicella Maian sequestrata\n\nL'ultimo mio dovere sar quello di distruggere quel che rimane della navicella Maian con cui sono arrivato sulla Terra. Se qualcuno scoprisse che la tecnologia di costruzione simile a quella delle 'invenzioni' del Carrington Institute, i nostri alleati sulla Terra sarebbero in grave pericolo e io avrei fallito la mia missione.\n\n|Obiettivo 3: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 1*/ "AREA 51, NEVADA, TERRA\n", + /* 2*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 4*/ "Sabotaggio esperimento medico nemico\n", + /* 5*/ "Elimina la navicella Maian sequestrata\n", + /* 6*/ "Invia segnale di pericolo\n", + /* 7*/ "L'esperimento medico stato sabotato.\n", + /* 8*/ "La navicella Maian stata distrutta.\n", + /* 9*/ "Il segnale di pericolo stato inviato.\n", + /* 10*/ "Distrutto strumento essenziale alla missione.\n", + /* 11*/ "Missione fallita - Impossibile uscire dal laboratorio\n", + /* 12*/ "Trovata via di fuga alternativa.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_s.c b/src/files/lang/jap-final/sev_str_s.c new file mode 100644 index 000000000..bae650920 --- /dev/null +++ b/src/files/lang/jap-final/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento M馘ico Enemigo\n\nEst疣 experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme de que el cuerpo es destruido.\n\n|Objetivo Dos: - Destruir la Nave Maian capturada\n\nMi ltimo acto y mi deber ser destruir lo que queda del vehculo en el que llegu a la Tierra. Si alguien descubre que su tecnologa es similar a la de las 'invenciones' del Instituto Carrington, nuestros aliados terrcolas estar疣 en peligro, y habremos fallado.\n\n|Objetivo Tres: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 1*/ "チREA 51, NEVADA, TIERRA\n", + /* 2*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento M馘ico Enemigo\n\nEst疣 experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme que el cuerpo es destruido.\n\n|Objetivo Dos: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 4*/ "Sabotear experimento m馘ico enemigo\n", + /* 5*/ "Destruir platillo Maian capturado\n", + /* 6*/ "Activar la seal de socorro\n", + /* 7*/ "El experimento m馘ico ha sido saboteado.\n", + /* 8*/ "El platillo Maian ha sido destruido.\n", + /* 9*/ "La seal de socorro ha sido enviada.\n", + /* 10*/ "Objeto crtico de la misin ha sido destruido.\n", + /* 11*/ "Misin fallada: no puedes escapar del laboratorio.\n", + /* 12*/ "Ruta de escape alternativa encontrada.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/sevbE.c b/src/files/lang/jap-final/sevbE.c similarity index 100% rename from src/files/lang/sevbE.c rename to src/files/lang/jap-final/sevbE.c diff --git a/src/files/lang/sevbJ.c b/src/files/lang/jap-final/sevbJ.c similarity index 100% rename from src/files/lang/sevbJ.c rename to src/files/lang/jap-final/sevbJ.c diff --git a/src/files/lang/sevbP.c b/src/files/lang/jap-final/sevbP.c similarity index 100% rename from src/files/lang/sevbP.c rename to src/files/lang/jap-final/sevbP.c diff --git a/src/files/lang/sevb_str_f.c b/src/files/lang/jap-final/sevb_str_f.c similarity index 100% rename from src/files/lang/sevb_str_f.c rename to src/files/lang/jap-final/sevb_str_f.c diff --git a/src/files/lang/sevb_str_g.c b/src/files/lang/jap-final/sevb_str_g.c similarity index 100% rename from src/files/lang/sevb_str_g.c rename to src/files/lang/jap-final/sevb_str_g.c diff --git a/src/files/lang/sevb_str_i.c b/src/files/lang/jap-final/sevb_str_i.c similarity index 100% rename from src/files/lang/sevb_str_i.c rename to src/files/lang/jap-final/sevb_str_i.c diff --git a/src/files/lang/sevb_str_s.c b/src/files/lang/jap-final/sevb_str_s.c similarity index 100% rename from src/files/lang/sevb_str_s.c rename to src/files/lang/jap-final/sevb_str_s.c diff --git a/src/files/lang/sevxE.c b/src/files/lang/jap-final/sevxE.c similarity index 100% rename from src/files/lang/sevxE.c rename to src/files/lang/jap-final/sevxE.c diff --git a/src/files/lang/sevxJ.c b/src/files/lang/jap-final/sevxJ.c similarity index 100% rename from src/files/lang/sevxJ.c rename to src/files/lang/jap-final/sevxJ.c diff --git a/src/files/lang/sevxP.c b/src/files/lang/jap-final/sevxP.c similarity index 100% rename from src/files/lang/sevxP.c rename to src/files/lang/jap-final/sevxP.c diff --git a/src/files/lang/sevx_str_f.c b/src/files/lang/jap-final/sevx_str_f.c similarity index 100% rename from src/files/lang/sevx_str_f.c rename to src/files/lang/jap-final/sevx_str_f.c diff --git a/src/files/lang/sevx_str_g.c b/src/files/lang/jap-final/sevx_str_g.c similarity index 100% rename from src/files/lang/sevx_str_g.c rename to src/files/lang/jap-final/sevx_str_g.c diff --git a/src/files/lang/sevx_str_i.c b/src/files/lang/jap-final/sevx_str_i.c similarity index 100% rename from src/files/lang/sevx_str_i.c rename to src/files/lang/jap-final/sevx_str_i.c diff --git a/src/files/lang/sevx_str_s.c b/src/files/lang/jap-final/sevx_str_s.c similarity index 100% rename from src/files/lang/sevx_str_s.c rename to src/files/lang/jap-final/sevx_str_s.c diff --git a/src/files/lang/sevxbE.c b/src/files/lang/jap-final/sevxbE.c similarity index 100% rename from src/files/lang/sevxbE.c rename to src/files/lang/jap-final/sevxbE.c diff --git a/src/files/lang/sevxbJ.c b/src/files/lang/jap-final/sevxbJ.c similarity index 100% rename from src/files/lang/sevxbJ.c rename to src/files/lang/jap-final/sevxbJ.c diff --git a/src/files/lang/sevxbP.c b/src/files/lang/jap-final/sevxbP.c similarity index 100% rename from src/files/lang/sevxbP.c rename to src/files/lang/jap-final/sevxbP.c diff --git a/src/files/lang/sevxb_str_f.c b/src/files/lang/jap-final/sevxb_str_f.c similarity index 100% rename from src/files/lang/sevxb_str_f.c rename to src/files/lang/jap-final/sevxb_str_f.c diff --git a/src/files/lang/sevxb_str_g.c b/src/files/lang/jap-final/sevxb_str_g.c similarity index 100% rename from src/files/lang/sevxb_str_g.c rename to src/files/lang/jap-final/sevxb_str_g.c diff --git a/src/files/lang/sevxb_str_i.c b/src/files/lang/jap-final/sevxb_str_i.c similarity index 100% rename from src/files/lang/sevxb_str_i.c rename to src/files/lang/jap-final/sevxb_str_i.c diff --git a/src/files/lang/sevxb_str_s.c b/src/files/lang/jap-final/sevxb_str_s.c similarity index 100% rename from src/files/lang/sevxb_str_s.c rename to src/files/lang/jap-final/sevxb_str_s.c diff --git a/src/files/lang/shoE.c b/src/files/lang/jap-final/shoE.c similarity index 100% rename from src/files/lang/shoE.c rename to src/files/lang/jap-final/shoE.c diff --git a/src/files/lang/jap-final/shoJ.c b/src/files/lang/jap-final/shoJ.c new file mode 100644 index 000000000..801f94625 --- /dev/null +++ b/src/files/lang/jap-final/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nワリ≧dメ┨驍∵⇒⊇マなにト√∨ツ刀ヒメ∈ぷ⇒ノタキメ陪Åツワリ≧dメヨマモテメマ⊆≫q⊇メマ⊇≫≡⊂Åツテメ∈ばぱナヨマ∈ほヌ†≦ケト√∨ュ黽メワリ≧d∨¬マ=ワモ∂фメ驕痺轣モシチ∃≫メÅツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|モ′ワセ\n\nヨママ⊇♪∠掾マリモxヒロq∵⊆≫ツせ∃」べメ∨⊥マ吹ナ⊇ネu∵ョャ∃∋Åツλсdユ∈エ⇔≡ムツヨマ∵せпマほ√∨テ∀∈にワツ≫ョャ⌒⊆エ⇔<シーマ」べニ≫∝ツマモ⊇∩∃⊇メトツ≠ヘミマ艢÷ヨマモdマしヌ∨≡ツ瘁メ$∃ロd♀モ≠煕♭モフ¬ば√∃⊇∩⌒ナ√∃⊇ツ縺橿∈トニマモ≧∧メ⌒メ∈ぱニョャ⌒⊆≫∩⌒ナ√∃⊇ツ\n\n|しじ操セλсdユ∈宦痰サツ≡\n\nxヒマ⊇チ⇒∩⊆≫ヤ℃ワラョクケпメn=リÅδいナ⇔⊇≫Σ刀ヒマλсdユ∈宦痰サツ⇔チ√ツテ√≒∈ムミマ┬∵せマ」べばぱニ√†≧メロd♀モシチ∃≫Å∽⊂ツδいナ⇔⊇≫ヤ℃ワラ∈にツ≫マモ÷ォ縲ハユ∈⊂メÅツ\n\n|しじ逐セ″ハ≠∈づてヌ≡\n\nモミメ≪∵にふ∨≒∃⊇メ♭≧ァメ⊇o∈ぱニメ∵⊇⊇Å∽⊂ツに⇒ツ≫マモIRワヨヒマ∵痺ワÅツモミno⌒サマ≡エ⇔瘁ト√⇔∪≪ト≒マョメコ∃≫モミヨす∠マモ∞サ∈≫ョャ∵⊆≫ツ∪∧≒チワリ≧d∨¬モ=ネテマ″ハ≠∈ロエ⇔⊇≫モÅツ⌒ナ≠ノふ∨≒∃ツ√†♪テ∩マワムハ焉メ浴クニ≫⌒メ∵⊆≫Å∽⊂ツナ∩ナ∧テモ=タ‡ナ⊇iヮ∵∃ト√⇔⊇≫マ⊇∃⊇ツ\n\n|しじ凍セメコ∃≫モミマす\n\nワリ≧dメヨマモメく⌒コ∃≫モミマ⊇≫Å∽⊂ツ∧テヨメ≪モが∩┓∃ハラ∵ト√⇔⊇≫∩⌒ナ√∃⊇ツテテモq⊇メÅツwメわべモト≒マめナ⊇⌒メマ∃≫マ⊇∃⊇ツ\n\n|しじ楳セモd繧槽∈ュ⇔ほヌ\n\nムミマぐ」隙「メニァ♭モ÷ワリ≧dメモd繧槽∨¬∵∞コ∃≫モミメ♪テ∩マらδナ⇔⊇≫∀メテ∀Åツ瘁焉マぁチ∝ナ∨ンモュ⇔ほニメÅツ\n\n|しじ斧セワリ≧dメヨマ∈ほヌ\n\nヨマ∀メスqÅツヨマモレムヨハラ∈エ⇔ワリ≧dq∈Κルぁニテ∀∵♭タ÷瘁メロd♀モも♭モフ¬ば√∃⊇♭⊆∽⊂ツ瘁クほヌ†≦ケト√∨ュ黽メワリ≧dヨメι・b⌒シチ∃≪÷瘁焉メу┗マ¢ヤ♀∵フ∨√≫テ∀マ∃≫ツ∧ナ⇔ュ⇔∵カマ∃≫メÅツ\n\nEND\n", + /* 1*/ "ワリ≧dq⊇メ\n", + /* 2*/ "|ワ竄пbhセ\n\nワリ≧dメ┨驍∵⇒⊇マなにト√∨ツ刀ヒメ∈ぷ⇒ノタキメ陪Åツワリ≧dメヨマモテメマ⊆≫q⊇メマ⊇≫≡⊂Åツテメ∈ばぱナヨマ∈ほヌ†≦ケト√∨ュ黽メワリ≧d∨¬マ=ワモ∂фメ驕痺轣モシチ∃≫メÅツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|モ′ワセ\n\nヨママ⊇♪∠掾マリモxヒロq∵⊆≫ツせ∃」べメ∨⊥マ吹ナ⊇ネu∵ョャ∃∋Åツλсdユ∈エ⇔≡ムツヨマ∵せпマほ√∨テ∀∈にワツ≫ョャ⌒⊆エ⇔<シーマ」べニ≫∝ツマモ⊇∩∃⊇メトツ≠ヘミマ艢÷ヨマモdマしヌ∨≡ツ瘁メ$∃ロd♀モ≠煕♭モフ¬ば√∃⊇∩⌒ナ√∃⊇ツ縺橿∈トニマモ≧∧メ⌒メ∈ぱニョャ⌒⊆≫∩⌒ナ√∃⊇ツ\n\n|しじ操セλсdユ∈宦痰サツ≡\n\nxヒマ⊇チ⇒∩⊆≫ヤ℃ワラョクケпメn=リÅδいナ⇔⊇≫Σ刀ヒマλсdユ∈宦痰サツ⇔チ√ツテ√≒∈ムミマ┬∵せマ」べばぱニ√†≧メロd♀モシチ∃≫Å∽⊂ツδいナ⇔⊇≫ヤ℃ワラ∈にツ≫マモ÷ォ縲ハユ∈⊂メÅツ\n\n|しじ逐セ″ハ≠∈づてヌ≡\n\nモミメ≪∵にふ∨≒∃⊇メ♭≧ァメ⊇o∈ぱニメ∵⊇⊇Å∽⊂ツに⇒ツ≫マモIRワヨヒマ∵痺ワÅツモミno⌒サマ≡エ⇔瘁ト√⇔∪≪ト≒マョメコ∃≫モミヨす∠マモ∞サ∈≫ョャ∵⊆≫ツ∪∧≒チワリ≧d∨¬モ=ネテマ″ハ≠∈ロエ⇔⊇≫モÅツ⌒ナ≠ノふ∨≒∃ツ√†♪テ∩マワムハ焉メ浴クニ≫⌒メ∵⊆≫Å∽⊂ツナ∩ナ∧テモ=タ‡ナ⊇iヮ∵∃ト√⇔⊇≫マ⊇∃⊇ツ\n\n|しじ凍セメコ∃≫モミマす\n\nワリ≧dメヨマモメく⌒コ∃≫モミマ⊇≫Å∽⊂ツ∧テヨメ≪モが∩┓∃ハラ∵ト√⇔⊇≫∩⌒ナ√∃⊇ツテテモq⊇メÅツwメわべモト≒マめナ⊇⌒メマ∃≫マ⊇∃⊇ツ\n\n|しじ楳セワリ≧dメヨマ∈ほヌ\n\nヨマ∀メスqÅツヨマモレムヨハラ∈エ⇔ワリ≧dq∈Κルぁニテ∀∵♭タ÷瘁メロd♀モも♭モフ¬ば√∃⊇♭⊆∽⊂ツ瘁クほヌ†≦ケト√∨ュ黽メワリ≧dヨメι・b⌒シチ∃≪÷瘁焉メу┗マ¢ヤ♀∵フ∨√≫テ∀マ∃≫ツ∧ナ⇔ュ⇔∵カマ∃≫メÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nワリ≧dメ┨驍∵⇒⊇マなにト√∨ツ刀ヒメ∈ぷ⇒ノタキメ陪Åツワリ≧dメヨマモテメマ⊆≫q⊇メマ⊇≫≡⊂Åツテメ∈ばぱナヨマ∈ほヌ†≦ケト√∨ュ黽メワリ≧d∨¬マ=ワモ∂фメ驕痺轣モシチ∃≫メÅツ\n\n|ヨヒマ縲マセ\n\n繞怩い\n\n|モ′ワセ\n\nヨママ⊇♪∠掾マリモxヒロq∵⊆≫ツせ∃」べメ∨⊥マ吹ナ⊇ネu∵ョャ∃∋Åツλсdユ∈エ⇔≡ムツヨマ∵せпマほ√∨テ∀∈にワツ≫ョャ⌒⊆エ⇔<シーマ」べニ≫∝ツマモ⊇∩∃⊇メトツ≠ヘミマ艢÷ヨマモdマしヌ∨≡ツ瘁メ$∃ロd♀モ≠煕♭モフ¬ば√∃⊇∩⌒ナ√∃⊇ツ縺橿∈トニマモ≧∧メ⌒メ∈ぱニョャ⌒⊆≫∩⌒ナ√∃⊇ツ\n\n|しじ操セλсdユ∈宦痰サツ≡\n\nxヒマ⊇チ⇒∩⊆≫ヤ℃ワラョクケпメn=リÅδいナ⇔⊇≫Σ刀ヒマλсdユ∈宦痰サツ⇔チ√ツテ√≒∈ムミマ┬∵せマ」べばぱニ√†≧メロd♀モシチ∃≫Å∽⊂ツδいナ⇔⊇≫ヤ℃ワラ∈にツ≫マモ÷ォ縲ハユ∈⊂メÅツ\n\n|しじ逐セ″ハ≠∈づてヌ≡\n\nモミメ≪∵にふ∨≒∃⊇メ♭≧ァメ⊇o∈ぱニメ∵⊇⊇Å∽⊂ツに⇒ツ≫マモIRワヨヒマ∵痺ワÅツモミno⌒サマ≡エ⇔瘁ト√⇔∪≪ト≒マョメコ∃≫モミヨす∠マモ∞サ∈≫ョャ∵⊆≫ツ∪∧≒チワリ≧d∨¬モ=ネテマ″ハ≠∈ロエ⇔⊇≫モÅツ⌒ナ≠ノふ∨≒∃ツ√†♪テ∩マワムハ焉メ浴クニ≫⌒メ∵⊆≫Å∽⊂ツナ∩ナ∧テモ=タ‡ナ⊇iヮ∵∃ト√⇔⊇≫マ⊇∃⊇ツ\n\n|しじ凍セワリ≧dメヨマ∈ほヌ\n\nヨマ∀メスqÅツヨマモレムヨハラ∈エ⇔ワリ≧dq∈Κルぁニテ∀∵♭タ÷瘁メロd♀モも♭モフ¬ば√∃⊇♭⊆∽⊂ツ瘁クほヌ†≦ケト√∨ュ黽メワリ≧dヨメι・b⌒シチ∃≪÷瘁焉メу┗マ¢ヤ♀∵フ∨√≫テ∀マ∃≫ツ∧ナ⇔ュ⇔∵カマ∃≫メÅツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "λсdユ∈宦痰サツ≡\n", + /* 6*/ "″ハ≠∈づてヌ≡\n", + /* 7*/ "メコ∃≫モミマす\n", + /* 8*/ "モd繧槽∈ュ⇔ほヌ\n", + /* 9*/ "ワリ≧dメヨマ∈ほヌ\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "艢ム縲ミム\n", + /* 13*/ "艢ム縲ミム\n", + /* 14*/ "艢ム縲ミム∈みマ√∨\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "λсdユ\n", + /* 23*/ "λсdユ\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "λсdユメ宦痰サツィ、\n", + /* 26*/ "λсdユメ宦痰サツネu∵⊇リニ\n", + /* 27*/ "コxヨメす∵ゥぃト√∨\n", + /* 28*/ "ワリ≧dメコxマすナ∨\n", + /* 29*/ "ワリ≧dメモd繧槽∈ュ⇔ほナ∨\n", + /* 30*/ "テ√モ∞氏メ┓∃ヤ℃ワラマ⊇∃⊇∝ツ\n", + /* 31*/ "テメモミモが∩┓∃$d∈チ≫∝ツ\nコxモぞチマ⊆≪∧⊂ムツ\n", + /* 32*/ "がテ√エワリ≧dメ凰ユ£ンタタ\n", + /* 33*/ "ィ、エ潤テ⊇⇒∈″ハ∀†ヌ†⊇⊇∝ツムツ\n", + /* 34*/ "テテモワリ≧dメコ∃≫陪ツ\n瘁焉マ∀エ⇔θ磨ホ∀テ∽ツ\npテメ陪メく⌒コ∃リ轣マモ\nq⊇メ∵⊆≫∋Åツ\n", + /* 35*/ "♭=ネメコxマが∩χャ∃Χ┻∵⊆≫メタ\n", + /* 36*/ "d∨¬モワリ≧d∀メqツm\nエ∀テテ∈оナ⇔⊇∨∋Åツ\npq⊇メ∵シチ∃√†\nワリ≧dモq⊂Ψb∈シチニツ\npÅ∩≒♪⊂ナ⇔⌒テテ∈\n″ハ⇒¶ナ∨∩エ∨∋Åツ\np∧⊂ニ√†<黽マ┨ふメ\nカ∵┘√≫モ∃∋Åエ\n", + /* 37*/ "オ⊆=テテメ¥ワモヴマしヌ⇔エ\np⊆∃∨モ÷ムミマ┬∈ユ∋♭\nュoテテ∈ε」ナ⇔¬キ⊂Å⊇ツ\n", + /* 38*/ "♭⌒ムミマ┬∵⊇∨ン\nd∵ロリエ⇔⊇∨≒蚕n", + /* 39*/ "∧∋∃ワモ求ト∃⊇∝ツ\n", + /* 40*/ "∂エ∨蚕n", + /* 41*/ "≠ヘミマ艢エ潤ヘミマ艢エ\n", + /* 42*/ "モ′ワエ準モ′ワエ潤テエ¬≡エ\n", + /* 43*/ "⌒⊂θモヤトツト⊆み∈ツ\n」べ∵リリ≫ツ桙氈ナ≡⊂ツ\n", + /* 44*/ "らエ⇔エ盾焉ク¬キ⊂Å⊇エ\n", + /* 45*/ "モ=ホ=ナ÷⇔≡エエ\n", + /* 46*/ "d∈に⇒ツ≫リ♭≦」べ∈\nらエ⇔⊇∨∋Åツト⊆≠レテ⊂ツ\n", + /* 47*/ "レ∈⇒∩リ√∃∩エ∨≒\nンρ≪マ桙氈ナ⇔∨∝ツ\n", + /* 48*/ "⌒¬∽∋ト=ヘミマ艢ツ\n", + /* 49*/ "¬キエ∀項÷マ縺゚エ\n", + /* 50*/ "祉、≫≡ツ\n", + /* 51*/ "q⊇メマが∩トト驕゚\n", + /* 52*/ "」なΣ∵、磨縺ニ醇マム♭タリヌ∋\n", + /* 53*/ "ヨムニ≫∨⊥マ=ワ⊂早ヒメぶマ∈なに\n", + /* 54*/ "♪テÅ香サ<ニモヤ∩香サタ\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/shoP.c b/src/files/lang/jap-final/shoP.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/jap-final/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_f.c b/src/files/lang/jap-final/sho_str_f.c new file mode 100644 index 000000000..d69096fcb --- /dev/null +++ b/src/files/lang/jap-final/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion Skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situ la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, nous pouvons seulement garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Acc馘er au Centre du Sanctuaire\n\nTu dois parcourir et explorer le d馘ale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter une r駸istance acharn馥. Tu vas te d駱lacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Eliminer l'arm馥 Skedar\n\nLe haut commandement maian pense que des soldats skedars sont gard駸 dans des champs de stase l'int駻ieur de cette installation. Si cela est vrai, il faudra les d騁ruire. La derni鑽e chose dont nous avons besoin c'est une arm馥 de fanatiques psychotiques.\n\n|Objectif 5: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 1*/ "AUTEL DE BATAILLE SKEDAR\n", + /* 2*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes skedars se cache dans un Temple de la guerre plac la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, je peux seulement te garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Acc馘er au centre du Sanctuaire\n\nTu dois parcourir et explorer le d馘ale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter une r駸istance acharn馥. Tu vas te d駱lacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes skedars se cache dans un Temple de la guerre situ la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, je peux seulement te garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Identifier les cibles du Temple\n", + /* 6*/ "Activer le pont\n", + /* 7*/ "Acc馘er au centre du sanctuaire\n", + /* 8*/ "D騁ruire l'arm馥 secr鑼e Skedar\n", + /* 9*/ "Assassiner le chef des Skedars\n", + /* 10*/ "Obtenir Vue nocturne.\n", + /* 11*/ "\n", + /* 12*/ "Vue nocturne\n", + /* 13*/ "Vue nocturne\n", + /* 14*/ "Vue nocturne obtenue.\n", + /* 15*/ "Obtenir scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner obtenu.\n", + /* 20*/ "Obtenir Ampli cible.\n", + /* 21*/ "\n", + /* 22*/ "Ampli cible\n", + /* 23*/ "Ampli cible\n", + /* 24*/ "Ampli cible obtenu.\n", + /* 25*/ "Ampli cible positionn correctement.\n", + /* 26*/ "Ampli cible mal positionn.\n", + /* 27*/ "G駭駻ateur activ.\n", + /* 28*/ "Centre du sanctuaire Skedar atteint.\n", + /* 29*/ "Arm馥 secr鑼e Skedar d騁ruite.\n", + /* 30*/ "Ca ressemble un des piliers que je suis cens馥 trouver.\n", + /* 31*/ "Cette zone est plus stable. \nLe sanctuaire doit 黎re proche.\n", + /* 32*/ "OH, NON!!! Une arm馥 skedar en animation suspendue!\n", + /* 33*/ "Tr鑚 bien, il faut trancher la t黎e...le reste p駻ira lentement.\n", + /* 34*/ "Voici le saint des saints des fanatiques skedars. Ils pensent que cette plan鑼e est sacr馥. L'Autel de Bataille est le lieu le plus v駭駻 de cette plan鑼e.\n", + /* 35*/ "Je vois. Cet endroit est sacr pour eux. Mais ce n'est pas tout, il y a autre chose, n'est-ce pas?", + /* 36*/ "En effet. Depuis le temps que les Maians se battent contre les Skedars, nous n'avons jamais pu trouver cet endroit. Sa destruction est la cl de la victoire. Nous avons combattu jusqu' obtenir un cessez-le-feu, mais nous avons toujours 騁 sur nos gardes. La destruction de cet endroit pourra enfin donner une chance la paix.\n", + /* 37*/ "Nous devons 黎re certains qu'aucun fanatique ne survivra. Je vais m'occuper du chef. Il faudra que tu pr駱ares l'armada maian pour pulv駻iser ce satan temple.\n", + /* 38*/ "Il faudra que tu t'enfuies avant les bombardements, nous n'allons pas faire dans le d騁ail.\n", + /* 39*/ "Je ne compte pas vraiment m'騁erniser.\n", + /* 40*/ "Ouiii...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Par ici.\n", + /* 43*/ "Pas de probl鑪e. Attrape mon bras. On va te sortir de l.\n", + /* 44*/ "Non, vite! Donne-moi ton arme!\n", + /* 45*/ "Fous le camp!\n", + /* 46*/ "J'ai r騏ssi retarder le bombardement, la flotte est en attente. Ils vont commencer d鑚 que nous serons partis.\n", + /* 47*/ "Je m'en serais tir馥 si ce gros lourdaud ne m'avait pas attrap le pied.\n", + /* 48*/ "J'en suis sr, Joanna, j'en suis sr.\n", + /* 49*/ "Non, je te dis que je l'aurais fait.\n", + /* 50*/ "Mais je te crois.\n", + /* 51*/ "Fais tes pri鑽es au dieu de la guerre.\n", + /* 52*/ "Plus de grenades - Impossible d'entrer dans le Temple.\n", + /* 53*/ "Autre acc鑚 au Temple cr鳬.\n", + /* 54*/ "O es-tu? Tout va bien?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_g.c b/src/files/lang/jap-final/sho_str_g.c new file mode 100644 index 000000000..ec4420891 --- /dev/null +++ b/src/files/lang/jap-final/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth fhrt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gl舫big.\n\n|4. Ziel: - Vernichten Sie die geheime Skedar-Armee!\n\nDas Hohe Kommando der Maianer vermutet, dass eine gro゚e Anzahl von sich in Stasis befindlichen Skedar an geheimen Orten untergebracht ist. Der Schrein knnte einer dieser Orte sein. Wenn das der Fall ist, muss er zerstrt werden. Das Letzte, was wir jetzt brauchen knnen, ist ein nicht enden wollender Strom von psychotischen Fanatikern.\n\n|5. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth fhrt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gl舫big.\n\n|4. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Identifizieren Sie die Ziele!\n", + /* 6*/ "Aktivieren Sie die Brcke!\n", + /* 7*/ "Gelangen Sie in den inneren Bereich!\n", + /* 8*/ "Vernichten Sie die geheime Armee!\n", + /* 9*/ "Eliminieren Sie den Anfhrer!\n", + /* 10*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 11*/ "\n", + /* 12*/ "Nachtsichtger舩\n", + /* 13*/ "Nachtsichtger舩\n", + /* 14*/ "Nachtsichtger舩 aufgenommen\n", + /* 15*/ "Erlangen Sie den Scanner!\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner aufgenommen\n", + /* 20*/ "Erlangen Sie das Peilger舩!\n", + /* 21*/ "\n", + /* 22*/ "Peilger舩\n", + /* 23*/ "Peilger舩\n", + /* 24*/ "Peilger舩 aufgenommen\n", + /* 25*/ "Peilger舩 wurde korrekt platziert.\n", + /* 26*/ "Peilger舩 wurde nicht korrekt platziert.\n", + /* 27*/ "Generator wurde reaktiviert.\n", + /* 28*/ "Der innere Bereich des Schreins wurde erreicht.\n", + /* 29*/ "Die geheime Skedar-Armee wurde vernichtet.\n", + /* 30*/ "Das scheint eine der drei S舫len zu sein.\n", + /* 31*/ "Die Stromversorgung in diesem Bereich wird immer konstanter. \nDer innere Bereich kann nicht weit entfernt sein.\n", + /* 32*/ "OH NEIN!!! Die geheime Armee befindet sich tats臘hlich in dem Schrein!\n", + /* 33*/ "Okay, es muss sein... Wenn der Kopf abgeschnitten wird, \nstirbt auch der Krper.\n", + /* 34*/ "Dies ist der heiligste Ort der Skedar. Der Planet scheint ihr heiliges Land zu sein. Der Schrein befindet sich am heiligsten Ort dieses heiligen Planeten.\n", + /* 35*/ "Lass mich mal resmieren: Hier ist es heilig. Aber das kann noch nicht alles sein, oder?\n", + /* 36*/ "Stimmt. In all der Zeit, in der die Maianer gegen die Skedar gek舂pft haben, konnten wir diesen Ort nicht ausfindig machen. Wir wussten, dass, solange dieser Ort besteht, der Krieg niemals enden wrde. Zwar konnten wir einen Waffenstillstand erzielen, mussten aber trotzdem stets wachsam sein. Die Zerstrung des Schreins w舐e eine Chance, wieder Frieden zu erlangen.\n", + /* 37*/ "Also mssen wir dafr sorgen, dass kein Skedar berlebt. Ich gehe rein und kmmere mich um den Anfhrer, und du koordinierst inzwischen den Angriff der Maianischen Flotte.\n", + /* 38*/ "Aber wenn du nicht rechtzeitig von dort verschwindest, hast du keine Chance.\n", + /* 39*/ "Das ist ein Fehler, den ich nicht begehen werde.\n", + /* 40*/ "Jaaa...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Hier drben!\n", + /* 43*/ "OK! Halt dich an mir fest! Wir bringen dich sofort hier raus.\n", + /* 44*/ "Nein! Rasch! Gib mir eine Waffe!\n", + /* 45*/ "Lass! Mich! Endlich! In! Frieden!!!\n", + /* 46*/ "Ich konnte das Bombardement der Flotte einstellen, um nach dir zu suchen. Der Angriff geht weiter, wenn wir hier raus sind.\n", + /* 47*/ "Ich h舩te es rechtzeitig geschafft, wenn mich der Kerl hier nicht erwischt h舩te.\n", + /* 48*/ "Natrlich, Joanna, natrlich.\n", + /* 49*/ "Ich h舩te es geschafft!\n", + /* 50*/ "Ich glaube dir.\n", + /* 51*/ "Bring dem Gott des Krieges dein Opfer dar!\n", + /* 52*/ "Granaten verbraucht - Zutritt unmglich.\n", + /* 53*/ "Es wurde ein alternativer Eingang erschaffen.\n", + /* 54*/ "Wo bist du? Bist du verletzt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_i.c b/src/files/lang/jap-final/sho_str_i.c new file mode 100644 index 000000000..ae79fe392 --- /dev/null +++ b/src/files/lang/jap-final/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che stato danneggiato, ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Distruggi l'esercito segreto Skedar \n\nIl Comandante Supremo Maian sospetta la presenza di altri guerrieri Skedar conservati in stasi in luoghi a noi ignoti e questo potrebbe essere uno di quelli, perci lo dovrai distruggere. L'ultima cosa di cui abbiamo bisogno ora un'orda di fanatici psicotici.\n\n|Obiettivo 5: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente regner la pace!\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA SKEDAR\n", + /* 2*/ "|Situazione:\n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che stato danneggiato, ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sar la pace!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che stato danneggiato, ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sar la pace!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Identifica gli obiettivi nel tempio\n", + /* 6*/ "Attiva il ponte retrattile\n", + /* 7*/ "Trova l'accesso al Santuario Interno\n", + /* 8*/ "Distruggi l'esercito segreto Skedar\n", + /* 9*/ "Elimina il capo degli Skedar\n", + /* 10*/ "Procurati Vista Notturna.\n", + /* 11*/ "\n", + /* 12*/ "Vista Notturna\n", + /* 13*/ "Vista Notturna\n", + /* 14*/ "Presa Vista Notturna.\n", + /* 15*/ "Procurati scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Preso scanner.\n", + /* 20*/ "Procurati bersaglio.\n", + /* 21*/ "\n", + /* 22*/ "Bersaglio\n", + /* 23*/ "Bersaglio\n", + /* 24*/ "Preso bersaglio.\n", + /* 25*/ "Bersaglio piazzato correttamente.\n", + /* 26*/ "Bersaglio in posizione errata.\n", + /* 27*/ "Il generatore stato riattivato.\n", + /* 28*/ "Raggiunto Santuario Interno Skedar.\n", + /* 29*/ "Distrutto esercito segreto Skedar.\n", + /* 30*/ "Questo sembra uno degli obelischi.\n", + /* 31*/ "Qui il campo energetico sembra pi costante. \nIl Santuario Interno non pu essere lontano.\n", + /* 32*/ "OH, NO!!! Un esercito Skedar in stato di morte apparente!\n", + /* 33*/ "Benissimo, ecco fatto! Mozzandogli il capo \nil corpo morir!\n", + /* 34*/ "Questo il luogo pi SACRO per quei fanatici degli Skedar! Credono che questo pianeta sia SACRO ed inviolabile. Il Tempio di Guerra si trova nella parte pi SACRA di questo pianeta SACRO!\n", + /* 35*/ "Fammi capire bene... Ma, allora SACRO! Per c' anche dell'altro, vero?\n", + /* 36*/ "S! In tutto il tempo che noi Maian abbiamo lottato contro gli Skedar non siamo mai riusciti a scoprire questo posto. Sapevamo che la guerra non sarebbe mai finita finch non fosse stato distrutto: abbiamo costretto gli Skedar a una tregua, li abbiamo piegati a cessare il fuoco, ma comunque non potevamo mai abbassare la guardia. La distruzione di questo posto implicher una pace vera! \n", + /* 37*/ "Allora dobbiamo accertarci che non ci sfugga nessun fanatico: io entro e porto fuori il capo; tu chiami a raccolta la flotta Maian per radere al suolo il tempio!\n", + /* 38*/ "Se ti trovi ancora in giro quando fa irruzione la flotta, non avrai pi possibilit di salvezza!\n", + /* 39*/ "ネ un errore che intendo evitare!\n", + /* 40*/ "Proprio cos...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Da questa parte!\n", + /* 43*/ "Nessun problema! Afferra il mio braccio! Ti tireremo fuori in un batter d'occhio!\n", + /* 44*/ "No, presto! Dammi la pistola!\n", + /* 45*/ "VUOI LASCIARMI ANDARE?! PER LA MISERIA?!!\n", + /* 46*/ "La flotta ha interrotto il bombardamento per darmi il tempo di trovarti. Andranno avanti non appena saremo fuori di qui!\n", + /* 47*/ "Sarei riuscita a svignarmela in tempo, se quello non mi si fosse aggrappato al piede!\n", + /* 48*/ "Ma certo, Joanna, naturalmente!\n", + /* 49*/ "No, veramente!!!\n", + /* 50*/ "S, s, ti credo!\n", + /* 51*/ "Compi il tuo sacrificio in onore del Dio della Guerra.\n", + /* 52*/ "Granate esaurite - Impossibile entrare nel tempio.\n", + /* 53*/ "Creata entrata alternativa al tempio.\n", + /* 54*/ "Dove sei? Sei ferita?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_s.c b/src/files/lang/jap-final/sho_str_s.c new file mode 100644 index 000000000..1a2f061dd --- /dev/null +++ b/src/files/lang/jap-final/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos en el Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca a trav駸 del laberinto de corredores subterr疣eos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fan疸ica. ノste es un templo a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Destruir el Ej駻cito Secreto Skedar\n\nEl Alto Comando Maian sospecha que m疽 guerreros Skedar est疣 en estado de hibernacin en lugares desconocidos. ノste puede ser uno de esos lugares. Si as es, destryelos. La ltima cosa que necesitamos es enfrentarnos a una oleada de refuerzos sicticos.\n\n|Objetivo Cinco: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca en el laberinto de corredores subterr疣eos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fan疸ica. ノste es un templo dedicado a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Posicionar blancos en el templo\n", + /* 6*/ "Activar el puente\n", + /* 7*/ "Acceder al Interior Sacro\n", + /* 8*/ "Destruir ej駻cito secreto Skedar\n", + /* 9*/ "Eliminar al lder Skedar\n", + /* 10*/ "Obt駭 la Visin Nocturna.\n", + /* 11*/ "\n", + /* 12*/ "V. Nocturna\n", + /* 13*/ "Visin Nocturna\n", + /* 14*/ "Visin Nocturna obtenida.\n", + /* 15*/ "Obt駭 el Esc疣er.\n", + /* 16*/ "\n", + /* 17*/ "Esc疣er\n", + /* 18*/ "Esc疣er\n", + /* 19*/ "Esc疣er obtenido.\n", + /* 20*/ "Obt駭 el Amplificador de Blancos.\n", + /* 21*/ "\n", + /* 22*/ "Amplificador\n", + /* 23*/ "Amplificador\n", + /* 24*/ "Amplificador de Blancos obtenido.\n", + /* 25*/ "Amplificador colocado correctamente.\n", + /* 26*/ "Amplificador colocado incorrectamente.\n", + /* 27*/ "El Generador ha sido reactivado.\n", + /* 28*/ "El Interior Sacro Skedar ha sido alcanzado.\n", + /* 29*/ "El ej駻cito secreto Skedar ha sido derrotado.\n", + /* 30*/ "ノste parece ser uno de los pilares especiales.\n", + /* 31*/ "La energa es m疽 constante en este 疵ea. \nEl Interior Sacro no puede estar muy lejos.\n", + /* 32*/ "。。。OH, NO!!! 。Un ej駻cito Skedar en animacin suspendida!\n", + /* 33*/ "Vale, entonces... Cort駑osle la cabeza y el \ncuerpo perecer.\n", + /* 34*/ "ノste es el lugar m疽 sagrado de los fan疸icos Skedar. Ellos creen que este planeta es tierra sagrada. El Templo de Batalla est situado en la parte m疽 sagrada de este 'santo' planeta.\n", + /* 35*/ "A ver si me aclaro. Es sagrado, ソno? Pero hay bastante m疽 que eso, ソno es as?\n", + /* 36*/ "S. En todo el tiempo que los Maian hemos luchado contra los Skedar, no encontramos este lugar. Sabamos que hasta que no fuera destruido, la guerra no terminara. Luchamos con los Skedar hasta llegar a un punto muerto donde obtuvimos un alto el fuego, pero hay que estar en guardia. La destruccin de este lugar puede significar una paz verdadera.\n", + /* 37*/ "As que tenemos que asegurarnos de que ningn fan疸ico sobreviva. Entrar a por el lder. Tu tienes que traer a la flota Maian para derribar el Templo.\n", + /* 38*/ "Si est疽 en tierra cuando la flota llegue aqu, no tendr疽 ninguna oportunidad.\n", + /* 39*/ "ノse es un error que no pienso cometer.\n", + /* 40*/ "Siii...\n", + /* 41*/ "。Joanna! 。Joanna! \n", + /* 42*/ "。Elvis! 。Elvis! Aqu.\n", + /* 43*/ "Ningn problema. Ag疵rate a mis brazos. Te sacar enseguida.\n", + /* 44*/ "。No, r疳ido! 。Dame tu arma!\n", + /* 45*/ "。Quieres! 。Soltarme! 。De! 。Una! 。Vez!\n", + /* 46*/ "He podido detener el bombardeo de la flota mientras te buscaba. Empezar疣 de nuevo cuando estemos a salvo.\n", + /* 47*/ "Hubiera salido a tiempo si ese m... no me hubiera cogido del pie.\n", + /* 48*/ "Por supuesto, Joanna, por supuesto.\n", + /* 49*/ "No, de verdad.\n", + /* 50*/ "Te creo.\n", + /* 51*/ "Haz tu sacrificio al Dios de la Guerra.\n", + /* 52*/ "Granadas utilizadas. No puedes entrar al Templo.\n", + /* 53*/ "Creada entrada alternativa al Templo.\n", + /* 54*/ "ソDnde est疽? ソEst疽 herida?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/siloE.c b/src/files/lang/jap-final/siloE.c similarity index 100% rename from src/files/lang/siloE.c rename to src/files/lang/jap-final/siloE.c diff --git a/src/files/lang/siloJ.c b/src/files/lang/jap-final/siloJ.c similarity index 100% rename from src/files/lang/siloJ.c rename to src/files/lang/jap-final/siloJ.c diff --git a/src/files/lang/siloP.c b/src/files/lang/jap-final/siloP.c similarity index 100% rename from src/files/lang/siloP.c rename to src/files/lang/jap-final/siloP.c diff --git a/src/files/lang/silo_str_f.c b/src/files/lang/jap-final/silo_str_f.c similarity index 100% rename from src/files/lang/silo_str_f.c rename to src/files/lang/jap-final/silo_str_f.c diff --git a/src/files/lang/silo_str_g.c b/src/files/lang/jap-final/silo_str_g.c similarity index 100% rename from src/files/lang/silo_str_g.c rename to src/files/lang/jap-final/silo_str_g.c diff --git a/src/files/lang/silo_str_i.c b/src/files/lang/jap-final/silo_str_i.c similarity index 100% rename from src/files/lang/silo_str_i.c rename to src/files/lang/jap-final/silo_str_i.c diff --git a/src/files/lang/silo_str_s.c b/src/files/lang/jap-final/silo_str_s.c similarity index 100% rename from src/files/lang/silo_str_s.c rename to src/files/lang/jap-final/silo_str_s.c diff --git a/src/files/lang/statE.c b/src/files/lang/jap-final/statE.c similarity index 100% rename from src/files/lang/statE.c rename to src/files/lang/jap-final/statE.c diff --git a/src/files/lang/jap-final/statJ.c b/src/files/lang/jap-final/statJ.c new file mode 100644 index 000000000..2a55d8497 --- /dev/null +++ b/src/files/lang/jap-final/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nムミマ┬モ」べ∈┏ナ÷ムミマメ£窶ラ゚d∨¬∵メロ≒√≠ヒロqメヤヒ驕諢ラリト√∨ツ舮ムワヨヒ蛟マロワ窶∵оナナ∨∀テ∽マ≡≫∀÷ワリ≧dヨマメラdマ∵リÅメ⇒⊇⇔⊇≫≡⊂Åツ\n\n|しじ操セヨマメラdマ∈ほヌ\n\nテメワリ≧dヨマメラdマモ=ヘミマ艨諤ヨマ∈べ¬ほナ⇔ニ∬マづてト√∨ツοンπ♭モ掾メヨマラ♪♭モ∃⊇∵÷瘁諤ワリ≧dメケス∈・⊇≫b∈ぷ⇒掾マ<早ナエ⇔ナリ⊂メÅツ\n\n|しじ逐セヨマメラdマ茶レ∈ほヌ\n\nヨマメラdマ∵=ワ⊂燥浴サ∨エ準ワリ≧dラdマメ凰ユ£ンメあ煤>ンマ仲浴メラdマ∵づてト√∨≡⊂Åツルム瘁メぶ∵嚊宦マ父ニ≫ン∵┠∩エ∨=゚≪∀∃エ⇔⊇≫ツルム瘁クほヌ†=ンエ∀∵ュ⇔ヱ⊃≫Å∽⊂ツ\n\n|しじ凍セヨマメラdマ塔レ∈ほヌ\n\n⊇∂d=ニリ∋ニリ∋ツ島淀浴メラdマ∵⊇∨≡⊂Åツムミマ┬メ」べメ∨⊥マ≠モメば閨諱コリ≪マ⌒めナチ≠艪メワヨヒ艪п諱シリチδいナ⇔⊇∃∩エ∨≒ナ⊇ツ∀=ヘ≪⊆⊃÷ルム瘁謔モニ√ぴエ⇔⊇≫∨⊥≠ェ∀ナ⇔⌒ほト∃チ⇔モエ\n\nEND\n", + /* 1*/ "q⊇メ\n", + /* 2*/ "|ワ竄пbhセ\n\nムミマ┬モ」べ∈┏ナ÷ムミマメ£窶ラ゚d∨¬∵メロ≒√≠ヒロqメヤヒ驕諢ラリト√∨ツ舮ムワヨヒ蛟マロワ窶∵оナナ∨∀テ∽マ≡≫∀÷ワリ≧dヨマメラdマ∵リÅメ⇒⊇⇔⊇≫≡⊂Åツ\n\n|しじ操セヨマメラdマ∈ほヌ\n\nテメワリ≧dヨマメラdマモ=ヘミマ艨諤ヨマ∈べ¬ほナ⇔ニ∬マづてト√∨ツοンπ♭モ掾メヨマラ♪♭モ∃⊇∵÷瘁諤ワリ≧dメケス∈・⊇≫b∈ぷ⇒掾マ<早ナエ⇔ナリ⊂メÅツ\n\n|しじ逐セヨマメラdマ茶レ∈ほヌ\n\nヨマメラdマ∵=ワ⊂燥浴サ∨エ準ワリ≧dラdマメ凰ユ£ンメあ煤>ンマ仲浴メラdマ∵づてト√∨≡⊂Åツルム瘁メぶ∵嚊宦マ父ニ≫ン∵┠∩エ∨=゚≪∀∃エ⇔⊇≫ツルム瘁クほヌ†=ンエ∀∵ュ⇔ヱ⊃≫Å∽⊂ツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nムミマ┬モ」べ∈┏ナ÷ムミマメ£窶ラ゚d∨¬∵メロ≒√≠ヒロqメヤヒ驕諢ラリト√∨ツ舮ムワヨヒ蛟マロワ窶∵оナナ∨∀テ∽マ≡≫∀÷ワリ≧dヨマメラdマ∵リÅメ⇒⊇⇔⊇≫≡⊂Åツ\n\n|しじ操セヨマメラdマ∈ほヌ\n\nテメワリ≧dヨマメラdマモ=ヘミマ艨諤ヨマ∈べ¬ほナ⇔ニ∬マづてト√∨ツοンπ♭モ掾メヨマラ♪♭モ∃⊇∵÷瘁諤ワリ≧dメケス∈・⊇≫b∈ぷ⇒掾マ<早ナエ⇔ナリ⊂メÅツ\n\nEND\n", + /* 4*/ "ヨマメラdマ∈ほヌ\n", + /* 5*/ "ヨマメラdマ茶レ∈ほヌ\n", + /* 6*/ "ヨマメラdマ塔レ∈ほヌ\n", + /* 7*/ "ムミマメd≧d∵ほト√∨エ\n", + /* 8*/ "ワリ≧dヨマメラdマ∈ほナ∨エ\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/statP.c b/src/files/lang/jap-final/statP.c similarity index 100% rename from src/files/lang/statP.c rename to src/files/lang/jap-final/statP.c diff --git a/src/files/lang/jap-final/stat_str_f.c b/src/files/lang/jap-final/stat_str_f.c new file mode 100644 index 000000000..d29db6670 --- /dev/null +++ b/src/files/lang/jap-final/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'arm馥 skedar.\n\n|Objectif 2: - R馮icide Acte deux\n\nIl y a un autre clone! Un d馭aut de fonctionnement des cuves g駭itrices a provoqu l'activation simultan馥 de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son fr鑽e. Une fois que vous l'aurez d騁ruit, la menace sera 馗art馥.\n\n|Objectif 3: - R馮icide Acte trois\n\nPardon, d駸ol, il y a un troisi鑪e Roi. Nos d騁ecteurs n'ont pu le rep駻er auparavant en raison de fortes perturbations dues aux bombardements massifs de la flotte. Ce Roi est mieux pr駱ar que les deux autres, il est imp駻atif qu'il soit 駘imin dans les plus brefs d駘ais. D駱鹹hez-vous, il ne faut pas qu'il rassemble ses arm馥s.\n\nFIN\n", + /* 1*/ "AUTEL DE COMBAT\n", + /* 2*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'arm馥 skedar.\n\n|Objectif 2: - R馮icide Acte deux\n\nIl y a un autre clone! Un d馭aut de fonctionnement des cuves g駭itrices a provoqu l'activation simultan馥 de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son fr鑽e. Une fois que vous l'aurez d騁ruit, la menace sera 馗art馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne regroupe les restes de l'arm馥 skedar.\n\nFIN\n", + /* 4*/ "Tuer Roi skedar\n", + /* 5*/ "Tuer Roi skedar 2\n", + /* 6*/ "Tuer Roi skedar 3\n", + /* 7*/ "Le Dirigeant maian a 騁 tu.\n", + /* 8*/ "Le Roi skedar a 騁 tu.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/stat_str_g.c b/src/files/lang/jap-final/stat_str_g.c new file mode 100644 index 000000000..ca69f207e --- /dev/null +++ b/src/files/lang/jap-final/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Knigsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Beh舁ter hat dazu gefhrt, dass zwei Knige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gef臧rlicher ist. Wird er eliminiert, ist die Bedrohung vorber.\n\n|3. Ziel: - Knigsmord Teil Drei\n\nEs tut uns leid, aber es sieht so aus, als g臙e es noch einen dritten Knig. Aufgrund der starken Interferenzen nach dem Bombardement, konnten ihn unsere Scanner nicht erfassen. Dieser Knig konnte sich noch weiter entwickeln, als die beiden anderen. Das bedeutet, dass er noch gef臧rlicher ist. Die Notwendigkeit, ihn zu eliminieren, ist daher noch gr゚er.\n\nENDE\n", + /* 1*/ "KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Knigsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Beh舁ter hat dazu gefhrt, dass zwei Knige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gef臧rlicher ist. Wird er eliminiert, ist die Bedrohung vorber.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\nENDE\n", + /* 4*/ "Vernichten Sie den Skedar-Knig!\n", + /* 5*/ "Vernichten Sie den Skedar-Knig 2!\n", + /* 6*/ "Vernichten Sie den Skedar-Knig 3!\n", + /* 7*/ "Der Maianische Anfhrer wurde eliminiert.\n", + /* 8*/ "Der Skedar-Knig wurde eliminiert.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/stat_str_i.c b/src/files/lang/jap-final/stat_str_i.c new file mode 100644 index 000000000..4294e1bfc --- /dev/null +++ b/src/files/lang/jap-final/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto pi tempo per ambientarsi e per questo motivo anche pi pericoloso. Una volta che lo avrai eliminato la minaccia non sussister pi.\n\n|Obiettivo 3: - Regicidio - Parte terza\n\nMi rincresce doverti comunicare che esiste un terzo clone del re. I nostri scanner hanno incontrato difficolt nel riconoscerlo a causa delle forti interferenze della superficie dovute alla veemenza dei bombardamenti. Attenzione questo re pi pericoloso degli altri due! ネ pertanto di vitale importanza che venga soppresso al pi presto.\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA\n", + /* 2*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto pi tempo per ambientarsi e per questo motivo anche pi pericoloso. Una volta che lo avrai eliminato la minaccia non al pi presto.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra al pi presto.\n\nFINE\n", + /* 4*/ "Uccidi il re degli Skedar\n", + /* 5*/ "Uccidi il 2ー re degli Skedar\n", + /* 6*/ "Uccidi il 3ー re degli Skedar\n", + /* 7*/ "Il capo dei Maian stato ucciso.\n", + /* 8*/ "Il re degli Skedar stato ucciso.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/stat_str_s.c b/src/files/lang/jap-final/stat_str_s.c new file mode 100644 index 000000000..4aaf6f579 --- /dev/null +++ b/src/files/lang/jap-final/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n。Hay otro clon! Un fallo en los tanques de clonacin Skedar hizo que dos Reyes fueran activados al mismo tiempo. ノste ha tenido m疽 tiempo para aclimatarse, por lo tanto es m疽 peligroso. Una vez sea destruido, la amenaza habr terminado.\n\n|Objetivo Tres: - Regicidio Parte Tres\n\nPerdn, perdn... Parece que existe un tercer Rey. Nuestros esc疣eres han tenido problemas de deteccin debido a la enorme cantidad de perturbaciones causadas por el bombardeo de la flota. A causa de ello, este Rey est m疽 preparado que los otros dos; esto hace que sea vital que el Rey sea destruido.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA\n", + /* 2*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n。Hay otro clon! Un fallo en los tanques de clonacin Skedar hizo que dos Reyes fueran activados al mismo tiempo. ノste ha tenido m疽 tiempo para aclimatarse, por lo tanto es m疽 peligroso. Una vez sea destruido, la amenaza habr terminado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\nFIN\n", + /* 4*/ "Eliminar al Rey Skedar.\n", + /* 5*/ "Eliminar al Rey Skedar 2.\n", + /* 6*/ "Eliminar al Rey Skedar 3.\n", + /* 7*/ "El lder Maian ha muerto.\n", + /* 8*/ "El Rey Skedar ha muerto.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/titleE.c b/src/files/lang/jap-final/titleE.c new file mode 100644 index 000000000..bdb8fdaad --- /dev/null +++ b/src/files/lang/jap-final/titleE.c @@ -0,0 +1,200 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", + /*184*/ "ncl staff\n", + /*185*/ "s. miyamoto\n", + /*186*/ "k. miki\n", + /*187*/ "s. kojoh\n", + /*188*/ "y. nakano\n", + /*189*/ "k. yamaguchi\n", + /*190*/ "k. terasaki\n", + /*191*/ "m. goto\n", + /*192*/ "super mario club\n", + /*193*/ NULL, + /*194*/ NULL, + /*195*/ NULL, +}; diff --git a/src/files/lang/jap-final/titleJ.c b/src/files/lang/jap-final/titleJ.c new file mode 100644 index 000000000..bdb8fdaad --- /dev/null +++ b/src/files/lang/jap-final/titleJ.c @@ -0,0 +1,200 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", + /*184*/ "ncl staff\n", + /*185*/ "s. miyamoto\n", + /*186*/ "k. miki\n", + /*187*/ "s. kojoh\n", + /*188*/ "y. nakano\n", + /*189*/ "k. yamaguchi\n", + /*190*/ "k. terasaki\n", + /*191*/ "m. goto\n", + /*192*/ "super mario club\n", + /*193*/ NULL, + /*194*/ NULL, + /*195*/ NULL, +}; diff --git a/src/files/lang/jap-final/titleP.c b/src/files/lang/jap-final/titleP.c new file mode 100644 index 000000000..4e6c21f3e --- /dev/null +++ b/src/files/lang/jap-final/titleP.c @@ -0,0 +1,200 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", + /*184*/ NULL, + /*185*/ NULL, + /*186*/ NULL, + /*187*/ NULL, + /*188*/ NULL, + /*189*/ NULL, + /*190*/ NULL, + /*191*/ NULL, + /*192*/ NULL, + /*193*/ NULL, + /*194*/ NULL, + /*195*/ NULL, +}; diff --git a/src/files/lang/jap-final/title_str_f.c b/src/files/lang/jap-final/title_str_f.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/jap-final/title_str_f.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/jap-final/title_str_g.c b/src/files/lang/jap-final/title_str_g.c new file mode 100644 index 000000000..37e3b0196 --- /dev/null +++ b/src/files/lang/jap-final/title_str_g.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "waffen und visuelle hhepunkte\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "bewegung und erschtterung\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality-techniker\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs der zukunft\n", + /* 11*/ "chris darling\n", + /* 12*/ "waffenspezialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grauzonen\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "locations und stimmen\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manisch-walisischer designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "hintergrnde\n", + /* 27*/ "martin penny\n", + /* 28*/ "maestro grande\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "der maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dynamische backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "die schrecklichen vier\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trents vasallen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "stimmen in der dunkelheit\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techniker\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hardware-support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'ich falleeeee' fell\n", + /* 91*/ "doug 'duck dich' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminatoren\n", + /* 94*/ "huw ward\n", + /* 95*/ "david wong\n", + /* 96*/ "adam munton\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dunkle kommandanten\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in der sonne\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "der perfekte kern\n", + /*129*/ "- dunkler als du\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfekte rechtschreibung\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark fr immer\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/jap-final/title_str_i.c b/src/files/lang/jap-final/title_str_i.c new file mode 100644 index 000000000..32d6fc491 --- /dev/null +++ b/src/files/lang/jap-final/title_str_i.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armi e orgasmi visivi\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "muovi e sbatti\n", + /* 7*/ "darkmark\n", + /* 8*/ "tecnico effetti reali\n", + /* 9*/ "chris tilston\n", + /* 10*/ "design futuristico\n", + /* 11*/ "chris darling\n", + /* 12*/ "specialista armi\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "area grigia\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "dio di voci e luoghi\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "designer galles-mania\n", + /* 25*/ "ross bury\n", + /* 26*/ "sfondi bionici\n", + /* 27*/ "martin penny\n", + /* 28*/ "guru suoni\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "musica, maestro! \n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "sfondi dinamici\n", + /* 35*/ "cecchini dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "i terribili quattro\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "gli scagnozzi di trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voci al buio\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "tecnici ci\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "supporto hardware\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "squadra dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "fermo immagine\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "tra le immagini\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "sterminatori rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandanti dark\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare alla luce del sole\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "verifica prodotto (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "verifica prodotto (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "il cuore perfect\n", + /*129*/ "-pi buio di te!\n", + /*130*/ "la casa nell'albero\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "ortografia perfect\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark e pd device\n", + /*147*/ "sono trademark\n", + /*148*/ "rare\n", + /*149*/ "design del futuro\n", + /*150*/ "perfect dark per sempre\n", + /*151*/ "verifica prodotto (noe)\n", + /*152*/ "supervisore\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "aiuto supervisore\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinatori\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "redattore\n", + /*160*/ "aiuto redattore\n", + /*161*/ "aiuto redattori\n", + /*162*/ "localizzazione (francese)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localizzazione (tedesco)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localizzazione (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localizzazione (spagnolo)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localizzazione\n", + /*178*/ "coordinatore prodotto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisore prodotto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "manager localizzazione prodotto\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/jap-final/title_str_s.c b/src/files/lang/jap-final/title_str_s.c new file mode 100644 index 000000000..69567bb3c --- /dev/null +++ b/src/files/lang/jap-final/title_str_s.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armas y orgasmos visuales\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mueve y menea\n", + /* 7*/ "darkmark\n", + /* 8*/ "ingeniero de animacin\n", + /* 9*/ "chris tilston\n", + /* 10*/ "diseos futuristas\n", + /* 11*/ "chris darling\n", + /* 12*/ "especialista en armas\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "zona gris\n", + /* 15*/ "b jones\n", + /* 16*/ "culto al cuerpo\n", + /* 17*/ "steve malpass\n", + /* 18*/ "lugares perfectos\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "hombre bien empaquetado\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manaco diseador gal駸\n", + /* 25*/ "ross bury\n", + /* 26*/ "escenarios binicos\n", + /* 27*/ "martin penny\n", + /* 28*/ "to del sonido\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "maestro musical\n", + /* 31*/ "david clynick\n", + /* 32*/ "incondicional del ruido\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "artista de escenarios\n", + /* 35*/ "francotiradores dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "los cuatro terribles\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "secuaces de trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voces en la oscuridad\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "t馗nicos ic\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "soporte hard\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "equipo dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "captura de movimientos\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "en movimiento\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "exterminadores rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandantes oscuros\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare en el sol\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testeo (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testeo (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "el ncleo perfecto\n", + /*129*/ "- m疽 oscuro que t -\n", + /*130*/ "casa en el tronco\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "deletreo perfecto\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark y el dispositivo pd\n", + /*147*/ "son marcas registradas\n", + /*148*/ "rare\n", + /*149*/ "diseando el futuro\n", + /*150*/ "perfect dark es para siempre\n", + /*151*/ "testeo (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "vicesupervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinadores\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "traductor principal\n", + /*160*/ "traductor asistente\n", + /*161*/ "traductores asistentes\n", + /*162*/ "localizacin (franc駸)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localizacin (alem疣)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localizacin (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localizacin (espaol)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia & ruth\n", + /*177*/ "localizacin\n", + /*178*/ "coordinador producto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisora producto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "director dpto. localizacin\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/traE.c b/src/files/lang/jap-final/traE.c similarity index 100% rename from src/files/lang/traE.c rename to src/files/lang/jap-final/traE.c diff --git a/src/files/lang/jap-final/traJ.c b/src/files/lang/jap-final/traJ.c new file mode 100644 index 000000000..43785c22d --- /dev/null +++ b/src/files/lang/jap-final/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\nレ└∵⊆≫メモ∝∩エ⇔≫=ヘミマ艢ツぉ∵トタラ♪νツ∨焉ト∃マ♀モ÷ムミマ∀⊇⊂ラリメモムミマÅツべ¬ぺ∀ト√∨γぼδマぢナ⇔⊇∨メムミマ∨¬モx艫ニ♭⊆エ∨ツν∩エ∨ぽモ=ネメ¥♂ニd♀Åエ∨メÅツ祉普モテメチ≒⊇♭ツ∀⌒∩チロ騾エ\n\n|しじ操セ翌トみはu∈なにヌ≡\n\nムミマメマモ÷ヤd縲ヤ%∀ユ†√≫くけミメ翌トみはu∵┥リ√⇔⊇∨ツテ√モムミマΚれマ┤♯⊇⇔をト√⇔⊇≫メ♭≠ロ∈νツ≫マモテ√∵く⌒レチ⇔せпツテ√モメケ∵⊇∩=ワナチモрщヨマсァ=マざ†√∨ミム窶メmマ⊆≫モ∃メ♭>ナぁナ⇔セナ⊇ツ\n\n|しじ逐セ≠ヘ艢レマ∀ホ焉ヌ≡\n\n≠ヘ艢レマモk∵°∧⊂マ∃エ⇔∪≪=ニ∬マ⌒ロリ≪∧⊂Å∀ナ⇔タ⇔⊇≫ツぽ∵iヮsマに⇒∩≫掾マ≠ァ∵оナふ⇔≫メÅツ\n\n|しじ凍セオカ私チハヨムヌ≡\n\n≠ヘ艢レマモ<普リ♭∧メk∈゙ニ∨⊥マオカ私チハマぞ♯ツ∃⊇♭⊇∨ツナ∩ナ<普ン∧∋∃фtモシヨÅツ≠ヘ艢レマ∵私チハヨメ♀ミ∈ばぱニ≫メ♭=ネメぽ∈ニ≫メÅツゆeメ栫ル♭モ≧ンれアメムミマ∵∧テマ⊆≫モÅツ\n\n|しじ楳セムミマ∈翌瘁ロトヌ≡\n\n°d℃ハ♀モ=コ⇒∩⊇マチ⊇∩≒≠桙气掾マヤd縲ヤ%∈エ⇔÷ムミマメぽ∈づテナ⇔∪チメÅツぽ∵浴クゃリヌ†÷ムミマ∈怨梶ナ⇔÷モミ斧早ソ≒桙氈トヌ⇔チ√≫Å∽⊂ツ\n\n|しじ斧セモミ斧早ソ≒桙氈ヌ≡\n\nリムミマメ¥♂ニd♀∈けママメヌ∧√∩≒ぉ∀≠ヘ艢レマ♭マメ≫メÅツ┤xメεクべ¥ハ縺モぉ∵ニ♭マばぱナ⇔⊇≫メ♭>、シチ桙氈タ≫モÅツ\n\nEND\n", + /* 1*/ "モミ斧操盾桙歃n", + /* 2*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\nレ└∵⊆≫メモ∝∩エ⇔≫=ヘミマ艢ツぉ∵トタラ♪νツ∨焉ト∃マ♀モ÷ムミマ∀⊇⊂ラリメモムミマÅツべ¬ぺ∀ト√∨γぼδマぢナ⇔⊇∨メムミマ∨¬モx艫ニ♭⊆エ∨ツν∩エ∨ぽモ=ネメ¥♂ニd♀Åエ∨メÅツ祉普モテメチ≒⊇♭ツ∀⌒∩チロ騾エ\n\n|しじ操セ≠ヘ艢レマ∀ホ焉ヌ≡\n\n≠ヘ艢レマモk∵°∧⊂マ∃エ⇔∪≪=ニ∬マ⌒ロリ≪∧⊂Å∀ナ⇔タ⇔⊇≫ツぽ∵iヮsマに⇒∩≫掾マ≠ァ∵оナふ⇔≫メÅツ\n\n|しじ逐セオカ私チハヨムヌ≡\n\n≠ヘ艢レマモ<普リ♭∧メk∈゙ニ∨⊥マオカ私チハマぞ♯ツ∃⊇♭⊇∨ツナ∩ナ<普ン∧∋∃фtモシヨÅツ≠ヘ艢レマ∵私チハヨメ♀ミ∈ばぱニ≫メ♭=ネメぽ∈ニ≫メÅツゆeメ栫ル♭モ≧ンれアメムミマ∵∧テマ⊆≫モÅツ\n\n|しじ凍セムミマ∈翌瘁ロトヌ≡\n\n°d℃ハ♀モ=コ⇒∩⊇マチ⊇∩≒≠桙气掾マヤd縲ヤ%∈エ⇔÷ムミマメぽ∈づテナ⇔∪チメÅツぽ∵浴クゃリヌ†÷ムミマ∈怨梶ナ⇔÷モミ斧早ソ≒桙氈トヌ⇔チ√≫Å∽⊂ツ\n\n|しじ楳セモミ斧早ソ≒桙氈ヌ≡\n\nリムミマメ¥♂ニd♀∈けママメヌ∧√∩≒ぉ∀≠ヘ艢レマ♭マメ≫メÅツ┤xメεクべ¥ハ縺モぉ∵ニ♭マばぱナ⇔⊇≫メ♭>、シチ桙氈タ≫モÅツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nゆeメマ♀∨¬∵÷轣求ヒε∈γぼmマべ¬ぺ∀ト√⇔ナリエ∨ツケ∵⊇∀マ♀∨¬モ┬メオカ┤xモミ斧操ヨざ†√∨ツ┤xnマ⊇≫ゆeメワ$ム∵<ィヨメぃい゚∈浴ニΓΔ∈λえナ⇔タ∨ツヵぴメしじモ∧メΚヨメおぁÅツ\n\n|ヨヒマ縲マセ\n\nレ└∵⊆≫メモ∝∩エ⇔≫=ヘミマ艢ツぉ∵トタラ♪νツ∨焉ト∃マ♀モ÷ムミマ∀⊇⊂ラリメモムミマÅツべ¬ぺ∀ト√∨γぼδマぢナ⇔⊇∨メムミマ∨¬モx艫ニ♭⊆エ∨ツν∩エ∨ぽモ=ネメ¥♂ニd♀Åエ∨メÅツ祉普モテメチ≒⊇♭ツ∀⌒∩チロ騾エ\n\n|しじ操セ≠ヘ艢レマ∀ホ焉ヌ≡\n\n≠ヘ艢レマモk∵°∧⊂マ∃エ⇔∪≪=ニ∬マ⌒ロリ≪∧⊂Å∀ナ⇔タ⇔⊇≫ツぽ∵iヮsマに⇒∩≫掾マ≠ァ∵оナふ⇔≫メÅツ\n\n|しじ逐セオカ私チハヨムヌ≡\n\n≠ヘ艢レマモ<普リ♭∧メk∈゙ニ∨⊥マオカ私チハマぞ♯ツ∃⊇♭⊇∨ツナ∩ナ<普ン∧∋∃фtモシヨÅツ≠ヘ艢レマ∵私チハヨメ♀ミ∈ばぱニ≫メ♭=ネメぽ∈ニ≫メÅツゆeメ栫ル♭モ≧ンれアメムミマ∵∧テマ⊆≫モÅツ\n\n|しじ凍セモミ斧早ソ≒桙氈ヌ≡\n\nリムミマメ¥♂ニd♀∈けママメヌ∧√∩≒ぉ∀≠ヘ艢レマ♭マメ≫メÅツ┤xメεクべ¥ハ縺モぉ∵ニ♭マばぱナ⇔⊇≫メ♭>、シチ桙氈タ≫モÅツ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "翌トみはu∈なにヌ≡\n", + /* 10*/ "≠ヘ艢レマ∀ホ焉ヌ≡\n", + /* 11*/ "ムミマ∈翌瘁ロトヌ≡\n", + /* 12*/ "オカ私チハヨムヌ≡\n", + /* 13*/ "モミ斧早ソ≒桙氈ヌ≡\n", + /* 14*/ "テ¬≒≠ヘ艢レマÅツ\n⊇¶∋縲″エ⇔⊇≫≡⊂Å∃ツ\n", + /* 15*/ "に∽≡÷ワメшÅツ\n", + /* 16*/ "リマ♀∈モハモミマざ¶∋Åツ\n", + /* 17*/ "♪テ∩マ゙ナリ轣諱コ≫Å∽⊂ツ♭モΒ♭蚕n", + /* 18*/ "⊇⊇≠ヘミマ艢<縺モヤ∨¬∵ホ焉ツ\n", + /* 19*/ "テエ¬メモミヨメ♀ミハラ∈ラツ⇔∪⊇∨ツロ騾エ\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "ヤd縲ヤ%\n", + /* 23*/ "", + /* 24*/ "ヤd縲ヤ%∈みマ√∨\n", + /* 25*/ "≠ヘミマ艢=テエ¬Åエ\n", + /* 26*/ "マ♀メ∀テ∽ヨゅ≒∃タオ∃ツ\n", + /* 27*/ "≡ナ÷ヤ∵テテ∈」ばニ≫ツ\n≠ヘミマ艢÷ユ°dナ⇔チ√エ\n", + /* 28*/ "ィ、∞フ∵エ⇔チ√ツ\n", + /* 29*/ "≠ヘ艢レマ∵ほト√∨\n", + /* 30*/ "モ′ワ∵ほト√∨\n", + /* 31*/ "オカ私チハヨメム\n", + /* 32*/ "ィ、=ヘミマ艢ツぼテ⊂エ\n", + /* 33*/ "ヤd縲ヤ%づて\n", + /* 34*/ "ヤd縲ヤ%メδい∵┏ナ∨\n", + /* 35*/ "ヤd縲ヤ%ロэ\n", + /* 36*/ "しじメぼマあぃモ∃ャヤ∵ばぱト√∨\n", + /* 37*/ "私チハメvo騾ハ焉諢ラ⊇∨\n", + /* 38*/ "私チハメvo騾ハ焉諷吹ト√∨\n", + /* 39*/ "私チハメno騾ハ焉諢ラ⊇∨\n", + /* 40*/ "私チハメno騾ハ焉諷吹ト√∨\n", + /* 41*/ "マ桙氈ニ≫ぶマモ∃⊇∝ツ\n", + /* 42*/ "怨梶タ≫メモミマ゚Åツ≡<戟チぢエ⇔エ\n", + /* 43*/ "⊆∃∨∈テテマu⊇⇔モぼツ∃⊇∝ツ\n", + /* 44*/ "ぁモマ⌒⊆≫モÅ∩≒死ツ\n", + /* 45*/ "≠ヘミマ艢÷ヤ∨¬メ♪¬≒∩∵テテマケエ⇔\n私チハメ騾ハ焉クラツ≫ョャ∵⊆≫∃ツ\n", + /* 46*/ "ヤモΒ♭⊆メ°d°ムラ♭vマぁ≡⊂ツ\n騾ハ焉クラツ≫∩≒=ネメナ⇔チ√ツ\n", + /* 47*/ "≠ヘ艢レマ÷モ′ワ∀桙氈ナ⇔エ\nヴ∵騾ハ焉クラツ≫∝\n", + /* 48*/ "Å=ヘミマ艢蚕n", + /* 49*/ "♭タ≫∝死純煤クΖ⇔ツ\n", + /* 50*/ "死ィ、ツ\n", + /* 51*/ "ラ゙死潤ヘミマ艢<∈サ∠エ\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "私チハメ騾ハ焉諢ラ⊇∨\n", + /* 54*/ "じヮ┰=メ♀ミ∵ラ⊇∨\n", + /* 55*/ "ムミマメ翌トみはuモ\nタエ∀テメマ⊆≫モÅ∝蚕n", + /* 56*/ "ロ⊇♭≠ヘ艢レマ∀ホ焉ナ∃タオツ\nミム瘋ッエ⇔≫ル∨⊇Åナ蚕n", + /* 57*/ "テメ蛟ヤムモ死準ヤムムツ\nユテ⊂メ私チハ∀蛟ヤムÅ∝\n", + /* 58*/ "瘁焉諢ァx∈ハラナ⇔ナリ⊂掾マ\n≠ネハ縺朽ムラ♭ラ驕ホタオツ\n", + /* 59*/ "⊂d∋=ナリエ∨エテ√モ槍アぢ≪∃∋Åツ\n", + /* 60*/ "嫡アモぢ√≫ツ♪=ネ√ルヒモÅツ\n", + /* 61*/ "x艨モ♂ニナdワ縺÷dモΒ♭蚕n", + /* 62*/ "テ√モヤ∨¬メ⌒メオ∃⊇ツΩキメχャ\nδカÅツvマモぁナ⇔モ⊇ツ∃⊇∋Åツ\n", + /* 63*/ "ラタ蛛瘁ン∵エ⇔ツル⇔∽≡エ\nワメモ≠ヨマ∃≫∵⊇⊇ツ\npテ√♭茶ャ∀⊆∋∃轣モ\n♭タ∃⊇モÅエ\n", + /* 64*/ "が=テメマタ潤リト∩死ワタ\n", + /* 65*/ "モddd=テ∋∃驕メオ∃∩エ∨エ\n", + /* 66*/ "サ∠>ャリエ⇔チ√エヤ∵げ∋♭♪⊂ニ≫\n∋Åエミム瘁∽÷エ\n", + /* 67*/ "が⇔死ツ純戟チテテ∈ぁ∃タオエ\n", + /* 68*/ "÷÷蚕n", + /* 69*/ "メミミミdエエ\n", + /* 70*/ "Κタ⇔≫死ツ\n⌒⊂≧Å∀━エ⇔∨≡ツ\npdモヨヒマ縲マぅうメ┳Å∽タ\nνツ⇔チ√∨∋Åム÷レマヨフdツ\n", + /* 71*/ "⊆∃∨≠艨メかォ∈ナオ≫メムタ\n", + /* 72*/ "ぽまマモメ≒∝∃⊇ラ⊂∵蚕n", + /* 73*/ "ミ窶窶窶窶窶死準メ蚕n", + /* 74*/ "θモヤタ\n", + /* 75*/ "ネ∵死≧瘁縺ネ⊂Åツ\nロヒマ∃∋∃⊇≡<チツ\n", + /* 76*/ "氏ツ≫タ盾宴祉潤諠吹窿掾マ\nラ驕ホタオ∃≒∃⊇∝ツ\n", + /* 77*/ "ワθモヤトツdメシ掾モタ\n", + /* 78*/ "ヴモモd≠ネマ縲≧dラツ\n♭⌒=ヘミマ艨⊇⊇∝ツ\n", + /* 79*/ "ィ、=ヘミマ艢ツdモ£窶ラ゚d操ツ\n♭⌒死モ′ワエ⇔ユ∋♭チ√ツ\n", + /* 80*/ "ルマ゙dモてナ⇔⊇リヌ∋\n", + /* 81*/ "ckがメ轣タ潤テテモ\nャ寉オモミ∃∋Åエエ\npツげメみだタ∈ナ≒∃⊇メ∩エ\n", + /* 82*/ "ムdワ縲マ│┌マ°∨≒\n゚≧♭モアリ∃⊇エ\n", + /* 83*/ "ヤムエ純カキメχャδカ∃∋Åエ\nが⇔テ∀Åツマ∃≒∃⊇蚕n", + /* 84*/ "ヴ÷みだタエ⇔ヨム∃メエ\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/traP.c b/src/files/lang/jap-final/traP.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/jap-final/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_f.c b/src/files/lang/jap-final/tra_str_f.c new file mode 100644 index 000000000..91bd5746d --- /dev/null +++ b/src/files/lang/jap-final/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash ont 騁 transf駻駸 dans le Secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans le vaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Localiser l'Auto-chirurgien\n\nTous les vaisseaux maians sont 駲uip駸 d'une 'capsule auto-chirurgicale'. C'est le moyen le plus rapide de r饌nimer votre compagnon. Ces appareils sont r馮l駸 sur la physiologie maian. Vous trouverez ce dispositif dans l'駱ave ou dans les restes du vaisseau transf駻駸 aux labos.\n\n|Objectif 2: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 3: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu p駭騁rer dans le hangar auparavant, cela aurait grill sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derri鑽e laquelle se trouverait un vaisseau maian.\n\n|Objectif 4: - R饌nimer le garde du corps maian\n\nR饌nimez le Maian avant de vous enfuir: une civi鑽e anti-grav pourrait se r騅駘er assez encombrante en cas de crise. Une fois qu'il sera debout et op駻ationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 5: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ馥s auparavant.\n\nFIN\n", + /* 1*/ "SECTEUR 51 - FUITE\n", + /* 2*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash ont 騁 transf駻駸 dans le Secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans le vaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu p駭騁rer dans le hangar auparavant, cela aurait grill sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derri鑽e laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - R饌nimer le garde du corps maian\n\nR饌nimez le Maian avant de vous enfuir: une civi鑽e anti-grav pourrait se r騅駘er assez encombrante en cas de crise. Une fois qu'il sera debout et op駻ationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 4: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ馥s auparavant.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash ont 騁 transf駻駸 dans le Secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans le vaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu p駭騁rer dans le hangar auparavant, cela aurait grill sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derri鑽e laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ馥s auparavant.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localiser Medkit extraterrestre\n", + /* 10*/ "Rencontrer l'espion de l'IC\n", + /* 11*/ "R饌nimer Elvis avec le Medkit\n", + /* 12*/ "Localiser le hangar secret\n", + /* 13*/ "Quitter le Secteur 51\n", + /* 14*/ "Joanna - Ici Jonathan. Vous 黎es en grave danger.\n", + /* 15*/ "Ils ont inond cette zone avec du gaz empoisonn.\n", + /* 16*/ "Allez dans le labo o se trouve notre ami. \nIl y a une cache.\n", + /* 17*/ "Je vous contacterai quand vous y serez! Bonne chance!\n", + /* 18*/ "Bon travail, Jo. Nous devons nous rejoindre. Ils \ndeviennent m馭iants.\n", + /* 19*/ "Passez par le conduit ouvert \ndans un des labos. D駱鹹hez-vous.\n", + /* 20*/ "Obtenir Medkit extraterr.\n", + /* 21*/ "Cassandra De Vries: \n", + /* 22*/ "Medkit\n", + /* 23*/ "", + /* 24*/ "Medkit extraterr. obtenu.\n", + /* 25*/ "Joanna - par ici.\n", + /* 26*/ "Nous devons retrouver notre ami.\n", + /* 27*/ "Bien, nous y sommes presque. Couvrez-moi, Jo...\n", + /* 28*/ "Ok - Restez derri鑽e.\n", + /* 29*/ "Jonathan a 騁 tu.\n", + /* 30*/ "Elvis a 騁 tu.\n", + /* 31*/ "Le hangar secret a 騁 d馗ouvert.\n", + /* 32*/ "Ok, Jo - allons-y.\n", + /* 33*/ "Medkit extraterr. activ.\n", + /* 34*/ "Op駻ation Medkit annul馥.\n", + /* 35*/ "Medkit administr.\n", + /* 36*/ "Objet crucial d騁ruit.\n", + /* 37*/ "Ouverture porte ext駻ieure hangar.\n", + /* 38*/ "Fermeture porte ext駻ieure hangar.\n", + /* 39*/ "Ouverture porte int駻ieure hangar.\n", + /* 40*/ "fermeture porte int駻ieure hangar.\n", + /* 41*/ "C'est la seule sortie possible.\n", + /* 42*/ "Tu es le seul pouvoir piloter, Elvis. Alors au boulot.\n", + /* 43*/ "Mais nous ne pouvons pas te laisser derri鑽e.\n", + /* 44*/ "Il doit y avoir une solution.\n", + /* 45*/ "L'un de nous devra rester en arri鑽e pour \nouvrir le hangar.\n", + /* 46*/ "Je vais prendre cette hoverbike. Couvrez-moi \nj'ouvre les portes.\n", + /* 47*/ "Jonathan, allez avec Elvis. Je vais voir les consoles.\n", + /* 48*/ "C'est trop dangereux, Jo...\n", + /* 49*/ "Je devrais m'en sortir... Aie confiance.\n", + /* 50*/ "...Ok.\n", + /* 51*/ "Merde, Joanna... Couvrez-moi!\n", + /* 52*/ "Je vais bloquer les marches - Occupez-vous de la rampe.\n", + /* 53*/ "Les portes du hangar sont ouvertes.\n", + /* 54*/ "Les portes du bloc m馘ical sont ouvertes.\n", + /* 55*/ "Le Medkit doit se trouver par-l.\n", + /* 56*/ "Il faut rejoindre Jonathan, avant qu'il ne \nsoit trop tard.\n", + /* 57*/ "Cette odeur... de l'huile... je l'ai sentie dans \nles autres hangars.\n", + /* 58*/ "Avec cette Jetbike je vais pouvoir m'enfuir \navant la fermeture des portes.\n", + /* 59*/ "Gros probl鑪e: c'est un monoplace!\n", + /* 60*/ "Deux peuvent y entrer, pas plus.\n", + /* 61*/ "Aucun style en plus, c'est d駱rimant.\n", + /* 62*/ "Ce sp馗imen est la propri騁 du gouvernement. Il ne doit pas quitter cette base.\n", + /* 63*/ "Voyons voir comment cette petite voleuse va s'en sortir avec les gaz. Elle y repensera deux fois avant de venir semer le bordel ici!\n", + /* 64*/ "C'est quoi ce bruit? Mais, mais... du gaz!\n", + /* 65*/ "Ah non! C'est pas 軋 qui 騁ait pr騅u!\n", + /* 66*/ "Non, arr黎er! Je veux pas mourir. Elle... Arggghhh!\n", + /* 67*/ "Pauvre idiot! Allons nous-en.\n", + /* 68*/ "Eternuements, toussotements, pleures.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Je suis vivant. Je pensais 黎re mort comme les autres. Vous 黎es de l'Institut? Je vous reconnais. Vous m'avez aid. Merci beaucoup.\n", + /* 71*/ "Vous... Vous parlez notre langue?\n", + /* 72*/ "Impressionnante d馘uction.\n", + /* 73*/ "Nnnghhh... \n", + /* 74*/ "Qu'avez-vous?\n", + /* 75*/ "J'ai mal au cr穗e. Chez nous c'est assez douloureux, nous avons une grosse t黎e.\n", + /* 76*/ "Pouvez-vous marcher? Nous devons partir au plus vite.\n", + /* 77*/ "Je suis d'accord. Quel est votre nom?\n", + /* 78*/ "Agent Dark, Joanna pour les intimes.\n", + /* 79*/ "Tr鑚 bien, Joanna, je suis Gardien Prime. Mais vous pouvez m'appeler... Elvis!\n", + /* 80*/ "La console est d饕ranch馥.\n", + /* 81*/ "Mais, qu'est-ce que vous faites? \nCette pi鐵e est cens馥 黎re scell馥! \nVous ne connaissez pas les proc馘ures \nd'autopsie?\n", + /* 82*/ "Le Directeur Easton sera mis au courant, \njeune fille.\n", + /* 83*/ "Vous ne pouvez pas prendre 軋! Ca appartient au \nGouvernement! C'est intol駻able! C'est... c'est... \ntotalement anti-professionnel !!\n", + /* 84*/ "Les proc馘ures, c'est trop barbant pour moi!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_g.c b/src/files/lang/jap-final/tra_str_g.c new file mode 100644 index 000000000..bc24e0e0f --- /dev/null +++ b/src/files/lang/jap-final/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Finden Sie die den Auto-Chirugen der Aliens!\n\nAlle Maianischen Schiffe sind mit einem Ger舩 ausgestattet, das man als automatischen Chirurgen bezeichnen knnte. Da dieses Ger舩 auf Maianische Physiologie ausgerichtet ist, stellt es den einfachsten und sichersten Weg dar, den Bodyguard wieder zu Bewusstsein zu bringen. Das Ger舩 befindet sich entweder unter den Trmmern des Schiffs, oder es wurde bereits ins Labor zur Analyse gebracht.\n\n|2. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|3. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|4. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, mssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umst舅den nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|5. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 1*/ "AREA 51 - FLUCHT\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, mssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umst舅den nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|4. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie das Medipack!\n", + /* 10*/ "Treffen Sie sich mit Jonathan!\n", + /* 11*/ "Wiederbeleben Sie den Maianer!\n", + /* 12*/ "Finden Sie den geheimen Hangar!\n", + /* 13*/ "Flchten Sie aus der Area 51!\n", + /* 14*/ "Joanna - Hier spricht Jonathan. Du befindest dich in Gefahr.\n", + /* 15*/ "Die gesamte Zone wurde mit Nervengas kontaminiert.\n", + /* 16*/ "Bring unseren Freund ins Sicherheitslabor. \nDort kannst du ihn verstecken.\n", + /* 17*/ "Ich kontaktiere dich, wenn du dort bist. Viel Glck!\n", + /* 18*/ "Gute Arbeit, Jo. Wir mssen uns treffen. Ich \nglaube, sie haben mich erkannt.\n", + /* 19*/ "Geh durch den Wartungsschacht, den ich in einem \nder Sicherheitslabors gefffnet habe. Beeil dich!\n", + /* 20*/ "Erlangen Sie das extraterrestrische Medipack!\n", + /* 21*/ "Cassandra De Vries\n", + /* 22*/ "Medipack\n", + /* 23*/ "", + /* 24*/ "Medipack aufgenommen\n", + /* 25*/ "Joanna! Hier drben.\n", + /* 26*/ "Wir mssen zu unserem Freund zurck.\n", + /* 27*/ "Wir sind schon ganz nahe. Gib mir Deckung, Jo...\n", + /* 28*/ "Okay - Bleib zurck!\n", + /* 29*/ "Jonathan wurde eliminiert.\n", + /* 30*/ "Elvis wurde eliminiert.\n", + /* 31*/ "Der geheime Hangar wurde gefunden.\n", + /* 32*/ "Okay, Jo - gehen wir.\n", + /* 33*/ "Medipack aktiviert\n", + /* 34*/ "Medipack-Atkivit舩 unterbrochen\n", + /* 35*/ "Medipack wurde verabreicht.\n", + /* 36*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 37*/ "トu゚eres Hangartor wird geffnet.\n", + /* 38*/ "トu゚eres Hangartor wird geschlossen.\n", + /* 39*/ "Inneres Hangartor wird geffnet.\n", + /* 40*/ "Inneres Hangartor wird geschlossen.\n", + /* 41*/ "Das ist der einzige Weg hier raus.\n", + /* 42*/ "Du bist der einzige, der das Ding fliegen kann, Elvis, also los!\n", + /* 43*/ "Aber wir knnen dich nicht zurcklassen.\n", + /* 44*/ "Es muss doch einen Weg hier raus geben.\n", + /* 45*/ "Einer von uns muss hier bleiben, um die \nHangartore zu ffnen.\n", + /* 46*/ "Ich flchte mit dem Hoverbike. Gebt mir Deckung, \nw臧rend ich die Tore ffne!\n", + /* 47*/ "Jonathan, geh mit Elvis. Ich kmmere mich um die Konsolen.\n", + /* 48*/ "Es ist gef臧rlich, Jo...\n", + /* 49*/ "Ich komme schon klar... Vertrau mir.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Verdammt, Joanna... Gib mir Deckung!\n", + /* 52*/ "Ich sichere die Treppe - kmmere du dich um die Rampe.\n", + /* 53*/ "Die Hangartore sind jetzt offen.\n", + /* 54*/ "Die Tren zum Sicherheitslabor wurden entriegelt.\n", + /* 55*/ "Das Medipack muss hier irgendwo sein.\n", + /* 56*/ "Ich muss mich mit Jonathan treffen, bevor\ner noch tiefer in Schwierigkeiten ger舩.\n", + /* 57*/ "Dieser Geruch... ヨl... Ich habe es schon in den \nanderen Hangars gerochen.\n", + /* 58*/ "Ich sollte auf dem Hoverbike entkommen, bevor\nalle Ausg舅ge geschlossen werden.\n", + /* 59*/ "Oh nein! Wir haben ein Problem. Hier ist nur fr EINEN Platz!\n", + /* 60*/ "Zwei passen rein, aber das warエs dann schon.\n", + /* 61*/ "Und es ist nicht sehr stilvoll - wenn du wei゚t, wovon ich spreche.\n", + /* 62*/ "Ich lasse das nicht zu. Dieses Exemplar ist Regierungseigentum und darf die Basis nicht verlassen.\n", + /* 63*/ "Mal sehen, wie diese selbstgef舁lige Diebin mit Nervengas klarkommt. Sie wird es sich in Zukunft berlegen, sich mit mir anzulegen!\n", + /* 64*/ "Was ist das fr ein Ger舫sch! Es ist... GAS!\n", + /* 65*/ "Neeiiin! Das war anders geplant!\n", + /* 66*/ "Aufhren! Ich will noch nicht... Sie... Arggghhh!\n", + /* 67*/ "Du Idiot! Wir mssen raus hier.\n", + /* 68*/ "Keuchen, rcheln und husten.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Ich bin am Leben. Ich dachte, ich wrde so wie die anderen auseinander genommen. Sie mssen vom Institut sein. Ich habe Sie schon mal gesehen. Danke, dass Sie mir geholfen haben.\n", + /* 71*/ "Sie... sie sprechen unsere Sprache?\n", + /* 72*/ "Vorsicht, mit ihr ist nicht zu scherzen.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "Was ist los?\n", + /* 75*/ "Ich habe Kopfschmerzen. Und mit einem Kopf von dieser Gr゚e will das was hei゚en.\n", + /* 76*/ "Knnen Sie gehen? Wir mssen hier weg, bevor sie uns noch dichter auf den Fersen sind.\n", + /* 77*/ "Ich denke schon. Wie hei゚en Sie?\n", + /* 78*/ "Ich bin Agent Dark. Oder Joanna, falls Sie das bevorzugen.\n", + /* 79*/ "Gut, Joanna, ich bin der Protektor Eins. Aber nennen Sie... nenn mich einfach Elvis!\n", + /* 80*/ "Konsole ist nicht aktiv.\n", + /* 81*/ "Was zur Hlle machen Sie hier? \nDieser Raum ist nur fr autorisiertes Personal! \nWissen Sie den gar nichts ber die Vorschriften \nbei Autopsien?\n", + /* 82*/ "Direktor Easton wird darber informiert werden, \njunge Dame.\n", + /* 83*/ "Sie drfen das nicht! Das ist Regierungseigentum! \nDas ist nicht tolerabel! Das ist... das ist... \nunprofessionell!!!\n", + /* 84*/ "Ich habe fr Vorschriften nicht viel brig!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_i.c b/src/files/lang/jap-final/tra_str_i.c new file mode 100644 index 000000000..3c30a308a --- /dev/null +++ b/src/files/lang/jap-final/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Trova dispositivo AutoChirurgo alieno\n\nTutti i mezzi Maian portano un dispositivo chiamato AutoChirurgo. Il suo uso il modo pi veloce e sicuro per svegliare un Maian, dal momento che progettato per agire sulla fisiologia Maian. Dovrebbe trovarsi tra i resti del velivolo o altrimenti tra gli oggetti portati al laboratorio per l'analisi.\n\n|Obiettivo 2: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 3: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 4: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poich un idrovolante non la cosa pi semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 5: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 1*/ "AREA 51 - FUGA\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poich un idrovolante non la cosa pi semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 4: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Trova l'AutoChirurgo alieno\n", + /* 10*/ "Appuntamento con l'agente segreto\n", + /* 11*/ "Rivitalizza guardia del corpo Maian\n", + /* 12*/ "Raggiungi l'hangar segreto\n", + /* 13*/ "Fuga dall'Area 51\n", + /* 14*/ "Joanna, qui Jonathan. Sei in grave pericolo!\n", + /* 15*/ "Hanno inondato l'area di gas nervino.\n", + /* 16*/ "Porta il nostro amico al laboratorio \ndi contenimento. L c' un nascondiglio.\n", + /* 17*/ "Mi metter di nuovo in contatto con te \nquando sei sul posto. In bocca al lupo!\n", + /* 18*/ "Bel lavoro, Jo! Dobbiamo incontrarci. Stanno \niniziando a sospettare di me.\n", + /* 19*/ "Usa lo sportello di manutenzione che \nho aperto in uno dei laboratori. Veloce!\n", + /* 20*/ "Procurati AutoChirurgo\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "AutoChirurgo\n", + /* 23*/ "", + /* 24*/ "Preso AutoChirurgo\n", + /* 25*/ "Joanna! Da questa parte!\n", + /* 26*/ "Dobbiamo trovare il nostro amico!\n", + /* 27*/ "Bene, siamo in zona! Coprimi, Jo...\n", + /* 28*/ "Bene, ora sta indietro!\n", + /* 29*/ "Jonathan stato ucciso!\n", + /* 30*/ "Elvis stato ucciso!\n", + /* 31*/ "Localizzato hangar segreto.\n", + /* 32*/ "Perfetto, Jo! Andiamo!\n", + /* 33*/ "Attivato AutoChirurgo alieno.\n", + /* 34*/ "Interrotta operazione AutoChirurgo.\n", + /* 35*/ "Somministrato AutoChirurgo alieno.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Porta esterna hangar in apertura.\n", + /* 38*/ "Porta esterna hangar in chiusura.\n", + /* 39*/ "Porta interna hangar in apertura.\n", + /* 40*/ "Porta interna hangar in chiusura.\n", + /* 41*/ "ネ l'unico modo per uscire di qui!\n", + /* 42*/ "Sei l'unico in grado di pilotarlo, Elvis, e allora fallo!\n", + /* 43*/ "Non possiamo mica lasciarti qui!\n", + /* 44*/ "Ci dev'essere un altro modo per uscire di qui!\n", + /* 45*/ "Uno di noi deve rimanere indietro \nper aprire le porte dell'hangar.\n", + /* 46*/ "Ci andr io con l'aeromoto! Coprimi \nmentre apro le porte!\n", + /* 47*/ "Jonathan, va con Elvis. Io mi occupo dei quadri comando.\n", + /* 48*/ "ネ pericoloso, Jo...\n", + /* 49*/ "Tutto sotto controllo! Fidati!\n", + /* 50*/ "Va bene!\n", + /* 51*/ "Dannazione, Joanna... coprimi!\n", + /* 52*/ "Io copro le scale, tu prendi la rampa!\n", + /* 53*/ "Le porte dell'hangar sono aperte.\n", + /* 54*/ "Aperte porte sala di contenimento.\n", + /* 55*/ "L'AutoChirurgo deve essere qui da qualche parte.\n", + /* 56*/ "Meglio che mi metta in contatto con Jonathan, prima che \nsi cacci in qualche altro guaio!\n", + /* 57*/ "Questo odore... petrolio... l'ho gi sentito \nnegli altri hangar.\n", + /* 58*/ "L'aeromoto dovrebbe farcela a portarmi fuori \nprima che chiudano la base.\n", + /* 59*/ "Oh, no! Abbiamo un problema. ネ una monoposto!\n", + /* 60*/ "Ce ne stanno al massimo due e non di pi!\n", + /* 61*/ "E poi... non ha stile! Non so se rendo...\n", + /* 62*/ "Non lo ammetto! Quell'esemplare propriet governativa e non pu assolutamente uscire dalla base.\n", + /* 63*/ "Vediamo come se la cava questa sfacciata criminale con l'impianto di difesa a gas. Ci penser due volte la prossima volta prima di fare la furba con me!\n", + /* 64*/ "Cos' quel rumore? Non pu... ネ gas!\n", + /* 65*/ "Accidenti! Questo non era previsto!\n", + /* 66*/ "Fermati, per favore! Non posso morire adesso! Lei... Noooo!\n", + /* 67*/ "Idiota... Dobbiamo uscire di qua! Subito!!!\n", + /* 68*/ "Gasp, soffoco! Soffoco!\n", + /* 69*/ "***aaah...! aaah! aha! aha!***\n", + /* 70*/ "Sono vivo! Credevo che mi avrebbero fatto a fettine come gli altri... Sei dell'istituto, vero? Ti riconosco, mi ricordo di te. Mi hai aiutato, sono in debito con te!\n", + /* 71*/ "Parli... Parli la nostra lingua?\n", + /* 72*/ "Per... sveglia!!!", + /* 73*/ "Aaahhh... che male!\n", + /* 74*/ "Che succede?\n", + /* 75*/ "Ho mal di testa! E con un testone come il mio, non c' niente da ridere!\n", + /* 76*/ "Riesci a camminare? Dobbiamo uscire di qui prima che riescano a farci fuori!\n", + /* 77*/ "S, penso di farcela. Come ti chiami?\n", + /* 78*/ "Sono l'Agente Dark... o Joanna, se preferisci!\n", + /* 79*/ "Bene, Joanna! Io sono il Difensore 1, ma puoi chiamarmi... Elvis!\n", + /* 80*/ "Quadro comandi inattivo\n", + /* 81*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /* 82*/ "Il direttor Easton lo verr \na sapere, signorina!\n", + /* 83*/ "Non pu prendere quello! ネ propriet governativa! \nネ intollerabile! ネ... ... \n inammissibile!!!\n", + /* 84*/ "Non mi interessa un fico secco della procedura!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_s.c b/src/files/lang/jap-final/tra_str_s.c new file mode 100644 index 000000000..9d77f5302 --- /dev/null +++ b/src/files/lang/jap-final/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Localizar el Dispositivo Aliengena de AutoCiruga\n\nTodas las naves Maian llevan un dispositivo de AutoCiruga. Utilizarlo es el m騁odo m疽 r疳ido y seguro de despertarle, ya que ha sido diseado para la fisiologa Maian. Debe encontrarse entre los restos de la nave, o si no, con los objetos que han sido llevados a analizar al laboratorio.\n\n|Objetivo Dos: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Tres: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos guardan una nave Maian intacta.\n\n|Objetivo Cuatro: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa m疽 f當il de manejar. Cuando est despejado y en pie, deber ser capaz de hacer volar la nave Maian fuera del チrea 51.\n\n|Objetivo Cinco: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 1*/ "チREA 51 - ESCAPE\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa m疽 f當il de manejar. Cuando est despejado y en pie, deber ser capaz de hacer volar la nave Maian fuera del チrea 51.\n\n|Objetivo Cuatro: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localizar paquete m馘ico aliengena\n", + /* 10*/ "Encontrar al espa del IC\n", + /* 11*/ "Revive al Guardaespaldas Maian\n", + /* 12*/ "Localizar el hangar secreto\n", + /* 13*/ "Escapar del チrea 51\n", + /* 14*/ "ソJoanna? Jonathan al habla. Est疽 en peligro de muerte.\n", + /* 15*/ "Han inundado el 疵ea con gas nervioso.\n", + /* 16*/ "Lleva a nuestro amigo al laboratorio de contencin. \nAll hay un lugar secreto.\n", + /* 17*/ "Contactar contigo cuando est駸 all. 。Buena suerte!\n", + /* 18*/ "Buen trabajo, Joanna. Necesitamos vernos. Est疣 \nsospechando de m.\n", + /* 19*/ "Usa la escotilla de mantenimiento que he abierto \nen uno de los laboratorios de contencin. Deprisa.\n", + /* 20*/ "Obt駭 el paquete m馘ico aliengena.\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "Paq. m馘ico\n", + /* 23*/ "", + /* 24*/ "Paquete m馘ico aliengena obtenido.\n", + /* 25*/ "Joanna. Aqu.\n", + /* 26*/ "Necesitamos volver con nuestro amigo.\n", + /* 27*/ "Bien, estamos cerca. Cbreme, Joanna...\n", + /* 28*/ "Vale. Ap疵tate.\n", + /* 29*/ "Jonathan ha muerto.\n", + /* 30*/ "Elvis ha muerto.\n", + /* 31*/ "El hangar secreto ha sido localizado.\n", + /* 32*/ "Bien, Joanna. Vamos.\n", + /* 33*/ "Paquete m馘ico aliengena activado.\n", + /* 34*/ "Operacin del paquete m馘ico abortada.\n", + /* 35*/ "El paquete m馘ico aliengena ha sido administrado.\n", + /* 36*/ "Objeto crtico de la misin destruido.\n", + /* 37*/ "Puerta exterior del hangar abierta.\n", + /* 38*/ "Puerta exterior del hangar cerrada.\n", + /* 39*/ "Puerta interior del hangar abierta.\n", + /* 40*/ "Puerta interior del hangar cerrada.\n", + /* 41*/ "Es el nico camino para salir de aqu.\n", + /* 42*/ "Eres el nico que puede pilotarlo, Elvis, as que entra.\n", + /* 43*/ "Pero no podemos dejarte atr疽.\n", + /* 44*/ "Tiene que haber un camino para salir de aqu.\n", + /* 45*/ "Uno de nosotros debe quedarse atr疽 para abrir \nlas puertas del hangar.\n", + /* 46*/ "Saldr en esa aeromoto. Cubridme mientras \nabro las puertas.\n", + /* 47*/ "Jonathan, ve con Elvis. Yo me ocupar de las consolas.\n", + /* 48*/ "Es peligroso, Joanna...\n", + /* 49*/ "Puedo encargarme... Cr馥me.\n", + /* 50*/ "...De acuerdo.\n", + /* 51*/ "Maldicin, Joanna... 。cbreme!\n", + /* 52*/ "Cubrir las escaleras. T toma la rampa.\n", + /* 53*/ "Las puertas del hangar est疣 abiertas.\n", + /* 54*/ "Puertas de contencin m馘ica abiertas.\n", + /* 55*/ "El paquete m馘ico debera estar por aqu.\n", + /* 56*/ "Es hora de contactar con Jonathan, antes de que \nse meta en m疽 problemas.\n", + /* 57*/ "Ese olor... aceite... He olido eso en los \notros hangares.\n", + /* 58*/ "La aeromoto me sacar de aqu antes de que \ncierren la base.\n", + /* 59*/ "。Oh, no! Tenemos un problema. 。Es monoplaza!\n", + /* 60*/ "Cabran dos, pero ninguno m疽.\n", + /* 61*/ "Adem疽, no tiene estilo. ソSabes lo que quiero decir?\n", + /* 62*/ "No os voy a dejar. Ese esp馗imen es propiedad del gobierno y no debe abandonar la base.\n", + /* 63*/ "Veamos qu tal se porta esa confiada ladrona con nuestro gas del sistema de defensa. 。Se lo pensar dos veces antes de jorobarme otra vez!\n", + /* 64*/ "ソQu es ese ruido? No puede ser... 。Gas!\n", + /* 65*/ "。Noooo, esto no deba ocurrir!\n", + /* 66*/ "。Por favor, para! Se supone que no debo morir. Ella... 。Arggghhh!\n", + /* 67*/ "。Idiota! Ser mejor que salgamos de aqu.\n", + /* 68*/ "Arrgghh... Cof, cof...\n", + /* 69*/ "***。Aahh...! 。Aahaa...! 。Aaaaahhh! Aha. Ahh.***\n", + /* 70*/ "Estoy vivo. Pensaba que haba cado como los otros. Eres del Instituto, ソno es as? Te conozco de antes. Me ayudaste. Gracias.\n", + /* 71*/ "T... ソT hablas nuestro idioma?\n", + /* 72*/ "Mrala... qu lista es...\n", + /* 73*/ "Earrggghh... eerggh...\n", + /* 74*/ "ソQu pasa?\n", + /* 75*/ "Tengo dolor de cabeza. Y con una cabeza tan grande como 駸ta, no es cuestin de broma.\n", + /* 76*/ "ソPuedes andar? Debemos irnos antes de que organicen nuestra caza.\n", + /* 77*/ "Creo que s. ソCmo te llamas?\n", + /* 78*/ "Soy la Agente Dark. O Joanna, si lo prefieres...\n", + /* 79*/ "Bien, Joanna, soy Protector Uno. Pero t puedes llamarme... 。Elvis!\n", + /* 80*/ "La consola no est activa.\n", + /* 81*/ "ソQu demonios se supone que haces? \n。Se supone que esto es una habitacin sellada! \nソNo sabes nada acerca de los procedimientos \npara autopsias?\n", + /* 82*/ "El Director Easton se va a enterar de esto, \njovencita.\n", + /* 83*/ "。No puedes coger eso! 。Es propiedad del gobierno! \n。Esto es intolerable! 。No es... 。No es... \n...profesional!!\n", + /* 84*/ "。No es que me importen mucho los procedimientos!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/uffE.c b/src/files/lang/jap-final/uffE.c similarity index 100% rename from src/files/lang/uffE.c rename to src/files/lang/jap-final/uffE.c diff --git a/src/files/lang/uffJ.c b/src/files/lang/jap-final/uffJ.c similarity index 100% rename from src/files/lang/uffJ.c rename to src/files/lang/jap-final/uffJ.c diff --git a/src/files/lang/uffP.c b/src/files/lang/jap-final/uffP.c similarity index 100% rename from src/files/lang/uffP.c rename to src/files/lang/jap-final/uffP.c diff --git a/src/files/lang/uff_str_f.c b/src/files/lang/jap-final/uff_str_f.c similarity index 100% rename from src/files/lang/uff_str_f.c rename to src/files/lang/jap-final/uff_str_f.c diff --git a/src/files/lang/uff_str_g.c b/src/files/lang/jap-final/uff_str_g.c similarity index 100% rename from src/files/lang/uff_str_g.c rename to src/files/lang/jap-final/uff_str_g.c diff --git a/src/files/lang/uff_str_i.c b/src/files/lang/jap-final/uff_str_i.c similarity index 100% rename from src/files/lang/uff_str_i.c rename to src/files/lang/jap-final/uff_str_i.c diff --git a/src/files/lang/uff_str_s.c b/src/files/lang/jap-final/uff_str_s.c similarity index 100% rename from src/files/lang/uff_str_s.c rename to src/files/lang/jap-final/uff_str_s.c diff --git a/src/files/lang/waxE.c b/src/files/lang/jap-final/waxE.c similarity index 100% rename from src/files/lang/waxE.c rename to src/files/lang/jap-final/waxE.c diff --git a/src/files/lang/jap-final/waxJ.c b/src/files/lang/jap-final/waxJ.c new file mode 100644 index 000000000..9f69387b5 --- /dev/null +++ b/src/files/lang/jap-final/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|ワ竄пbhセ\n\nx舮アメう凍=奄о゚≧ムマ刀メシい∃ユレマ♀モ≠艪ワリ≧dマ∀エ⇔ュチマ∨∃∩エ∨ツ♂d゚≧ムマメ┨刀マムナ÷ユレマ♀∈ロリ⊃∽ツワリ≧dメリ♭縺繞ヘ≪=ネナ⇔死ツ\n\n|しじ操セモ℃d゚dマ」、∈ンハ綵n\n怩「∃♂d゚≧ムマメ♪⌒モ÷ワリ≧dメ窶ラ閠≠d∈ツ煤ス≫マユト∝ナチ∃⊇ツモ℃d゚dマ」、∈ンハ縺ナ÷瘁焉メュ⇔メ♂d゚∀<ヘヨニ≫Στ閼驕クばぱニ≫メÅツ\n\n|しじ逐セ¥♂ニd♀d≧d∈ほヌ\n\n¥♂ニd♀メd≧d∈ほナ÷瘁焉メケス∵<父ゆeマwニ≫テ∀∃♪∃⊇≡⊂<黼ツメ焉クエ⇔∪チメÅツゆeメ#ロd♭⌒⊆≫┳メ痰イ⌒θпÅ∵>ンマ瘁焉メ℃マ≠メ$d∈°ユマナ⇔モ⊇ツ∃⊇ツ\n\n|しじ凍セユレマ♀∈繧レヌ≡\n\n瘁メマモゥト√≫⌒メ♭モ∃⊇エ準瘁クなにナ゚ヒメ#d縺リ♭繧レニ≫メÅツロヒ縲∵瘁クぴψニ≫テ∀マ∃≫ツョΚタ∨リリ縺縺フヰ≫≡⊂マツ\n\nEND\n", + /* 1*/ "レdマ゚d\n", + /* 2*/ "|ワ竄пbhセ\n\nx舮アメう凍=奄о゚≧ムマ刀メシい∃ユレマ♀モ≠艪ワリ≧dマ∀エ⇔ュチマ∨∃∩エ∨ツ♂d゚≧ムマメ┨刀マムナ÷ユレマ♀∈ロリ⊃∽ツワリ≧dメリ♭縺繞ヘ≪=ネナ⇔死ツ\n\n|しじ操セモ℃d゚dマ」、∈ンハ綵n\n怩「∃♂d゚≧ムマメ♪⌒モ÷ワリ≧dメ窶ラ閠≠d∈ツ煤ス≫マユト∝ナチ∃⊇ツモ℃d゚dマ」、∈ンハ縺ナ÷瘁焉メュ⇔メ♂d゚∀<ヘヨニ≫Στ閼驕クばぱニ≫メÅツ\n\n|しじ逐セユレマ♀∈繧レヌ≡\n\n瘁メマモゥト√≫⌒メ♭モ∃⊇エ準瘁クなにナ゚ヒメ#d縺リ♭繧レニ≫メÅツロヒ縲∵瘁クぴψニ≫テ∀マ∃≫ツョΚタ∨リリ縺縺フヰ≫≡⊂マツ\n\nEND\n", + /* 3*/ "|ワ竄пbhセ\n\nx舮アメう凍=奄о゚≧ムマ刀メシい∃ユレマ♀モ≠艪ワリ≧dマ∀エ⇔ュチマ∨∃∩エ∨ツ♂d゚≧ムマメ┨刀マムナ÷ユレマ♀∈ロリ⊃∽ツワリ≧dメリ♭縺繞ヘ≪=ネナ⇔死ツ\n\n|しじ操セユレマ♀∈繧レヌ≡\n\n瘁メマモゥト√≫⌒メ♭モ∃⊇エ準瘁クなにナ゚ヒメ#d縺リ♭繧レニ≫メÅツロヒ縲∵瘁クぴψニ≫テ∀マ∃≫ツョΚタ∨リリ縺縺フヰ≫≡⊂マツ\n\nEND\n", + /* 4*/ "ユレマ♀∈繧レヌ≡\n", + /* 5*/ "モ℃d゚dマ」、∈ンハ綵n", + /* 6*/ "¥♂ニd♀d≧d∈ほヌ\n", + /* 7*/ "ヴメヤニワ∩≒ぁ⇔ぼタ∃ト⊇エ\n", + /* 8*/ "驕諷ンナ∩エ∨≒#d縺ヨニ∬ぼチ∋Åエ\n", + /* 9*/ "テメヴ∈べ⇔≫∝ツ∵∃⊇∝ツ\n", + /* 10*/ "ヴマユ∩エ⇔が∀⊇⊂ルΞ∃メエ\n", + /* 11*/ "ヵマΒ普ニ≫≡蚕n", + /* 12*/ "ヴ∵⊆∃∨メリ∃≒=ニ∬テテ∈≫∝ムエ\n", + /* 13*/ "テメヴ∈べ⇔≫∝ツ∵∃⊇∝ツ\n", + /* 14*/ "ユレマ♀モてツ∃チ∃エ∨ツ\n", + /* 15*/ "ユレマ♀モシпマロハト√∨ツ\n", + /* 16*/ "¥♂ニd♀メd≧d∈ほナ∨ツ\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "ワリ≧d」、\n", + /* 20*/ "ワリ≧d」、\n", + /* 21*/ "ワリ≧d」、∈みマ√∨ツ\n", + /* 22*/ "ワリ≧d」、∵ナチンハ縺ト√∨ツ\n", + /* 23*/ "ワリ≧d」、∵」なナ∨ツ\n", + /* 24*/ "モ℃d゚dメ♀ミ∵ハラト√⇔⊇リニ\n」、∈宦瘁ヒツ≫テ∀∵♭タリヌ∋ツ\n", + /* 25*/ "モ℃d゚d∵あいマト√∨ツ\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/waxP.c b/src/files/lang/jap-final/waxP.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/jap-final/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_f.c b/src/files/lang/jap-final/wax_str_f.c new file mode 100644 index 000000000..7ea91de72 --- /dev/null +++ b/src/files/lang/jap-final/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes cr騁ins de scientifiques de la dataDyne Corporation ne sont plus autoris駸 poursuivre leurs recherches gr稍e notre technologie. Tu placeras une bombe dans l'ascenseur qui d騁ruira toutes leurs donn馥s et toutes les preuves physiques de notre coop駻ation.\n\n|Objectif 2: - Eliminer le Capitaine de dataDyne\n\nTu devras effacer cette cr饌ture pour annuler toute possibilit de repr駸ailles contre les Skedars par des 駘駑ents r駸iduels de cette corporation infid鑞e. L'id馥 d'humains r騏ssissant menacer notre puissante race est plus que ridicule, mais nous ne devons pas ignorer la force de la vendetta.\n\n|Objectif 3: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette chienne humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes cr騁ins de scientifiques de la dataDyne Corporation ne sont plus autoris駸 poursuivre leurs recherches gr稍e notre technologie. Tu placeras une bombe dans l'ascenseur qui d騁ruira toutes leurs donn馥s et toutes les preuves physiques de notre coop駻ation.\n\n|Objectif 2: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 4*/ "Trouver - escorter De Vries H駘iport\n", + /* 5*/ "Placer explosifs dans ascenseur Labo\n", + /* 6*/ "Assassiner chef s馗urit dataDyne\n", + /* 7*/ "Sortez de mon bureau...\n", + /* 8*/ "Si tu veux vivre, suis-moi jusqu' l'h駘iport.\n", + /* 9*/ "Ne me tuez pas!\n", + /* 10*/ "Comment osez-vous me d駻anger!\n", + /* 11*/ "Vous allez regretter cette intrusion.\n", + /* 12*/ "Partez! Imm馘iatement!\n", + /* 13*/ "Vous n'oserez pas tirer!\n", + /* 14*/ "Cassandra a 騁 immobilis馥.\n", + /* 15*/ "Cassandra a 騁 captur馥.\n", + /* 16*/ "Le chef de la S馗urit a 騁 駘imin.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bombe skedar\n", + /* 20*/ "Bombe skedar\n", + /* 21*/ "Bombe skedar obtenue.\n", + /* 22*/ "La Bombe skedar a 騁 plac馥 correctement.\n", + /* 23*/ "La Bombe skedar a explos.\n", + /* 24*/ "Porte d'ascenseur verrouill馥 - La bombe ne peut 黎re plac馥.\n", + /* 25*/ "Ascenseur d駸activ.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_g.c b/src/files/lang/jap-final/wax_str_g.c new file mode 100644 index 000000000..16fb3516c --- /dev/null +++ b/src/files/lang/jap-final/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unf臧igen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um s舂tliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Eliminieren Sie den Sicherheitschef!\n\nEntfernen Sie dieses Individuum, um jegliche Repressalien durch verbleibende Elemente der abtrnnigen Firma gegen die Skedar von vorneherein auszuschlie゚en. So lachhaft die Vorstellung, dass die Menschen die Skedar auslschen knnten, auch sein mag, man darf die Macht einer Vendetta nicht untersch舩zen.\n\n|3. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unf臧igen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um s舂tliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 4*/ "Eskortieren Sie Cassandra zum Helipad!\n", + /* 5*/ "Platzieren Sie den Sprengsatz!\n", + /* 6*/ "Eliminieren Sie den Sicherheitschef!\n", + /* 7*/ "Raus aus meinem Bro!\n", + /* 8*/ "Wenn Sie am Leben bleiben wollen, folgen Sie mir zum Helipad!\n", + /* 9*/ "Sie werden nicht auf mich schie゚en!\n", + /* 10*/ "Wie knnen Sie es wagen, mich zu stren?\n", + /* 11*/ "Sie werden es bereuen, hier eingedrungen zu sein.\n", + /* 12*/ "Wenn ich Sie w舐e, wrde ich verschwinden... SOFORT!\n", + /* 13*/ "Sie werden nicht auf mich schie゚en!\n", + /* 14*/ "Cassandra wurde eliminiert.\n", + /* 15*/ "Cassandra wurde erfolgreich gefangengenommen.\n", + /* 16*/ "Sicherheitschef eliminiert\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar-Bombe\n", + /* 20*/ "Skedar-Bombe\n", + /* 21*/ "Skedar-Bombe aufgenommen\n", + /* 22*/ "Die Skedar-Bombe wurde erfolgreich platziert.\n", + /* 23*/ "Die Skedar-Bombe ist detoniert.\n", + /* 24*/ "Die Aufzugstren sind verriegelt - Bombe kann nicht platziert werden.\n", + /* 25*/ "Aufzug inaktiv\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_i.c b/src/files/lang/jap-final/wax_str_i.c new file mode 100644 index 000000000..4a37745b7 --- /dev/null +++ b/src/files/lang/jap-final/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Elimina il presidente dataDyne\n\nElimina questo squallido individuo per prevenire ogni possibile tentativo di rappresaglia da parte di elementi residuali di questa azienda traditrice. Per quanto possa essere assurdo pensare che una sola persona possa annientare la razza umana, non dobbiamo sottovalutare la forza dell'odio e della vendetta.\n\n|Obiettivo 3: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 4*/ "Scova e scorta De Vries all'eliporto\n", + /* 5*/ "Piazza ordigno esplosivo in ascensore\n", + /* 6*/ "Elimina il presidente dataDyne\n", + /* 7*/ "Esci subito dal mio ufficio...\n", + /* 8*/ "Va all'eliporto se tieni alla pelle!\n", + /* 9*/ "Non vorrai mica spararmi...\n", + /* 10*/ "Come osi disturbarmi!\n", + /* 11*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 12*/ "Se fossi in te girerei al largo!\n", + /* 13*/ "Non vorrai mica spararmi...\n", + /* 14*/ "Cassandra immobilizzata!\n", + /* 15*/ "Cassandra stata catturata!\n", + /* 16*/ "Il capo della sicurezza stato eliminato.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Presa bomba Skedar\n", + /* 22*/ "La bomba Skedar in posizione corretta.\n", + /* 23*/ "La bomba Skedar esplosa.\n", + /* 24*/ "Porte ascensore bloccate: impossibile piazzare bomba.\n", + /* 25*/ "L'ascensore stato disattivato.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_s.c b/src/files/lang/jap-final/wax_str_s.c new file mode 100644 index 000000000..290b2e67c --- /dev/null +++ b/src/files/lang/jap-final/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitir que los ineptos cientficos de la Corporacin dataDyne continen investigando con nuestra tecnologa. Deber疽 colocar una bomba en el ascensor para destruir completamente sus investigaciones, adem疽 de las posibles evidencias fsicas.\n\n|Objetivo Dos: - Eliminar al Capit疣 de dataDyne\n\nSuprime a este individuo para acabar con cualquier represalia dirigida contra los Skedar por elementos residuales de la traidora corporacin. Aunque el concepto de un humano eliminando a la raza Skedar pueda resultar gracioso, no debemos cegarnos ante la fuerza de la venganza.\n\n|Objetivo Tres: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitir que los ineptos cientficos de la Corporacin dataDyne continen investigando con nuestra tecnologa. Deber疽 colocar una bomba en el ascensor para destruir completamente sus investigaciones, adem疽 de las posibles evidencias fsicas.\n\n|Objetivo Dos: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 4*/ "Buscar/guiar a Cassandra al helipuerto\n", + /* 5*/ "Colocar explosivo en ascensor del lab.\n", + /* 6*/ "Eliminar al Capit疣 de dataDyne\n", + /* 7*/ "Fuera de mi oficina...\n", + /* 8*/ "Ve al helipuerto si quieres vivir.\n", + /* 9*/ "。No me disparar疽!\n", + /* 10*/ "。Cmo te atreves a molestarme!\n", + /* 11*/ "Vas a lamentar esta intrusin, chica.\n", + /* 12*/ "Si yo fuera t, me marchara... 。AHORA!\n", + /* 13*/ "。No me disparar疽!\n", + /* 14*/ "Cassandra ha sido inmovilizada.\n", + /* 15*/ "Cassandra ha sido capturada con 騙ito.\n", + /* 16*/ "El jefe de seguridad ha sido eliminado.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Bomba Skedar recogida.\n", + /* 22*/ "La Bomba Skedar ha sido colocada con 騙ito.\n", + /* 23*/ "La Bomba Skedar ha sido detonada.\n", + /* 24*/ "Ascensor bloqueado. La bomba no puede ser colocada.\n", + /* 25*/ "El ascensor ha sido desactivado.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/ameE.c b/src/files/lang/ntsc-1.0/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ameJ.c b/src/files/lang/ntsc-1.0/ameJ.c similarity index 100% rename from src/files/lang/ameJ.c rename to src/files/lang/ntsc-1.0/ameJ.c diff --git a/src/files/lang/ameP.c b/src/files/lang/ntsc-1.0/ameP.c similarity index 100% rename from src/files/lang/ameP.c rename to src/files/lang/ntsc-1.0/ameP.c diff --git a/src/files/lang/ame_str_f.c b/src/files/lang/ntsc-1.0/ame_str_f.c similarity index 100% rename from src/files/lang/ame_str_f.c rename to src/files/lang/ntsc-1.0/ame_str_f.c diff --git a/src/files/lang/ame_str_g.c b/src/files/lang/ntsc-1.0/ame_str_g.c similarity index 100% rename from src/files/lang/ame_str_g.c rename to src/files/lang/ntsc-1.0/ame_str_g.c diff --git a/src/files/lang/ame_str_i.c b/src/files/lang/ntsc-1.0/ame_str_i.c similarity index 100% rename from src/files/lang/ame_str_i.c rename to src/files/lang/ntsc-1.0/ame_str_i.c diff --git a/src/files/lang/ame_str_s.c b/src/files/lang/ntsc-1.0/ame_str_s.c similarity index 100% rename from src/files/lang/ame_str_s.c rename to src/files/lang/ntsc-1.0/ame_str_s.c diff --git a/src/files/lang/ntsc-1.0/archE.c b/src/files/lang/ntsc-1.0/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/archJ.c b/src/files/lang/ntsc-1.0/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/archP.c b/src/files/lang/ntsc-1.0/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_f.c b/src/files/lang/ntsc-1.0/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_g.c b/src/files/lang/ntsc-1.0/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_i.c b/src/files/lang/ntsc-1.0/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_s.c b/src/files/lang/ntsc-1.0/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arecE.c b/src/files/lang/ntsc-1.0/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arecJ.c b/src/files/lang/ntsc-1.0/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arecP.c b/src/files/lang/ntsc-1.0/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_f.c b/src/files/lang/ntsc-1.0/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_g.c b/src/files/lang/ntsc-1.0/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_i.c b/src/files/lang/ntsc-1.0/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_s.c b/src/files/lang/ntsc-1.0/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arkE.c b/src/files/lang/ntsc-1.0/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/ntsc-1.0/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/arkJ.c b/src/files/lang/ntsc-1.0/arkJ.c similarity index 100% rename from src/files/lang/arkJ.c rename to src/files/lang/ntsc-1.0/arkJ.c diff --git a/src/files/lang/arkP.c b/src/files/lang/ntsc-1.0/arkP.c similarity index 100% rename from src/files/lang/arkP.c rename to src/files/lang/ntsc-1.0/arkP.c diff --git a/src/files/lang/ark_str_f.c b/src/files/lang/ntsc-1.0/ark_str_f.c similarity index 100% rename from src/files/lang/ark_str_f.c rename to src/files/lang/ntsc-1.0/ark_str_f.c diff --git a/src/files/lang/ark_str_g.c b/src/files/lang/ntsc-1.0/ark_str_g.c similarity index 100% rename from src/files/lang/ark_str_g.c rename to src/files/lang/ntsc-1.0/ark_str_g.c diff --git a/src/files/lang/ark_str_i.c b/src/files/lang/ntsc-1.0/ark_str_i.c similarity index 100% rename from src/files/lang/ark_str_i.c rename to src/files/lang/ntsc-1.0/ark_str_i.c diff --git a/src/files/lang/ark_str_s.c b/src/files/lang/ntsc-1.0/ark_str_s.c similarity index 100% rename from src/files/lang/ark_str_s.c rename to src/files/lang/ntsc-1.0/ark_str_s.c diff --git a/src/files/lang/ntsc-1.0/ashE.c b/src/files/lang/ntsc-1.0/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ashJ.c b/src/files/lang/ntsc-1.0/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ashP.c b/src/files/lang/ntsc-1.0/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_f.c b/src/files/lang/ntsc-1.0/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_g.c b/src/files/lang/ntsc-1.0/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_i.c b/src/files/lang/ntsc-1.0/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_s.c b/src/files/lang/ntsc-1.0/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ate_str_f.c b/src/files/lang/ntsc-1.0/ateE.c similarity index 100% rename from src/files/lang/ate_str_f.c rename to src/files/lang/ntsc-1.0/ateE.c diff --git a/src/files/lang/ateJ.c b/src/files/lang/ntsc-1.0/ateJ.c similarity index 100% rename from src/files/lang/ateJ.c rename to src/files/lang/ntsc-1.0/ateJ.c diff --git a/src/files/lang/ate_str_g.c b/src/files/lang/ntsc-1.0/ateP.c similarity index 100% rename from src/files/lang/ate_str_g.c rename to src/files/lang/ntsc-1.0/ateP.c diff --git a/src/files/lang/ate_str_i.c b/src/files/lang/ntsc-1.0/ate_str_f.c similarity index 100% rename from src/files/lang/ate_str_i.c rename to src/files/lang/ntsc-1.0/ate_str_f.c diff --git a/src/files/lang/ate_str_s.c b/src/files/lang/ntsc-1.0/ate_str_g.c similarity index 100% rename from src/files/lang/ate_str_s.c rename to src/files/lang/ntsc-1.0/ate_str_g.c diff --git a/src/files/lang/ntsc-1.0/ate_str_i.c b/src/files/lang/ntsc-1.0/ate_str_i.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/ate_str_s.c b/src/files/lang/ntsc-1.0/ate_str_s.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/aztE.c b/src/files/lang/ntsc-1.0/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/ntsc-1.0/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/aztJ.c b/src/files/lang/ntsc-1.0/aztJ.c similarity index 100% rename from src/files/lang/aztJ.c rename to src/files/lang/ntsc-1.0/aztJ.c diff --git a/src/files/lang/aztP.c b/src/files/lang/ntsc-1.0/aztP.c similarity index 100% rename from src/files/lang/aztP.c rename to src/files/lang/ntsc-1.0/aztP.c diff --git a/src/files/lang/azt_str_f.c b/src/files/lang/ntsc-1.0/azt_str_f.c similarity index 100% rename from src/files/lang/azt_str_f.c rename to src/files/lang/ntsc-1.0/azt_str_f.c diff --git a/src/files/lang/azt_str_g.c b/src/files/lang/ntsc-1.0/azt_str_g.c similarity index 100% rename from src/files/lang/azt_str_g.c rename to src/files/lang/ntsc-1.0/azt_str_g.c diff --git a/src/files/lang/azt_str_i.c b/src/files/lang/ntsc-1.0/azt_str_i.c similarity index 100% rename from src/files/lang/azt_str_i.c rename to src/files/lang/ntsc-1.0/azt_str_i.c diff --git a/src/files/lang/azt_str_s.c b/src/files/lang/ntsc-1.0/azt_str_s.c similarity index 100% rename from src/files/lang/azt_str_s.c rename to src/files/lang/ntsc-1.0/azt_str_s.c diff --git a/src/files/lang/ntsc-1.0/catE.c b/src/files/lang/ntsc-1.0/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/catJ.c b/src/files/lang/ntsc-1.0/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/catP.c b/src/files/lang/ntsc-1.0/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_f.c b/src/files/lang/ntsc-1.0/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_g.c b/src/files/lang/ntsc-1.0/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_i.c b/src/files/lang/ntsc-1.0/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_s.c b/src/files/lang/ntsc-1.0/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/caveE.c b/src/files/lang/ntsc-1.0/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/ntsc-1.0/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/caveJ.c b/src/files/lang/ntsc-1.0/caveJ.c similarity index 100% rename from src/files/lang/caveJ.c rename to src/files/lang/ntsc-1.0/caveJ.c diff --git a/src/files/lang/caveP.c b/src/files/lang/ntsc-1.0/caveP.c similarity index 100% rename from src/files/lang/caveP.c rename to src/files/lang/ntsc-1.0/caveP.c diff --git a/src/files/lang/cave_str_f.c b/src/files/lang/ntsc-1.0/cave_str_f.c similarity index 100% rename from src/files/lang/cave_str_f.c rename to src/files/lang/ntsc-1.0/cave_str_f.c diff --git a/src/files/lang/cave_str_g.c b/src/files/lang/ntsc-1.0/cave_str_g.c similarity index 100% rename from src/files/lang/cave_str_g.c rename to src/files/lang/ntsc-1.0/cave_str_g.c diff --git a/src/files/lang/cave_str_i.c b/src/files/lang/ntsc-1.0/cave_str_i.c similarity index 100% rename from src/files/lang/cave_str_i.c rename to src/files/lang/ntsc-1.0/cave_str_i.c diff --git a/src/files/lang/cave_str_s.c b/src/files/lang/ntsc-1.0/cave_str_s.c similarity index 100% rename from src/files/lang/cave_str_s.c rename to src/files/lang/ntsc-1.0/cave_str_s.c diff --git a/src/files/lang/ntsc-1.0/cradE.c b/src/files/lang/ntsc-1.0/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cradJ.c b/src/files/lang/ntsc-1.0/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cradP.c b/src/files/lang/ntsc-1.0/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_f.c b/src/files/lang/ntsc-1.0/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_g.c b/src/files/lang/ntsc-1.0/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_i.c b/src/files/lang/ntsc-1.0/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_s.c b/src/files/lang/ntsc-1.0/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crypE.c b/src/files/lang/ntsc-1.0/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crypJ.c b/src/files/lang/ntsc-1.0/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crypP.c b/src/files/lang/ntsc-1.0/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_f.c b/src/files/lang/ntsc-1.0/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_g.c b/src/files/lang/ntsc-1.0/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_i.c b/src/files/lang/ntsc-1.0/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_s.c b/src/files/lang/ntsc-1.0/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/damE.c b/src/files/lang/ntsc-1.0/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/ntsc-1.0/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/damJ.c b/src/files/lang/ntsc-1.0/damJ.c similarity index 100% rename from src/files/lang/damJ.c rename to src/files/lang/ntsc-1.0/damJ.c diff --git a/src/files/lang/damP.c b/src/files/lang/ntsc-1.0/damP.c similarity index 100% rename from src/files/lang/damP.c rename to src/files/lang/ntsc-1.0/damP.c diff --git a/src/files/lang/dam_str_f.c b/src/files/lang/ntsc-1.0/dam_str_f.c similarity index 100% rename from src/files/lang/dam_str_f.c rename to src/files/lang/ntsc-1.0/dam_str_f.c diff --git a/src/files/lang/dam_str_g.c b/src/files/lang/ntsc-1.0/dam_str_g.c similarity index 100% rename from src/files/lang/dam_str_g.c rename to src/files/lang/ntsc-1.0/dam_str_g.c diff --git a/src/files/lang/dam_str_i.c b/src/files/lang/ntsc-1.0/dam_str_i.c similarity index 100% rename from src/files/lang/dam_str_i.c rename to src/files/lang/ntsc-1.0/dam_str_i.c diff --git a/src/files/lang/dam_str_s.c b/src/files/lang/ntsc-1.0/dam_str_s.c similarity index 100% rename from src/files/lang/dam_str_s.c rename to src/files/lang/ntsc-1.0/dam_str_s.c diff --git a/src/files/lang/ntsc-1.0/depoE.c b/src/files/lang/ntsc-1.0/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/ntsc-1.0/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/depoJ.c b/src/files/lang/ntsc-1.0/depoJ.c similarity index 100% rename from src/files/lang/depoJ.c rename to src/files/lang/ntsc-1.0/depoJ.c diff --git a/src/files/lang/depoP.c b/src/files/lang/ntsc-1.0/depoP.c similarity index 100% rename from src/files/lang/depoP.c rename to src/files/lang/ntsc-1.0/depoP.c diff --git a/src/files/lang/depo_str_f.c b/src/files/lang/ntsc-1.0/depo_str_f.c similarity index 100% rename from src/files/lang/depo_str_f.c rename to src/files/lang/ntsc-1.0/depo_str_f.c diff --git a/src/files/lang/depo_str_g.c b/src/files/lang/ntsc-1.0/depo_str_g.c similarity index 100% rename from src/files/lang/depo_str_g.c rename to src/files/lang/ntsc-1.0/depo_str_g.c diff --git a/src/files/lang/depo_str_i.c b/src/files/lang/ntsc-1.0/depo_str_i.c similarity index 100% rename from src/files/lang/depo_str_i.c rename to src/files/lang/ntsc-1.0/depo_str_i.c diff --git a/src/files/lang/depo_str_s.c b/src/files/lang/ntsc-1.0/depo_str_s.c similarity index 100% rename from src/files/lang/depo_str_s.c rename to src/files/lang/ntsc-1.0/depo_str_s.c diff --git a/src/files/lang/ntsc-1.0/destE.c b/src/files/lang/ntsc-1.0/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/destJ.c b/src/files/lang/ntsc-1.0/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/destP.c b/src/files/lang/ntsc-1.0/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_f.c b/src/files/lang/ntsc-1.0/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_g.c b/src/files/lang/ntsc-1.0/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_i.c b/src/files/lang/ntsc-1.0/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_s.c b/src/files/lang/ntsc-1.0/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/dishE.c b/src/files/lang/ntsc-1.0/dishE.c similarity index 100% rename from src/files/lang/dishE.c rename to src/files/lang/ntsc-1.0/dishE.c diff --git a/src/files/lang/dishJ.c b/src/files/lang/ntsc-1.0/dishJ.c similarity index 100% rename from src/files/lang/dishJ.c rename to src/files/lang/ntsc-1.0/dishJ.c diff --git a/src/files/lang/dishP.c b/src/files/lang/ntsc-1.0/dishP.c similarity index 100% rename from src/files/lang/dishP.c rename to src/files/lang/ntsc-1.0/dishP.c diff --git a/src/files/lang/dish_str_f.c b/src/files/lang/ntsc-1.0/dish_str_f.c similarity index 100% rename from src/files/lang/dish_str_f.c rename to src/files/lang/ntsc-1.0/dish_str_f.c diff --git a/src/files/lang/dish_str_g.c b/src/files/lang/ntsc-1.0/dish_str_g.c similarity index 100% rename from src/files/lang/dish_str_g.c rename to src/files/lang/ntsc-1.0/dish_str_g.c diff --git a/src/files/lang/dish_str_i.c b/src/files/lang/ntsc-1.0/dish_str_i.c similarity index 100% rename from src/files/lang/dish_str_i.c rename to src/files/lang/ntsc-1.0/dish_str_i.c diff --git a/src/files/lang/dish_str_s.c b/src/files/lang/ntsc-1.0/dish_str_s.c similarity index 100% rename from src/files/lang/dish_str_s.c rename to src/files/lang/ntsc-1.0/dish_str_s.c diff --git a/src/files/lang/ntsc-1.0/earE.c b/src/files/lang/ntsc-1.0/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/ntsc-1.0/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/earJ.c b/src/files/lang/ntsc-1.0/earJ.c similarity index 100% rename from src/files/lang/earJ.c rename to src/files/lang/ntsc-1.0/earJ.c diff --git a/src/files/lang/earP.c b/src/files/lang/ntsc-1.0/earP.c similarity index 100% rename from src/files/lang/earP.c rename to src/files/lang/ntsc-1.0/earP.c diff --git a/src/files/lang/ear_str_f.c b/src/files/lang/ntsc-1.0/ear_str_f.c similarity index 100% rename from src/files/lang/ear_str_f.c rename to src/files/lang/ntsc-1.0/ear_str_f.c diff --git a/src/files/lang/ear_str_g.c b/src/files/lang/ntsc-1.0/ear_str_g.c similarity index 100% rename from src/files/lang/ear_str_g.c rename to src/files/lang/ntsc-1.0/ear_str_g.c diff --git a/src/files/lang/ear_str_i.c b/src/files/lang/ntsc-1.0/ear_str_i.c similarity index 100% rename from src/files/lang/ear_str_i.c rename to src/files/lang/ntsc-1.0/ear_str_i.c diff --git a/src/files/lang/ear_str_s.c b/src/files/lang/ntsc-1.0/ear_str_s.c similarity index 100% rename from src/files/lang/ear_str_s.c rename to src/files/lang/ntsc-1.0/ear_str_s.c diff --git a/src/files/lang/eldE.c b/src/files/lang/ntsc-1.0/eldE.c similarity index 100% rename from src/files/lang/eldE.c rename to src/files/lang/ntsc-1.0/eldE.c diff --git a/src/files/lang/eldJ.c b/src/files/lang/ntsc-1.0/eldJ.c similarity index 100% rename from src/files/lang/eldJ.c rename to src/files/lang/ntsc-1.0/eldJ.c diff --git a/src/files/lang/eldP.c b/src/files/lang/ntsc-1.0/eldP.c similarity index 100% rename from src/files/lang/eldP.c rename to src/files/lang/ntsc-1.0/eldP.c diff --git a/src/files/lang/eld_str_f.c b/src/files/lang/ntsc-1.0/eld_str_f.c similarity index 100% rename from src/files/lang/eld_str_f.c rename to src/files/lang/ntsc-1.0/eld_str_f.c diff --git a/src/files/lang/eld_str_g.c b/src/files/lang/ntsc-1.0/eld_str_g.c similarity index 100% rename from src/files/lang/eld_str_g.c rename to src/files/lang/ntsc-1.0/eld_str_g.c diff --git a/src/files/lang/eld_str_i.c b/src/files/lang/ntsc-1.0/eld_str_i.c similarity index 100% rename from src/files/lang/eld_str_i.c rename to src/files/lang/ntsc-1.0/eld_str_i.c diff --git a/src/files/lang/eld_str_s.c b/src/files/lang/ntsc-1.0/eld_str_s.c similarity index 100% rename from src/files/lang/eld_str_s.c rename to src/files/lang/ntsc-1.0/eld_str_s.c diff --git a/src/files/lang/gunE.c b/src/files/lang/ntsc-1.0/gunE.c similarity index 100% rename from src/files/lang/gunE.c rename to src/files/lang/ntsc-1.0/gunE.c diff --git a/src/files/lang/gunJ.c b/src/files/lang/ntsc-1.0/gunJ.c similarity index 100% rename from src/files/lang/gunJ.c rename to src/files/lang/ntsc-1.0/gunJ.c diff --git a/src/files/lang/gunP.c b/src/files/lang/ntsc-1.0/gunP.c similarity index 100% rename from src/files/lang/gunP.c rename to src/files/lang/ntsc-1.0/gunP.c diff --git a/src/files/lang/gun_str_f.c b/src/files/lang/ntsc-1.0/gun_str_f.c similarity index 100% rename from src/files/lang/gun_str_f.c rename to src/files/lang/ntsc-1.0/gun_str_f.c diff --git a/src/files/lang/gun_str_g.c b/src/files/lang/ntsc-1.0/gun_str_g.c similarity index 100% rename from src/files/lang/gun_str_g.c rename to src/files/lang/ntsc-1.0/gun_str_g.c diff --git a/src/files/lang/gun_str_i.c b/src/files/lang/ntsc-1.0/gun_str_i.c similarity index 100% rename from src/files/lang/gun_str_i.c rename to src/files/lang/ntsc-1.0/gun_str_i.c diff --git a/src/files/lang/gun_str_s.c b/src/files/lang/ntsc-1.0/gun_str_s.c similarity index 100% rename from src/files/lang/gun_str_s.c rename to src/files/lang/ntsc-1.0/gun_str_s.c diff --git a/src/files/lang/ntsc-1.0/impE.c b/src/files/lang/ntsc-1.0/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/ntsc-1.0/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/impJ.c b/src/files/lang/ntsc-1.0/impJ.c similarity index 100% rename from src/files/lang/impJ.c rename to src/files/lang/ntsc-1.0/impJ.c diff --git a/src/files/lang/impP.c b/src/files/lang/ntsc-1.0/impP.c similarity index 100% rename from src/files/lang/impP.c rename to src/files/lang/ntsc-1.0/impP.c diff --git a/src/files/lang/imp_str_f.c b/src/files/lang/ntsc-1.0/imp_str_f.c similarity index 100% rename from src/files/lang/imp_str_f.c rename to src/files/lang/ntsc-1.0/imp_str_f.c diff --git a/src/files/lang/imp_str_g.c b/src/files/lang/ntsc-1.0/imp_str_g.c similarity index 100% rename from src/files/lang/imp_str_g.c rename to src/files/lang/ntsc-1.0/imp_str_g.c diff --git a/src/files/lang/imp_str_i.c b/src/files/lang/ntsc-1.0/imp_str_i.c similarity index 100% rename from src/files/lang/imp_str_i.c rename to src/files/lang/ntsc-1.0/imp_str_i.c diff --git a/src/files/lang/imp_str_s.c b/src/files/lang/ntsc-1.0/imp_str_s.c similarity index 100% rename from src/files/lang/imp_str_s.c rename to src/files/lang/ntsc-1.0/imp_str_s.c diff --git a/src/files/lang/ntsc-1.0/junE.c b/src/files/lang/ntsc-1.0/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/junJ.c b/src/files/lang/ntsc-1.0/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/junP.c b/src/files/lang/ntsc-1.0/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_f.c b/src/files/lang/ntsc-1.0/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_g.c b/src/files/lang/ntsc-1.0/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_i.c b/src/files/lang/ntsc-1.0/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_s.c b/src/files/lang/ntsc-1.0/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lamE.c b/src/files/lang/ntsc-1.0/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lamJ.c b/src/files/lang/ntsc-1.0/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lamP.c b/src/files/lang/ntsc-1.0/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_f.c b/src/files/lang/ntsc-1.0/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_g.c b/src/files/lang/ntsc-1.0/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_i.c b/src/files/lang/ntsc-1.0/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_s.c b/src/files/lang/ntsc-1.0/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/leeE.c b/src/files/lang/ntsc-1.0/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/ntsc-1.0/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/leeJ.c b/src/files/lang/ntsc-1.0/leeJ.c similarity index 100% rename from src/files/lang/leeJ.c rename to src/files/lang/ntsc-1.0/leeJ.c diff --git a/src/files/lang/leeP.c b/src/files/lang/ntsc-1.0/leeP.c similarity index 100% rename from src/files/lang/leeP.c rename to src/files/lang/ntsc-1.0/leeP.c diff --git a/src/files/lang/lee_str_f.c b/src/files/lang/ntsc-1.0/lee_str_f.c similarity index 100% rename from src/files/lang/lee_str_f.c rename to src/files/lang/ntsc-1.0/lee_str_f.c diff --git a/src/files/lang/lee_str_g.c b/src/files/lang/ntsc-1.0/lee_str_g.c similarity index 100% rename from src/files/lang/lee_str_g.c rename to src/files/lang/ntsc-1.0/lee_str_g.c diff --git a/src/files/lang/lee_str_i.c b/src/files/lang/ntsc-1.0/lee_str_i.c similarity index 100% rename from src/files/lang/lee_str_i.c rename to src/files/lang/ntsc-1.0/lee_str_i.c diff --git a/src/files/lang/lee_str_s.c b/src/files/lang/ntsc-1.0/lee_str_s.c similarity index 100% rename from src/files/lang/lee_str_s.c rename to src/files/lang/ntsc-1.0/lee_str_s.c diff --git a/src/files/lang/ntsc-1.0/lenE.c b/src/files/lang/ntsc-1.0/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lenJ.c b/src/files/lang/ntsc-1.0/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lenP.c b/src/files/lang/ntsc-1.0/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_f.c b/src/files/lang/ntsc-1.0/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_g.c b/src/files/lang/ntsc-1.0/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_i.c b/src/files/lang/ntsc-1.0/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_s.c b/src/files/lang/ntsc-1.0/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lipE.c b/src/files/lang/ntsc-1.0/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/lipJ.c b/src/files/lang/ntsc-1.0/lipJ.c similarity index 100% rename from src/files/lang/lipJ.c rename to src/files/lang/ntsc-1.0/lipJ.c diff --git a/src/files/lang/lipP.c b/src/files/lang/ntsc-1.0/lipP.c similarity index 100% rename from src/files/lang/lipP.c rename to src/files/lang/ntsc-1.0/lipP.c diff --git a/src/files/lang/lip_str_f.c b/src/files/lang/ntsc-1.0/lip_str_f.c similarity index 100% rename from src/files/lang/lip_str_f.c rename to src/files/lang/ntsc-1.0/lip_str_f.c diff --git a/src/files/lang/lip_str_g.c b/src/files/lang/ntsc-1.0/lip_str_g.c similarity index 100% rename from src/files/lang/lip_str_g.c rename to src/files/lang/ntsc-1.0/lip_str_g.c diff --git a/src/files/lang/lip_str_i.c b/src/files/lang/ntsc-1.0/lip_str_i.c similarity index 100% rename from src/files/lang/lip_str_i.c rename to src/files/lang/ntsc-1.0/lip_str_i.c diff --git a/src/files/lang/lip_str_s.c b/src/files/lang/ntsc-1.0/lip_str_s.c similarity index 100% rename from src/files/lang/lip_str_s.c rename to src/files/lang/ntsc-1.0/lip_str_s.c diff --git a/src/files/lang/ntsc-1.0/lueE.c b/src/files/lang/ntsc-1.0/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/lueJ.c b/src/files/lang/ntsc-1.0/lueJ.c similarity index 100% rename from src/files/lang/lueJ.c rename to src/files/lang/ntsc-1.0/lueJ.c diff --git a/src/files/lang/lueP.c b/src/files/lang/ntsc-1.0/lueP.c similarity index 100% rename from src/files/lang/lueP.c rename to src/files/lang/ntsc-1.0/lueP.c diff --git a/src/files/lang/lue_str_f.c b/src/files/lang/ntsc-1.0/lue_str_f.c similarity index 100% rename from src/files/lang/lue_str_f.c rename to src/files/lang/ntsc-1.0/lue_str_f.c diff --git a/src/files/lang/lue_str_g.c b/src/files/lang/ntsc-1.0/lue_str_g.c similarity index 100% rename from src/files/lang/lue_str_g.c rename to src/files/lang/ntsc-1.0/lue_str_g.c diff --git a/src/files/lang/lue_str_i.c b/src/files/lang/ntsc-1.0/lue_str_i.c similarity index 100% rename from src/files/lang/lue_str_i.c rename to src/files/lang/ntsc-1.0/lue_str_i.c diff --git a/src/files/lang/lue_str_s.c b/src/files/lang/ntsc-1.0/lue_str_s.c similarity index 100% rename from src/files/lang/lue_str_s.c rename to src/files/lang/ntsc-1.0/lue_str_s.c diff --git a/src/files/lang/miscE.c b/src/files/lang/ntsc-1.0/miscE.c similarity index 100% rename from src/files/lang/miscE.c rename to src/files/lang/ntsc-1.0/miscE.c diff --git a/src/files/lang/miscJ.c b/src/files/lang/ntsc-1.0/miscJ.c similarity index 100% rename from src/files/lang/miscJ.c rename to src/files/lang/ntsc-1.0/miscJ.c diff --git a/src/files/lang/miscP.c b/src/files/lang/ntsc-1.0/miscP.c similarity index 100% rename from src/files/lang/miscP.c rename to src/files/lang/ntsc-1.0/miscP.c diff --git a/src/files/lang/misc_str_f.c b/src/files/lang/ntsc-1.0/misc_str_f.c similarity index 100% rename from src/files/lang/misc_str_f.c rename to src/files/lang/ntsc-1.0/misc_str_f.c diff --git a/src/files/lang/misc_str_g.c b/src/files/lang/ntsc-1.0/misc_str_g.c similarity index 100% rename from src/files/lang/misc_str_g.c rename to src/files/lang/ntsc-1.0/misc_str_g.c diff --git a/src/files/lang/misc_str_i.c b/src/files/lang/ntsc-1.0/misc_str_i.c similarity index 100% rename from src/files/lang/misc_str_i.c rename to src/files/lang/ntsc-1.0/misc_str_i.c diff --git a/src/files/lang/misc_str_s.c b/src/files/lang/ntsc-1.0/misc_str_s.c similarity index 100% rename from src/files/lang/misc_str_s.c rename to src/files/lang/ntsc-1.0/misc_str_s.c diff --git a/src/files/lang/ntsc-1.0/mp10E.c b/src/files/lang/ntsc-1.0/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10J.c b/src/files/lang/ntsc-1.0/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10P.c b/src/files/lang/ntsc-1.0/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_f.c b/src/files/lang/ntsc-1.0/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_g.c b/src/files/lang/ntsc-1.0/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_i.c b/src/files/lang/ntsc-1.0/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_s.c b/src/files/lang/ntsc-1.0/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11E.c b/src/files/lang/ntsc-1.0/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11J.c b/src/files/lang/ntsc-1.0/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11P.c b/src/files/lang/ntsc-1.0/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_f.c b/src/files/lang/ntsc-1.0/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_g.c b/src/files/lang/ntsc-1.0/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_i.c b/src/files/lang/ntsc-1.0/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_s.c b/src/files/lang/ntsc-1.0/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12E.c b/src/files/lang/ntsc-1.0/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12J.c b/src/files/lang/ntsc-1.0/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12P.c b/src/files/lang/ntsc-1.0/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_f.c b/src/files/lang/ntsc-1.0/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_g.c b/src/files/lang/ntsc-1.0/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_i.c b/src/files/lang/ntsc-1.0/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_s.c b/src/files/lang/ntsc-1.0/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13E.c b/src/files/lang/ntsc-1.0/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13J.c b/src/files/lang/ntsc-1.0/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13P.c b/src/files/lang/ntsc-1.0/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_f.c b/src/files/lang/ntsc-1.0/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_g.c b/src/files/lang/ntsc-1.0/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_i.c b/src/files/lang/ntsc-1.0/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_s.c b/src/files/lang/ntsc-1.0/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14E.c b/src/files/lang/ntsc-1.0/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14J.c b/src/files/lang/ntsc-1.0/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14P.c b/src/files/lang/ntsc-1.0/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_f.c b/src/files/lang/ntsc-1.0/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_g.c b/src/files/lang/ntsc-1.0/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_i.c b/src/files/lang/ntsc-1.0/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_s.c b/src/files/lang/ntsc-1.0/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15E.c b/src/files/lang/ntsc-1.0/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15J.c b/src/files/lang/ntsc-1.0/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15P.c b/src/files/lang/ntsc-1.0/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_f.c b/src/files/lang/ntsc-1.0/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_g.c b/src/files/lang/ntsc-1.0/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_i.c b/src/files/lang/ntsc-1.0/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_s.c b/src/files/lang/ntsc-1.0/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16E.c b/src/files/lang/ntsc-1.0/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16J.c b/src/files/lang/ntsc-1.0/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16P.c b/src/files/lang/ntsc-1.0/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_f.c b/src/files/lang/ntsc-1.0/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_g.c b/src/files/lang/ntsc-1.0/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_i.c b/src/files/lang/ntsc-1.0/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_s.c b/src/files/lang/ntsc-1.0/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17E.c b/src/files/lang/ntsc-1.0/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17J.c b/src/files/lang/ntsc-1.0/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17P.c b/src/files/lang/ntsc-1.0/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_f.c b/src/files/lang/ntsc-1.0/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_g.c b/src/files/lang/ntsc-1.0/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_i.c b/src/files/lang/ntsc-1.0/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_s.c b/src/files/lang/ntsc-1.0/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18E.c b/src/files/lang/ntsc-1.0/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18J.c b/src/files/lang/ntsc-1.0/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18P.c b/src/files/lang/ntsc-1.0/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_f.c b/src/files/lang/ntsc-1.0/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_g.c b/src/files/lang/ntsc-1.0/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_i.c b/src/files/lang/ntsc-1.0/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_s.c b/src/files/lang/ntsc-1.0/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19E.c b/src/files/lang/ntsc-1.0/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19J.c b/src/files/lang/ntsc-1.0/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19P.c b/src/files/lang/ntsc-1.0/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_f.c b/src/files/lang/ntsc-1.0/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_g.c b/src/files/lang/ntsc-1.0/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_i.c b/src/files/lang/ntsc-1.0/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_s.c b/src/files/lang/ntsc-1.0/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1E.c b/src/files/lang/ntsc-1.0/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1J.c b/src/files/lang/ntsc-1.0/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1P.c b/src/files/lang/ntsc-1.0/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_f.c b/src/files/lang/ntsc-1.0/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_g.c b/src/files/lang/ntsc-1.0/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_i.c b/src/files/lang/ntsc-1.0/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_s.c b/src/files/lang/ntsc-1.0/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20E.c b/src/files/lang/ntsc-1.0/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20J.c b/src/files/lang/ntsc-1.0/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20P.c b/src/files/lang/ntsc-1.0/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_f.c b/src/files/lang/ntsc-1.0/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_g.c b/src/files/lang/ntsc-1.0/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_i.c b/src/files/lang/ntsc-1.0/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_s.c b/src/files/lang/ntsc-1.0/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2E.c b/src/files/lang/ntsc-1.0/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2J.c b/src/files/lang/ntsc-1.0/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2P.c b/src/files/lang/ntsc-1.0/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_f.c b/src/files/lang/ntsc-1.0/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_g.c b/src/files/lang/ntsc-1.0/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_i.c b/src/files/lang/ntsc-1.0/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_s.c b/src/files/lang/ntsc-1.0/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3E.c b/src/files/lang/ntsc-1.0/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3J.c b/src/files/lang/ntsc-1.0/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3P.c b/src/files/lang/ntsc-1.0/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_f.c b/src/files/lang/ntsc-1.0/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_g.c b/src/files/lang/ntsc-1.0/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_i.c b/src/files/lang/ntsc-1.0/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_s.c b/src/files/lang/ntsc-1.0/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4E.c b/src/files/lang/ntsc-1.0/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4J.c b/src/files/lang/ntsc-1.0/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4P.c b/src/files/lang/ntsc-1.0/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_f.c b/src/files/lang/ntsc-1.0/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_g.c b/src/files/lang/ntsc-1.0/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_i.c b/src/files/lang/ntsc-1.0/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_s.c b/src/files/lang/ntsc-1.0/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5E.c b/src/files/lang/ntsc-1.0/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5J.c b/src/files/lang/ntsc-1.0/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5P.c b/src/files/lang/ntsc-1.0/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_f.c b/src/files/lang/ntsc-1.0/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_g.c b/src/files/lang/ntsc-1.0/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_i.c b/src/files/lang/ntsc-1.0/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_s.c b/src/files/lang/ntsc-1.0/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6E.c b/src/files/lang/ntsc-1.0/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6J.c b/src/files/lang/ntsc-1.0/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6P.c b/src/files/lang/ntsc-1.0/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_f.c b/src/files/lang/ntsc-1.0/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_g.c b/src/files/lang/ntsc-1.0/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_i.c b/src/files/lang/ntsc-1.0/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_s.c b/src/files/lang/ntsc-1.0/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7E.c b/src/files/lang/ntsc-1.0/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7J.c b/src/files/lang/ntsc-1.0/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7P.c b/src/files/lang/ntsc-1.0/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_f.c b/src/files/lang/ntsc-1.0/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_g.c b/src/files/lang/ntsc-1.0/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_i.c b/src/files/lang/ntsc-1.0/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_s.c b/src/files/lang/ntsc-1.0/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8E.c b/src/files/lang/ntsc-1.0/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8J.c b/src/files/lang/ntsc-1.0/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8P.c b/src/files/lang/ntsc-1.0/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_f.c b/src/files/lang/ntsc-1.0/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_g.c b/src/files/lang/ntsc-1.0/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_i.c b/src/files/lang/ntsc-1.0/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_s.c b/src/files/lang/ntsc-1.0/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9E.c b/src/files/lang/ntsc-1.0/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9J.c b/src/files/lang/ntsc-1.0/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9P.c b/src/files/lang/ntsc-1.0/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_f.c b/src/files/lang/ntsc-1.0/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_g.c b/src/files/lang/ntsc-1.0/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_i.c b/src/files/lang/ntsc-1.0/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_s.c b/src/files/lang/ntsc-1.0/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mpmenuE.c b/src/files/lang/ntsc-1.0/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/mpmenuJ.c b/src/files/lang/ntsc-1.0/mpmenuJ.c similarity index 100% rename from src/files/lang/mpmenuJ.c rename to src/files/lang/ntsc-1.0/mpmenuJ.c diff --git a/src/files/lang/mpmenuP.c b/src/files/lang/ntsc-1.0/mpmenuP.c similarity index 100% rename from src/files/lang/mpmenuP.c rename to src/files/lang/ntsc-1.0/mpmenuP.c diff --git a/src/files/lang/mpmenu_str_f.c b/src/files/lang/ntsc-1.0/mpmenu_str_f.c similarity index 100% rename from src/files/lang/mpmenu_str_f.c rename to src/files/lang/ntsc-1.0/mpmenu_str_f.c diff --git a/src/files/lang/mpmenu_str_g.c b/src/files/lang/ntsc-1.0/mpmenu_str_g.c similarity index 100% rename from src/files/lang/mpmenu_str_g.c rename to src/files/lang/ntsc-1.0/mpmenu_str_g.c diff --git a/src/files/lang/mpmenu_str_i.c b/src/files/lang/ntsc-1.0/mpmenu_str_i.c similarity index 100% rename from src/files/lang/mpmenu_str_i.c rename to src/files/lang/ntsc-1.0/mpmenu_str_i.c diff --git a/src/files/lang/mpmenu_str_s.c b/src/files/lang/ntsc-1.0/mpmenu_str_s.c similarity index 100% rename from src/files/lang/mpmenu_str_s.c rename to src/files/lang/ntsc-1.0/mpmenu_str_s.c diff --git a/src/files/lang/mpweaponsE.c b/src/files/lang/ntsc-1.0/mpweaponsE.c similarity index 100% rename from src/files/lang/mpweaponsE.c rename to src/files/lang/ntsc-1.0/mpweaponsE.c diff --git a/src/files/lang/mpweaponsJ.c b/src/files/lang/ntsc-1.0/mpweaponsJ.c similarity index 100% rename from src/files/lang/mpweaponsJ.c rename to src/files/lang/ntsc-1.0/mpweaponsJ.c diff --git a/src/files/lang/mpweaponsP.c b/src/files/lang/ntsc-1.0/mpweaponsP.c similarity index 100% rename from src/files/lang/mpweaponsP.c rename to src/files/lang/ntsc-1.0/mpweaponsP.c diff --git a/src/files/lang/mpweapons_str_f.c b/src/files/lang/ntsc-1.0/mpweapons_str_f.c similarity index 100% rename from src/files/lang/mpweapons_str_f.c rename to src/files/lang/ntsc-1.0/mpweapons_str_f.c diff --git a/src/files/lang/mpweapons_str_g.c b/src/files/lang/ntsc-1.0/mpweapons_str_g.c similarity index 100% rename from src/files/lang/mpweapons_str_g.c rename to src/files/lang/ntsc-1.0/mpweapons_str_g.c diff --git a/src/files/lang/mpweapons_str_i.c b/src/files/lang/ntsc-1.0/mpweapons_str_i.c similarity index 100% rename from src/files/lang/mpweapons_str_i.c rename to src/files/lang/ntsc-1.0/mpweapons_str_i.c diff --git a/src/files/lang/mpweapons_str_s.c b/src/files/lang/ntsc-1.0/mpweapons_str_s.c similarity index 100% rename from src/files/lang/mpweapons_str_s.c rename to src/files/lang/ntsc-1.0/mpweapons_str_s.c diff --git a/src/files/lang/ntsc-1.0/oatE.c b/src/files/lang/ntsc-1.0/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oatJ.c b/src/files/lang/ntsc-1.0/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oatP.c b/src/files/lang/ntsc-1.0/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_f.c b/src/files/lang/ntsc-1.0/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_g.c b/src/files/lang/ntsc-1.0/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_i.c b/src/files/lang/ntsc-1.0/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_s.c b/src/files/lang/ntsc-1.0/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oldE.c b/src/files/lang/ntsc-1.0/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oldJ.c b/src/files/lang/ntsc-1.0/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oldP.c b/src/files/lang/ntsc-1.0/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_f.c b/src/files/lang/ntsc-1.0/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_g.c b/src/files/lang/ntsc-1.0/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_i.c b/src/files/lang/ntsc-1.0/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_s.c b/src/files/lang/ntsc-1.0/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/optionsE.c b/src/files/lang/ntsc-1.0/optionsE.c similarity index 100% rename from src/files/lang/optionsE.c rename to src/files/lang/ntsc-1.0/optionsE.c diff --git a/src/files/lang/optionsJ.c b/src/files/lang/ntsc-1.0/optionsJ.c similarity index 100% rename from src/files/lang/optionsJ.c rename to src/files/lang/ntsc-1.0/optionsJ.c diff --git a/src/files/lang/optionsP.c b/src/files/lang/ntsc-1.0/optionsP.c similarity index 100% rename from src/files/lang/optionsP.c rename to src/files/lang/ntsc-1.0/optionsP.c diff --git a/src/files/lang/options_str_f.c b/src/files/lang/ntsc-1.0/options_str_f.c similarity index 100% rename from src/files/lang/options_str_f.c rename to src/files/lang/ntsc-1.0/options_str_f.c diff --git a/src/files/lang/options_str_g.c b/src/files/lang/ntsc-1.0/options_str_g.c similarity index 100% rename from src/files/lang/options_str_g.c rename to src/files/lang/ntsc-1.0/options_str_g.c diff --git a/src/files/lang/options_str_i.c b/src/files/lang/ntsc-1.0/options_str_i.c similarity index 100% rename from src/files/lang/options_str_i.c rename to src/files/lang/ntsc-1.0/options_str_i.c diff --git a/src/files/lang/options_str_s.c b/src/files/lang/ntsc-1.0/options_str_s.c similarity index 100% rename from src/files/lang/options_str_s.c rename to src/files/lang/ntsc-1.0/options_str_s.c diff --git a/src/files/lang/ntsc-1.0/pamE.c b/src/files/lang/ntsc-1.0/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/ntsc-1.0/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pamJ.c b/src/files/lang/ntsc-1.0/pamJ.c similarity index 100% rename from src/files/lang/pamJ.c rename to src/files/lang/ntsc-1.0/pamJ.c diff --git a/src/files/lang/pamP.c b/src/files/lang/ntsc-1.0/pamP.c similarity index 100% rename from src/files/lang/pamP.c rename to src/files/lang/ntsc-1.0/pamP.c diff --git a/src/files/lang/pam_str_f.c b/src/files/lang/ntsc-1.0/pam_str_f.c similarity index 100% rename from src/files/lang/pam_str_f.c rename to src/files/lang/ntsc-1.0/pam_str_f.c diff --git a/src/files/lang/pam_str_g.c b/src/files/lang/ntsc-1.0/pam_str_g.c similarity index 100% rename from src/files/lang/pam_str_g.c rename to src/files/lang/ntsc-1.0/pam_str_g.c diff --git a/src/files/lang/pam_str_i.c b/src/files/lang/ntsc-1.0/pam_str_i.c similarity index 100% rename from src/files/lang/pam_str_i.c rename to src/files/lang/ntsc-1.0/pam_str_i.c diff --git a/src/files/lang/pam_str_s.c b/src/files/lang/ntsc-1.0/pam_str_s.c similarity index 100% rename from src/files/lang/pam_str_s.c rename to src/files/lang/ntsc-1.0/pam_str_s.c diff --git a/src/files/lang/ntsc-1.0/peteE.c b/src/files/lang/ntsc-1.0/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/ntsc-1.0/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/peteJ.c b/src/files/lang/ntsc-1.0/peteJ.c similarity index 100% rename from src/files/lang/peteJ.c rename to src/files/lang/ntsc-1.0/peteJ.c diff --git a/src/files/lang/peteP.c b/src/files/lang/ntsc-1.0/peteP.c similarity index 100% rename from src/files/lang/peteP.c rename to src/files/lang/ntsc-1.0/peteP.c diff --git a/src/files/lang/pete_str_f.c b/src/files/lang/ntsc-1.0/pete_str_f.c similarity index 100% rename from src/files/lang/pete_str_f.c rename to src/files/lang/ntsc-1.0/pete_str_f.c diff --git a/src/files/lang/pete_str_g.c b/src/files/lang/ntsc-1.0/pete_str_g.c similarity index 100% rename from src/files/lang/pete_str_g.c rename to src/files/lang/ntsc-1.0/pete_str_g.c diff --git a/src/files/lang/pete_str_i.c b/src/files/lang/ntsc-1.0/pete_str_i.c similarity index 100% rename from src/files/lang/pete_str_i.c rename to src/files/lang/ntsc-1.0/pete_str_i.c diff --git a/src/files/lang/pete_str_s.c b/src/files/lang/ntsc-1.0/pete_str_s.c similarity index 100% rename from src/files/lang/pete_str_s.c rename to src/files/lang/ntsc-1.0/pete_str_s.c diff --git a/src/files/lang/propobjE.c b/src/files/lang/ntsc-1.0/propobjE.c similarity index 100% rename from src/files/lang/propobjE.c rename to src/files/lang/ntsc-1.0/propobjE.c diff --git a/src/files/lang/propobjJ.c b/src/files/lang/ntsc-1.0/propobjJ.c similarity index 100% rename from src/files/lang/propobjJ.c rename to src/files/lang/ntsc-1.0/propobjJ.c diff --git a/src/files/lang/propobjP.c b/src/files/lang/ntsc-1.0/propobjP.c similarity index 100% rename from src/files/lang/propobjP.c rename to src/files/lang/ntsc-1.0/propobjP.c diff --git a/src/files/lang/propobj_str_f.c b/src/files/lang/ntsc-1.0/propobj_str_f.c similarity index 100% rename from src/files/lang/propobj_str_f.c rename to src/files/lang/ntsc-1.0/propobj_str_f.c diff --git a/src/files/lang/propobj_str_g.c b/src/files/lang/ntsc-1.0/propobj_str_g.c similarity index 100% rename from src/files/lang/propobj_str_g.c rename to src/files/lang/ntsc-1.0/propobj_str_g.c diff --git a/src/files/lang/propobj_str_i.c b/src/files/lang/ntsc-1.0/propobj_str_i.c similarity index 100% rename from src/files/lang/propobj_str_i.c rename to src/files/lang/ntsc-1.0/propobj_str_i.c diff --git a/src/files/lang/propobj_str_s.c b/src/files/lang/ntsc-1.0/propobj_str_s.c similarity index 100% rename from src/files/lang/propobj_str_s.c rename to src/files/lang/ntsc-1.0/propobj_str_s.c diff --git a/src/files/lang/ntsc-1.0/refE.c b/src/files/lang/ntsc-1.0/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/refJ.c b/src/files/lang/ntsc-1.0/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/refP.c b/src/files/lang/ntsc-1.0/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_f.c b/src/files/lang/ntsc-1.0/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_g.c b/src/files/lang/ntsc-1.0/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_i.c b/src/files/lang/ntsc-1.0/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_s.c b/src/files/lang/ntsc-1.0/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ritE.c b/src/files/lang/ntsc-1.0/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ritJ.c b/src/files/lang/ntsc-1.0/ritJ.c similarity index 100% rename from src/files/lang/ritJ.c rename to src/files/lang/ntsc-1.0/ritJ.c diff --git a/src/files/lang/ritP.c b/src/files/lang/ntsc-1.0/ritP.c similarity index 100% rename from src/files/lang/ritP.c rename to src/files/lang/ntsc-1.0/ritP.c diff --git a/src/files/lang/rit_str_f.c b/src/files/lang/ntsc-1.0/rit_str_f.c similarity index 100% rename from src/files/lang/rit_str_f.c rename to src/files/lang/ntsc-1.0/rit_str_f.c diff --git a/src/files/lang/rit_str_g.c b/src/files/lang/ntsc-1.0/rit_str_g.c similarity index 100% rename from src/files/lang/rit_str_g.c rename to src/files/lang/ntsc-1.0/rit_str_g.c diff --git a/src/files/lang/rit_str_i.c b/src/files/lang/ntsc-1.0/rit_str_i.c similarity index 100% rename from src/files/lang/rit_str_i.c rename to src/files/lang/ntsc-1.0/rit_str_i.c diff --git a/src/files/lang/rit_str_s.c b/src/files/lang/ntsc-1.0/rit_str_s.c similarity index 100% rename from src/files/lang/rit_str_s.c rename to src/files/lang/ntsc-1.0/rit_str_s.c diff --git a/src/files/lang/ntsc-1.0/runE.c b/src/files/lang/ntsc-1.0/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/runJ.c b/src/files/lang/ntsc-1.0/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/runP.c b/src/files/lang/ntsc-1.0/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_f.c b/src/files/lang/ntsc-1.0/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_g.c b/src/files/lang/ntsc-1.0/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_i.c b/src/files/lang/ntsc-1.0/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_s.c b/src/files/lang/ntsc-1.0/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevE.c b/src/files/lang/ntsc-1.0/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/sevJ.c b/src/files/lang/ntsc-1.0/sevJ.c similarity index 100% rename from src/files/lang/sevJ.c rename to src/files/lang/ntsc-1.0/sevJ.c diff --git a/src/files/lang/sevP.c b/src/files/lang/ntsc-1.0/sevP.c similarity index 100% rename from src/files/lang/sevP.c rename to src/files/lang/ntsc-1.0/sevP.c diff --git a/src/files/lang/sev_str_f.c b/src/files/lang/ntsc-1.0/sev_str_f.c similarity index 100% rename from src/files/lang/sev_str_f.c rename to src/files/lang/ntsc-1.0/sev_str_f.c diff --git a/src/files/lang/sev_str_g.c b/src/files/lang/ntsc-1.0/sev_str_g.c similarity index 100% rename from src/files/lang/sev_str_g.c rename to src/files/lang/ntsc-1.0/sev_str_g.c diff --git a/src/files/lang/sev_str_i.c b/src/files/lang/ntsc-1.0/sev_str_i.c similarity index 100% rename from src/files/lang/sev_str_i.c rename to src/files/lang/ntsc-1.0/sev_str_i.c diff --git a/src/files/lang/sev_str_s.c b/src/files/lang/ntsc-1.0/sev_str_s.c similarity index 100% rename from src/files/lang/sev_str_s.c rename to src/files/lang/ntsc-1.0/sev_str_s.c diff --git a/src/files/lang/ntsc-1.0/sevbE.c b/src/files/lang/ntsc-1.0/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevbJ.c b/src/files/lang/ntsc-1.0/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevbP.c b/src/files/lang/ntsc-1.0/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_f.c b/src/files/lang/ntsc-1.0/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_g.c b/src/files/lang/ntsc-1.0/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_i.c b/src/files/lang/ntsc-1.0/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_s.c b/src/files/lang/ntsc-1.0/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevxE.c b/src/files/lang/ntsc-1.0/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxJ.c b/src/files/lang/ntsc-1.0/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxP.c b/src/files/lang/ntsc-1.0/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_f.c b/src/files/lang/ntsc-1.0/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_g.c b/src/files/lang/ntsc-1.0/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_i.c b/src/files/lang/ntsc-1.0/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_s.c b/src/files/lang/ntsc-1.0/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxbE.c b/src/files/lang/ntsc-1.0/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxbJ.c b/src/files/lang/ntsc-1.0/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxbP.c b/src/files/lang/ntsc-1.0/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_f.c b/src/files/lang/ntsc-1.0/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_g.c b/src/files/lang/ntsc-1.0/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_i.c b/src/files/lang/ntsc-1.0/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_s.c b/src/files/lang/ntsc-1.0/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/shoE.c b/src/files/lang/ntsc-1.0/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/ntsc-1.0/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/shoJ.c b/src/files/lang/ntsc-1.0/shoJ.c similarity index 100% rename from src/files/lang/shoJ.c rename to src/files/lang/ntsc-1.0/shoJ.c diff --git a/src/files/lang/shoP.c b/src/files/lang/ntsc-1.0/shoP.c similarity index 100% rename from src/files/lang/shoP.c rename to src/files/lang/ntsc-1.0/shoP.c diff --git a/src/files/lang/sho_str_f.c b/src/files/lang/ntsc-1.0/sho_str_f.c similarity index 100% rename from src/files/lang/sho_str_f.c rename to src/files/lang/ntsc-1.0/sho_str_f.c diff --git a/src/files/lang/sho_str_g.c b/src/files/lang/ntsc-1.0/sho_str_g.c similarity index 100% rename from src/files/lang/sho_str_g.c rename to src/files/lang/ntsc-1.0/sho_str_g.c diff --git a/src/files/lang/sho_str_i.c b/src/files/lang/ntsc-1.0/sho_str_i.c similarity index 100% rename from src/files/lang/sho_str_i.c rename to src/files/lang/ntsc-1.0/sho_str_i.c diff --git a/src/files/lang/sho_str_s.c b/src/files/lang/ntsc-1.0/sho_str_s.c similarity index 100% rename from src/files/lang/sho_str_s.c rename to src/files/lang/ntsc-1.0/sho_str_s.c diff --git a/src/files/lang/ntsc-1.0/siloE.c b/src/files/lang/ntsc-1.0/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/siloJ.c b/src/files/lang/ntsc-1.0/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/siloP.c b/src/files/lang/ntsc-1.0/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_f.c b/src/files/lang/ntsc-1.0/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_g.c b/src/files/lang/ntsc-1.0/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_i.c b/src/files/lang/ntsc-1.0/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_s.c b/src/files/lang/ntsc-1.0/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/stat_str_f.c b/src/files/lang/ntsc-1.0/statE.c similarity index 100% rename from src/files/lang/stat_str_f.c rename to src/files/lang/ntsc-1.0/statE.c diff --git a/src/files/lang/statJ.c b/src/files/lang/ntsc-1.0/statJ.c similarity index 100% rename from src/files/lang/statJ.c rename to src/files/lang/ntsc-1.0/statJ.c diff --git a/src/files/lang/stat_str_g.c b/src/files/lang/ntsc-1.0/statP.c similarity index 100% rename from src/files/lang/stat_str_g.c rename to src/files/lang/ntsc-1.0/statP.c diff --git a/src/files/lang/stat_str_i.c b/src/files/lang/ntsc-1.0/stat_str_f.c similarity index 100% rename from src/files/lang/stat_str_i.c rename to src/files/lang/ntsc-1.0/stat_str_f.c diff --git a/src/files/lang/stat_str_s.c b/src/files/lang/ntsc-1.0/stat_str_g.c similarity index 100% rename from src/files/lang/stat_str_s.c rename to src/files/lang/ntsc-1.0/stat_str_g.c diff --git a/src/files/lang/ntsc-1.0/stat_str_i.c b/src/files/lang/ntsc-1.0/stat_str_i.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-1.0/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/stat_str_s.c b/src/files/lang/ntsc-1.0/stat_str_s.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-1.0/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/titleE.c b/src/files/lang/ntsc-1.0/titleE.c similarity index 100% rename from src/files/lang/titleE.c rename to src/files/lang/ntsc-1.0/titleE.c diff --git a/src/files/lang/titleJ.c b/src/files/lang/ntsc-1.0/titleJ.c similarity index 100% rename from src/files/lang/titleJ.c rename to src/files/lang/ntsc-1.0/titleJ.c diff --git a/src/files/lang/titleP.c b/src/files/lang/ntsc-1.0/titleP.c similarity index 100% rename from src/files/lang/titleP.c rename to src/files/lang/ntsc-1.0/titleP.c diff --git a/src/files/lang/title_str_f.c b/src/files/lang/ntsc-1.0/title_str_f.c similarity index 100% rename from src/files/lang/title_str_f.c rename to src/files/lang/ntsc-1.0/title_str_f.c diff --git a/src/files/lang/title_str_g.c b/src/files/lang/ntsc-1.0/title_str_g.c similarity index 100% rename from src/files/lang/title_str_g.c rename to src/files/lang/ntsc-1.0/title_str_g.c diff --git a/src/files/lang/title_str_i.c b/src/files/lang/ntsc-1.0/title_str_i.c similarity index 100% rename from src/files/lang/title_str_i.c rename to src/files/lang/ntsc-1.0/title_str_i.c diff --git a/src/files/lang/title_str_s.c b/src/files/lang/ntsc-1.0/title_str_s.c similarity index 100% rename from src/files/lang/title_str_s.c rename to src/files/lang/ntsc-1.0/title_str_s.c diff --git a/src/files/lang/ntsc-1.0/traE.c b/src/files/lang/ntsc-1.0/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/ntsc-1.0/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/traJ.c b/src/files/lang/ntsc-1.0/traJ.c similarity index 100% rename from src/files/lang/traJ.c rename to src/files/lang/ntsc-1.0/traJ.c diff --git a/src/files/lang/traP.c b/src/files/lang/ntsc-1.0/traP.c similarity index 100% rename from src/files/lang/traP.c rename to src/files/lang/ntsc-1.0/traP.c diff --git a/src/files/lang/tra_str_f.c b/src/files/lang/ntsc-1.0/tra_str_f.c similarity index 100% rename from src/files/lang/tra_str_f.c rename to src/files/lang/ntsc-1.0/tra_str_f.c diff --git a/src/files/lang/tra_str_g.c b/src/files/lang/ntsc-1.0/tra_str_g.c similarity index 100% rename from src/files/lang/tra_str_g.c rename to src/files/lang/ntsc-1.0/tra_str_g.c diff --git a/src/files/lang/tra_str_i.c b/src/files/lang/ntsc-1.0/tra_str_i.c similarity index 100% rename from src/files/lang/tra_str_i.c rename to src/files/lang/ntsc-1.0/tra_str_i.c diff --git a/src/files/lang/tra_str_s.c b/src/files/lang/ntsc-1.0/tra_str_s.c similarity index 100% rename from src/files/lang/tra_str_s.c rename to src/files/lang/ntsc-1.0/tra_str_s.c diff --git a/src/files/lang/ntsc-1.0/uffE.c b/src/files/lang/ntsc-1.0/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uffJ.c b/src/files/lang/ntsc-1.0/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uffP.c b/src/files/lang/ntsc-1.0/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_f.c b/src/files/lang/ntsc-1.0/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_g.c b/src/files/lang/ntsc-1.0/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_i.c b/src/files/lang/ntsc-1.0/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_s.c b/src/files/lang/ntsc-1.0/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/waxE.c b/src/files/lang/ntsc-1.0/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/ntsc-1.0/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/waxJ.c b/src/files/lang/ntsc-1.0/waxJ.c similarity index 100% rename from src/files/lang/waxJ.c rename to src/files/lang/ntsc-1.0/waxJ.c diff --git a/src/files/lang/waxP.c b/src/files/lang/ntsc-1.0/waxP.c similarity index 100% rename from src/files/lang/waxP.c rename to src/files/lang/ntsc-1.0/waxP.c diff --git a/src/files/lang/wax_str_f.c b/src/files/lang/ntsc-1.0/wax_str_f.c similarity index 100% rename from src/files/lang/wax_str_f.c rename to src/files/lang/ntsc-1.0/wax_str_f.c diff --git a/src/files/lang/wax_str_g.c b/src/files/lang/ntsc-1.0/wax_str_g.c similarity index 100% rename from src/files/lang/wax_str_g.c rename to src/files/lang/ntsc-1.0/wax_str_g.c diff --git a/src/files/lang/wax_str_i.c b/src/files/lang/ntsc-1.0/wax_str_i.c similarity index 100% rename from src/files/lang/wax_str_i.c rename to src/files/lang/ntsc-1.0/wax_str_i.c diff --git a/src/files/lang/wax_str_s.c b/src/files/lang/ntsc-1.0/wax_str_s.c similarity index 100% rename from src/files/lang/wax_str_s.c rename to src/files/lang/ntsc-1.0/wax_str_s.c diff --git a/src/files/lang/ntsc-beta/ameE.c b/src/files/lang/ntsc-beta/ameE.c new file mode 100644 index 000000000..5324ce35f --- /dev/null +++ b/src/files/lang/ntsc-beta/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ameJ.c b/src/files/lang/ntsc-beta/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/ntsc-beta/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ameP.c b/src/files/lang/ntsc-beta/ameP.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_f.c b/src/files/lang/ntsc-beta/ame_str_f.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_g.c b/src/files/lang/ntsc-beta/ame_str_g.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_i.c b/src/files/lang/ntsc-beta/ame_str_i.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_s.c b/src/files/lang/ntsc-beta/ame_str_s.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/archE.c b/src/files/lang/ntsc-beta/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/archJ.c b/src/files/lang/ntsc-beta/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/archP.c b/src/files/lang/ntsc-beta/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_f.c b/src/files/lang/ntsc-beta/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_g.c b/src/files/lang/ntsc-beta/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_i.c b/src/files/lang/ntsc-beta/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_s.c b/src/files/lang/ntsc-beta/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arecE.c b/src/files/lang/ntsc-beta/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arecJ.c b/src/files/lang/ntsc-beta/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arecP.c b/src/files/lang/ntsc-beta/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_f.c b/src/files/lang/ntsc-beta/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_g.c b/src/files/lang/ntsc-beta/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_i.c b/src/files/lang/ntsc-beta/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_s.c b/src/files/lang/ntsc-beta/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arkE.c b/src/files/lang/ntsc-beta/arkE.c new file mode 100644 index 000000000..af3c128d4 --- /dev/null +++ b/src/files/lang/ntsc-beta/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/arkJ.c b/src/files/lang/ntsc-beta/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/ntsc-beta/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/arkP.c b/src/files/lang/ntsc-beta/arkP.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_f.c b/src/files/lang/ntsc-beta/ark_str_f.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_g.c b/src/files/lang/ntsc-beta/ark_str_g.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_i.c b/src/files/lang/ntsc-beta/ark_str_i.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_s.c b/src/files/lang/ntsc-beta/ark_str_s.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ashE.c b/src/files/lang/ntsc-beta/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ashJ.c b/src/files/lang/ntsc-beta/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ashP.c b/src/files/lang/ntsc-beta/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_f.c b/src/files/lang/ntsc-beta/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_g.c b/src/files/lang/ntsc-beta/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_i.c b/src/files/lang/ntsc-beta/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_s.c b/src/files/lang/ntsc-beta/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ateE.c b/src/files/lang/ntsc-beta/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ateJ.c b/src/files/lang/ntsc-beta/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/ntsc-beta/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ateP.c b/src/files/lang/ntsc-beta/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_f.c b/src/files/lang/ntsc-beta/ate_str_f.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_g.c b/src/files/lang/ntsc-beta/ate_str_g.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_i.c b/src/files/lang/ntsc-beta/ate_str_i.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_s.c b/src/files/lang/ntsc-beta/ate_str_s.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/aztE.c b/src/files/lang/ntsc-beta/aztE.c new file mode 100644 index 000000000..fc4806f99 --- /dev/null +++ b/src/files/lang/ntsc-beta/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... ...It's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/aztJ.c b/src/files/lang/ntsc-beta/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/ntsc-beta/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/ntsc-beta/aztP.c b/src/files/lang/ntsc-beta/aztP.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_f.c b/src/files/lang/ntsc-beta/azt_str_f.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_g.c b/src/files/lang/ntsc-beta/azt_str_g.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_i.c b/src/files/lang/ntsc-beta/azt_str_i.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_s.c b/src/files/lang/ntsc-beta/azt_str_s.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/catE.c b/src/files/lang/ntsc-beta/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/catJ.c b/src/files/lang/ntsc-beta/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/catP.c b/src/files/lang/ntsc-beta/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_f.c b/src/files/lang/ntsc-beta/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_g.c b/src/files/lang/ntsc-beta/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_i.c b/src/files/lang/ntsc-beta/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_s.c b/src/files/lang/ntsc-beta/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/caveE.c b/src/files/lang/ntsc-beta/caveE.c new file mode 100644 index 000000000..127133ec3 --- /dev/null +++ b/src/files/lang/ntsc-beta/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/caveJ.c b/src/files/lang/ntsc-beta/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/ntsc-beta/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/caveP.c b/src/files/lang/ntsc-beta/caveP.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_f.c b/src/files/lang/ntsc-beta/cave_str_f.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_g.c b/src/files/lang/ntsc-beta/cave_str_g.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_i.c b/src/files/lang/ntsc-beta/cave_str_i.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_s.c b/src/files/lang/ntsc-beta/cave_str_s.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cradE.c b/src/files/lang/ntsc-beta/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cradJ.c b/src/files/lang/ntsc-beta/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cradP.c b/src/files/lang/ntsc-beta/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_f.c b/src/files/lang/ntsc-beta/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_g.c b/src/files/lang/ntsc-beta/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_i.c b/src/files/lang/ntsc-beta/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_s.c b/src/files/lang/ntsc-beta/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crypE.c b/src/files/lang/ntsc-beta/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crypJ.c b/src/files/lang/ntsc-beta/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crypP.c b/src/files/lang/ntsc-beta/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_f.c b/src/files/lang/ntsc-beta/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_g.c b/src/files/lang/ntsc-beta/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_i.c b/src/files/lang/ntsc-beta/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_s.c b/src/files/lang/ntsc-beta/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/damE.c b/src/files/lang/ntsc-beta/damE.c new file mode 100644 index 000000000..304498027 --- /dev/null +++ b/src/files/lang/ntsc-beta/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/damJ.c b/src/files/lang/ntsc-beta/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/ntsc-beta/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/damP.c b/src/files/lang/ntsc-beta/damP.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_f.c b/src/files/lang/ntsc-beta/dam_str_f.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_g.c b/src/files/lang/ntsc-beta/dam_str_g.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_i.c b/src/files/lang/ntsc-beta/dam_str_i.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_s.c b/src/files/lang/ntsc-beta/dam_str_s.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/depoE.c b/src/files/lang/ntsc-beta/depoE.c new file mode 100644 index 000000000..3f836b1d3 --- /dev/null +++ b/src/files/lang/ntsc-beta/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depoJ.c b/src/files/lang/ntsc-beta/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/ntsc-beta/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/ntsc-beta/depoP.c b/src/files/lang/ntsc-beta/depoP.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_f.c b/src/files/lang/ntsc-beta/depo_str_f.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_g.c b/src/files/lang/ntsc-beta/depo_str_g.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_i.c b/src/files/lang/ntsc-beta/depo_str_i.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_s.c b/src/files/lang/ntsc-beta/depo_str_s.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/destE.c b/src/files/lang/ntsc-beta/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/destJ.c b/src/files/lang/ntsc-beta/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/destP.c b/src/files/lang/ntsc-beta/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_f.c b/src/files/lang/ntsc-beta/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_g.c b/src/files/lang/ntsc-beta/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_i.c b/src/files/lang/ntsc-beta/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_s.c b/src/files/lang/ntsc-beta/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dishE.c b/src/files/lang/ntsc-beta/dishE.c new file mode 100644 index 000000000..1fa0f3e6e --- /dev/null +++ b/src/files/lang/ntsc-beta/dishE.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay Jo, I'll leave you to prepare for the mission.\n", + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dishJ.c b/src/files/lang/ntsc-beta/dishJ.c new file mode 100644 index 000000000..9ac44c2cf --- /dev/null +++ b/src/files/lang/ntsc-beta/dishJ.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight From Table To Begin\n", + /* 9*/ "Activate The Night Sight\nLocate The Light Switch\nTurn The Lights Back On\n", + /* 10*/ "Collect Data Uplink From Table To Begin\n", + /* 11*/ "Stand next to the terminal and use the uplink\n", + /* 12*/ "You Need To Be Holding The Data Uplink\n", + /* 13*/ "Connection Established...\n", + /* 14*/ "Terminal Has Been Successfully Hacked\n", + /* 15*/ "Connection Broken - Too Far From PC\n", + /* 16*/ "Collect ECM Mine From Table To Begin\n", + /* 17*/ "Locate Hub And Throw ECM Mine Onto Hub\n", + /* 18*/ "ECM Mine Has Been Placed Incorrectly\n", + /* 19*/ "ECM Mine Has Been Placed Correctly\n", + /* 20*/ "Collect Eye-Spy From Table To Begin\n", + /* 21*/ "Locate Info Room PC and Holograph It\n", + /* 22*/ "Info Room PC Successfully Holographed\n", + /* 23*/ "Lights Have Been Re-activated\n", + /* 24*/ "Collect Door Decoder From Table To Begin\n", + /* 25*/ "Use Decoder On Door Pad To Unlock It\n", + /* 26*/ "You Need To Be Holding The Door Decoder\n", + /* 27*/ "Decoder Attached. Initiating Cracking Routines..\n", + /* 28*/ "Decoding Complete. Door Has Been Unlocked.\n", + /* 29*/ "Collect Tracker From Table To Begin\n", + /* 30*/ "Locate IR Scanner Using Tracker\n", + /* 31*/ "IR Scanner Has Been Successfully Located\n", + /* 32*/ "Collect IR Scanner From Table To Begin\n", + /* 33*/ "Locate Secret Door Using IR Scanner\n", + /* 34*/ "Secret Door Has Been Successfully Located\n", + /* 35*/ "Collect XRay Scanner From Table To Begin\n", + /* 36*/ "Find Hidden Switches To Shutdown Laser Grid\n", + /* 37*/ "All Laser Grids Have Been Deactivated\n", + /* 38*/ "Collect Disguise From Table To Begin\n", + /* 39*/ "Fool Someone Into Giving You Cloaking Device\n", + /* 40*/ "Cloaking Device Successfully Retrieved\n", + /* 41*/ "Laser Grid 1 Has Been Deactivated\n", + /* 42*/ "Laser Grid 2 Has Been Deactivated\n", + /* 43*/ "I'm Here To Pick The Equipment\n", + /* 44*/ "Go away Joanna, you don't fool me!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device Has Been Secured Successfully\n", + /* 47*/ "You're Meant To Use The Disguise, remember?\n", + /* 48*/ "You'll Have To Try Harder Than That Joanna\n", + /* 49*/ "Joanna - Where Did You Spring From?\n", + /* 50*/ "You Have Been Detected By The Camera\n", + /* 51*/ "Collect Cloaking Device From Table To Begin\n", + /* 52*/ "Use Cloaking Device And Locate Carrington\n", + /* 53*/ "I think we can safely say you're training\nis now complete!\n", + /* 54*/ "Mission Accomplished - Device Training Complete!\n", + /* 55*/ "Mission Failed - You Have Been Detected\n", + /* 56*/ "Select The Uplink\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Data Uplink And Release A\n", + /* 57*/ "Select The EyeSpy\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Eye-Spy And Release A\n", + /* 58*/ "Select The Night Vision\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Night Vision And Release A\n", + /* 59*/ "Select The Door Decoder\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight DoorDecoder And Release A\n", + /* 60*/ "Select The X-Ray Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight X-Ray Scanner And Release A\n", + /* 61*/ "Select The Disguise\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Disguise And Release A\n", + /* 62*/ "Select The IR Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight IR Scanner And Release A\n", + /* 63*/ "Select The Tracker\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Tracker And Release A\n", + /* 64*/ "Select The Cloaking Device\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Device And Release A\n", + /* 65*/ "Select The ECM Mine\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight ECM Mine And Release A\n", + /* 66*/ "Joanna, It's good to see you.\n", + /* 67*/ "Come with me Joanna.\nI'll walk you to the training room.\n", + /* 68*/ "The information centre is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B next to Hovcrate to grab it...\n", + /* 74*/ "Press B when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble Tap B next to Hovbike to ride it...\n", + /* 76*/ "Double Tap B when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B next to door to open it.\n", + /* 78*/ "B will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B next to door to call elevator.\n", + /* 80*/ "Cannot Exit While Training Is In Progress\n", + /* 81*/ "Switch Code 1 Has Been Obtained.\n", + /* 82*/ "Switch Code 2 Has Been Obtained.\n", + /* 83*/ "Switch Code 3 Has Been Obtained.\n", + /* 84*/ "Switch Code 4 Has Been Obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C To Look Up At The Target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C To Look Down At The Target.\n", + /* 87*/ "Holoprogram 2 Has Been Completed Successfully.\n", + /* 88*/ "Holoprogram 4 Has Been Completed Successfully.\n", + /* 89*/ "Holoprogram 5 Has Been Completed Successfully.\n", + /* 90*/ "Guard Has Been Successfully Disarmed.\n", + /* 91*/ "Guard Has Been Successfully Knocked Out.\n", + /* 92*/ "Disarm This Live Target If You Can.\n", + /* 93*/ "Knock Out This Target - Stealth Is The Key.\n", + /* 94*/ "and the final guard....\n", + /* 95*/ "DUCK\n- Hold R Then Press Down C To Duck.\n", + /* 96*/ "CROUCH\n- When Ducking, Hold R Then Press Down C To Duck.\n", + /* 97*/ "Holoprogram 3 Has Been Completed Successfully.\n", + /* 98*/ "Activate All The Switches.\n", + /* 99*/ "Activate All Of The Wall Switches.\n- Be Quick, As They Will Quickly Reset.\n", + /*100*/ "Get The Access Codes By Examining Terminals.\n- Use The Codes On The Wall Terminals.\n", + /*101*/ "Code 1 Has Been Obtained.\n", + /*102*/ "Code 2 Has Been Obtained.\n", + /*103*/ "Code 3 Has Been Obtained.\n", + /*104*/ "Code 4 Has Been Obtained.\n", + /*105*/ "Training Failed - You Must Face Forward.\n", + /*106*/ "Holoprogram 1 Has Been Completed Successfully.\n", + /*107*/ "Unarmed Combat - Knock Out The Target.\n- Press Z repeatedly to punch.\n", + /*108*/ "Now Try Against A Moving Target...\n", + /*109*/ "And Finally Against A Target That Fights Back.\n", + /*110*/ "Defeat All Enemies Without Getting Hit.\n", + /*111*/ "Training Failed - You Have Been Hit.\n", + /*112*/ "Holoprogram 6 Has Been Completed Successfully.\n", + /*113*/ "Holoprogram 7 Has Been Completed Successfully.\n", + /*114*/ "TERMINALS\n- Press B next to terminal to use it.\n", + /*115*/ "Now Activate The Red Terminals On The Wall.\n", + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dishP.c b/src/files/lang/ntsc-beta/dishP.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dishP.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_f.c b/src/files/lang/ntsc-beta/dish_str_f.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_f.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_g.c b/src/files/lang/ntsc-beta/dish_str_g.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_g.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_i.c b/src/files/lang/ntsc-beta/dish_str_i.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_i.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_s.c b/src/files/lang/ntsc-beta/dish_str_s.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_s.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/earE.c b/src/files/lang/ntsc-beta/earE.c new file mode 100644 index 000000000..71530e2d3 --- /dev/null +++ b/src/files/lang/ntsc-beta/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/earJ.c b/src/files/lang/ntsc-beta/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/ntsc-beta/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/earP.c b/src/files/lang/ntsc-beta/earP.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_f.c b/src/files/lang/ntsc-beta/ear_str_f.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_g.c b/src/files/lang/ntsc-beta/ear_str_g.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_i.c b/src/files/lang/ntsc-beta/ear_str_i.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_s.c b/src/files/lang/ntsc-beta/ear_str_s.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eldE.c b/src/files/lang/ntsc-beta/eldE.c new file mode 100644 index 000000000..85139347d --- /dev/null +++ b/src/files/lang/ntsc-beta/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eldJ.c b/src/files/lang/ntsc-beta/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/ntsc-beta/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eldP.c b/src/files/lang/ntsc-beta/eldP.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_f.c b/src/files/lang/ntsc-beta/eld_str_f.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_g.c b/src/files/lang/ntsc-beta/eld_str_g.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_i.c b/src/files/lang/ntsc-beta/eld_str_i.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_s.c b/src/files/lang/ntsc-beta/eld_str_s.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gunE.c b/src/files/lang/ntsc-beta/gunE.c new file mode 100644 index 000000000..6ca0ff45c --- /dev/null +++ b/src/files/lang/ntsc-beta/gunE.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy Uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. fitted with a proximity key tag to allow access to restricted areas. mk3 model only functions while owner is alive. security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: CDV780322 Password: I8MOZYM8NDI85\n", +}; diff --git a/src/files/lang/ntsc-beta/gunJ.c b/src/files/lang/ntsc-beta/gunJ.c new file mode 100644 index 000000000..40a521c8b --- /dev/null +++ b/src/files/lang/ntsc-beta/gunJ.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gunP.c b/src/files/lang/ntsc-beta/gunP.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gunP.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_f.c b/src/files/lang/ntsc-beta/gun_str_f.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_f.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_g.c b/src/files/lang/ntsc-beta/gun_str_g.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_g.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_i.c b/src/files/lang/ntsc-beta/gun_str_i.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_i.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_s.c b/src/files/lang/ntsc-beta/gun_str_s.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_s.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/impE.c b/src/files/lang/ntsc-beta/impE.c new file mode 100644 index 000000000..a4e8e8d23 --- /dev/null +++ b/src/files/lang/ntsc-beta/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release Hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/impJ.c b/src/files/lang/ntsc-beta/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/impP.c b/src/files/lang/ntsc-beta/impP.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_f.c b/src/files/lang/ntsc-beta/imp_str_f.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_g.c b/src/files/lang/ntsc-beta/imp_str_g.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_i.c b/src/files/lang/ntsc-beta/imp_str_i.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_s.c b/src/files/lang/ntsc-beta/imp_str_s.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/junE.c b/src/files/lang/ntsc-beta/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/junJ.c b/src/files/lang/ntsc-beta/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/junP.c b/src/files/lang/ntsc-beta/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_f.c b/src/files/lang/ntsc-beta/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_g.c b/src/files/lang/ntsc-beta/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_i.c b/src/files/lang/ntsc-beta/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_s.c b/src/files/lang/ntsc-beta/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lamE.c b/src/files/lang/ntsc-beta/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lamJ.c b/src/files/lang/ntsc-beta/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lamP.c b/src/files/lang/ntsc-beta/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_f.c b/src/files/lang/ntsc-beta/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_g.c b/src/files/lang/ntsc-beta/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_i.c b/src/files/lang/ntsc-beta/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_s.c b/src/files/lang/ntsc-beta/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/leeE.c b/src/files/lang/ntsc-beta/leeE.c new file mode 100644 index 000000000..c4ac09601 --- /dev/null +++ b/src/files/lang/ntsc-beta/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/leeJ.c b/src/files/lang/ntsc-beta/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/ntsc-beta/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/leeP.c b/src/files/lang/ntsc-beta/leeP.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_f.c b/src/files/lang/ntsc-beta/lee_str_f.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_g.c b/src/files/lang/ntsc-beta/lee_str_g.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_i.c b/src/files/lang/ntsc-beta/lee_str_i.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_s.c b/src/files/lang/ntsc-beta/lee_str_s.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lenE.c b/src/files/lang/ntsc-beta/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lenJ.c b/src/files/lang/ntsc-beta/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lenP.c b/src/files/lang/ntsc-beta/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_f.c b/src/files/lang/ntsc-beta/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_g.c b/src/files/lang/ntsc-beta/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_i.c b/src/files/lang/ntsc-beta/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_s.c b/src/files/lang/ntsc-beta/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lipE.c b/src/files/lang/ntsc-beta/lipE.c new file mode 100644 index 000000000..60bff8eca --- /dev/null +++ b/src/files/lang/ntsc-beta/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defences Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lipJ.c b/src/files/lang/ntsc-beta/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/ntsc-beta/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lipP.c b/src/files/lang/ntsc-beta/lipP.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_f.c b/src/files/lang/ntsc-beta/lip_str_f.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_g.c b/src/files/lang/ntsc-beta/lip_str_g.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_i.c b/src/files/lang/ntsc-beta/lip_str_i.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_s.c b/src/files/lang/ntsc-beta/lip_str_s.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lueE.c b/src/files/lang/ntsc-beta/lueE.c new file mode 100644 index 000000000..8781e489f --- /dev/null +++ b/src/files/lang/ntsc-beta/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lueJ.c b/src/files/lang/ntsc-beta/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/ntsc-beta/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lueP.c b/src/files/lang/ntsc-beta/lueP.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_f.c b/src/files/lang/ntsc-beta/lue_str_f.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_g.c b/src/files/lang/ntsc-beta/lue_str_g.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_i.c b/src/files/lang/ntsc-beta/lue_str_i.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_s.c b/src/files/lang/ntsc-beta/lue_str_s.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/miscE.c b/src/files/lang/ntsc-beta/miscE.c new file mode 100644 index 000000000..23e8c7a08 --- /dev/null +++ b/src/files/lang/ntsc-beta/miscE.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "YKK: 95935", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations'. They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battlecruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamoured were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies'.\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battlecruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/miscJ.c b/src/files/lang/ntsc-beta/miscJ.c new file mode 100644 index 000000000..5b110ec01 --- /dev/null +++ b/src/files/lang/ntsc-beta/miscJ.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Bond Invisible", + /* 5*/ "Bond Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny Bond", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Golden Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "invincibility on\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Bond Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny Bond On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy Now Karl?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Bond Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Bond Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - Abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun\n", + /* 72*/ "Don't point that gun at me\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "EYESPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is therefore the best choice for the beginner. It is not very intelligent and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills & intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists which protest the use of weapons. They will go around the level hunting for guns that are lying around and horde them so that players cannot use them. Of course, if you were to shoot them they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamiKazeSim: This simulant will stop at nothing to destroy it's target. It is very aggressive and never keeps it's distance (even if it's holding a grenade!). Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However it has no such reservations when it comes to unarmed combat. It will always try to use it's fists to attack or disarm it's opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try and survive by running away. It may sometimes attack but only if the opponent has an inferior weapon. Draw out a better gun or shoot it and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and dispises the tactics of the PredatorSim. It will always try and kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily out-run a human player so it's no use running away from a CheetahSim unless you know some good short-cuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately this restricts the hosts movement so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomise\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Flag", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Flag", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the callsign 'Perfect Dark'.\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark he held the honour of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents, runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power, dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she hates. \n\n[source: WALL STREET JOURNAL]\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne corp with an emphasis on language skills and code-breaking. Fortunately he has morals, and due to his formidable level of intelligence has guessed some of dataDyne's future plans. The voice is highly precise and educated, and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde young human male whose the voice is dull, annoying, and cringeworthy. Very tall. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar Warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The US President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys'. They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington, a formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. Tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion, and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battlecruiser of immense power was scuttled in the Pacific ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of Humans alone to develop.\n\nThe Maians meet the Skedar and they have a fight that turns into a protracted war. After hundreds of years of fighting an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations'. They fear that announcing their presence may well precipitate further wars on the planet, and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battlecruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battlecruiser is. Their tests direct them to the pacific ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne have to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the president. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the US government so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne have made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battlecruiser. When it expresses concern about the mission it is being created for the response of Cassandra De Vries is to order its personality removed. Clearly it is thinking too much. In desperation it contacts the Carrington organisation with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation, but continues with the mission to get him/it to a place of safety. With the alarm raised Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll but her boss has heard enough from the AI to prompt him into summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 building, a front for the dataDyne corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent job for her to complete first.\n\nThe specialists' have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the president's entourage to gain access to the airbase where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for the President, Elvis, herself and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible they head down to the ocean floor, where they get their first sight of the sunken Cetan battlecruiser. Entering the ship through the portal the Skedar have made they come across a dead skedar warrior... clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship where they find the AI that was once Dr. Caroll. Once his personality is restored he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. Joanna holds them off while the majority of the employees escape, before getting knocked unconscious and captured by the Skedar.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar battle shrine, which gives Elvis a shock since the Maians could never find this Skedar holiest of holy places. If the Shrine is destroyed the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the battle shrine, while Elvis returns to the Assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "dataDyne are nasty\n", + /*269*/ "Carrington Institute\n", + /*270*/ "The Carrington Institute is lovely\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human sized pulse of heat.\n\nTraining Instructions\n- Holograph the Hackers terminal next door in the Info room.\n\nOperation\n- Press Z to take a holograph. Pressing B will open any doors in the way.Hold down R to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights lifeforms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch and activate it to turn the lights back on.\n\nOperation\n- Select the Nightvision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Standalone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the door decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press B while holding the door decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the night vision and IR goggles can not.\n\nTraining Instructions\n- With the Xray Scanner on, search for the 2 hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the Xray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick witted enemy.\n\nTraining Instructions\n- Grimshaw has a cloaking device waiting to be serviced. Head next door and 'aquire' it from him.\n\nOperation\n- To wear the disguise simply select it from your inventory.\n", + /*276*/ "Drscription\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Distrupts the radiation field around the wearer, creating a chameleon type effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the cloaking device and head to Carringtons office to suprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM mine onto the lighting hub located through the secret door.\n\nOperation\n- Press Z to throw the mine. Hold down R and move the stick to fine tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Comms Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press B when holding Comms Uplink.\n", + /*281*/ "FIRING\n Press Z to fire gun\n", + /*282*/ "AUTO RELOAD\n Release Z to reload when magazine empty\n", + /*283*/ "MANUAL RELOAD\n Press B to reload early if magazine not full\n", + /*284*/ "Aiming: hold down R to enter aim mode\n", + /*285*/ "Use analog stick to move aiming sight\n", + /*286*/ "AUTO FIRE\n Hold Z to repeatedly fire automatically\n", + /*287*/ "ALTER AIM\n Press up C or down C to move sight up/down\n", + /*288*/ "ZOOM\n Hold R to enter Zoom mode\n", + /*289*/ "FAST FIRE\n Press Z quickly to fire faster\n", + /*290*/ "ELVIS IS DEAD OR FALLEN OUT OF THE BACKGROUND\n", + /*291*/ "Carrington Institute\0|Main building and base of operations\n", + /*292*/ "Lucerne Tower\0|Global Headquarters\n", + /*293*/ "Laboratory Basement\0|Underground research labs\n", + /*294*/ "Carrington Villa\0|Private coastal retreat\n", + /*295*/ "Chicago\0|Backstreets of the city\n", + /*296*/ "G5 Building\0|dataDyne front corporation\n", + /*297*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*298*/ "Alaskan Airbase\0|Brooks Range, Alaska\n", + /*299*/ "Air Force One\0|The President's Airplane\n", + /*300*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*301*/ "Pelagic 2\0|Specialised Deep Sea Research Ship\n", + /*302*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*303*/ "Skedar Assault Ship\0|Troop Carrying spacecraft\n", + /*304*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*305*/ "Dropship\0|Insert subtitle here\n", + /*306*/ "HoverCrate\0|Insert subtitle here\n", + /*307*/ "HoverBike\0|subtitle here\n", + /*308*/ "Cleaning Hovbot\0|Insert subtitle here\n", + /*309*/ "Hovercopter\0|Insert subtitle here\n", + /*310*/ "G5 Robot\0|Insert subtitle here\n", + /*311*/ "A51 Interceptor\0|Insert subtitle here\n", + /*312*/ "Maian Vessel\0|Insert subtitle here\n", + /*313*/ "Skedar Shuttle\0|Insert subtitle here\n", + /*314*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*315*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*316*/ "These heavily guarded, well hidden labs hold the key to dataDyne's future. Within them, techs work on top secret projects aimed at putting dataDyne on the top of the heap.\n", + /*317*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*318*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 corporation has their headquarters.\n", + /*319*/ "Inside the G5 building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*320*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*321*/ "One of a series of reinforced airbases available as staging posts for Air Force One. Typically, the airbase is remote, in an inhospitable region, far away from prying eyes.\n", + /*322*/ "This particular Air Force One is optimised for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*323*/ "In the rocky snow-covered landscape of the Arctic Circle the wreckage of the stricken plane has come to rest.\n", + /*324*/ "Owned by the US government, the Pelagic 2 is capable of staging deep sea diving operations in all weathers. It is the only fully integrated ocean floor research vessel in the world.\n", + /*325*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*326*/ "An interplanetary assault ship that carries Skedar Warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*327*/ "A highly arid planet, wracked by earthquakes, sandstorms and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*328*/ "that thing in the first cutscene\n", + /*329*/ "a floating crate\n", + /*330*/ "a floating bike\n", + /*331*/ "a floating hoover\n", + /*332*/ "a cool ship with startling AI and realistic dynamic movement\n", + /*333*/ "a superb attack drone with lovely rotating guns and brilliant AI\n", + /*334*/ "just as cool as the hovercopter, especially when it crashes\n", + /*335*/ "ooh! shiny\n", + /*336*/ "skedar shuttle thing\n", + /*337*/ "Description\n- A good agent notices everything around them.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press Down C\n-Look down- Press Up C\n-Free Look- Hold down R to enter aim mode and use the stick to look.\n", + /*338*/ "Description\n- Proverb type saying about movement 1 here.\n\nTraining Instructions\n- Activate All Of The Switches In Front. Be Quick Though, As Each Switch Will Reset On A Time Limit.\n\nOperation\n- Sidestep left- Left C\n- Sidestep right- Right C\n\n", + /*339*/ "Description\n- Proverb type saying about movement 2 here.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate The Switches.\n\nOperation\n- Duck- Hold R then press down C.\n- Crouch- When ducking, Hold R then press down C.\n- Get Up- Tap R.\n\n", + /*340*/ "Description\n- Proverb type saying about unarmed combat 1 here.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press Z repeatedly when unarmed to launch a flurry of punches.\n\n", + /*341*/ "Description\n- Proverb type saying about unarmed combat 2 here.\n\nTraining Instructions\n- Knockout/Disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold B then press Z to disarm an enemy.\n- Knockout Punch - punch an unaware enemy from behind.\n", + /*342*/ "Description\n- Proverb type saying about combat test 1 here.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*343*/ "Description\n- Proverb type saying about combat test 2 here.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*344*/ "holo_tips1\n", + /*345*/ "holo_tips2\n", + /*346*/ "holo_tips3\n", + /*347*/ "holo_tips4\n", + /*348*/ "holo_tips5\n", + /*349*/ "holo_tips6\n", + /*350*/ "holo_tips7\n", + /*351*/ "holo_advice1\n", + /*352*/ "holo_advice2\n", + /*353*/ "holo_advice3\n", + /*354*/ "holo_advice4\n", + /*355*/ "holo_advice5\n", + /*356*/ "holo_advice6\n", + /*357*/ "holo_advice7\n", + /*358*/ "device_tips1\n", + /*359*/ "device_tips2\n", + /*360*/ "device_tips3\n", + /*361*/ "device_tips4\n", + /*362*/ "device_tips5\n", + /*363*/ "device_tips6\n", + /*364*/ "device_tips7\n", + /*365*/ "device_tips8\n", + /*366*/ "device_tips9\n", + /*367*/ "device_tips10\n", + /*368*/ "device_advice1\n", + /*369*/ "device_advice2\n", + /*370*/ "device_advice3\n", + /*371*/ "device_advice4\n", + /*372*/ "device_advice5\n", + /*373*/ "device_advice6\n", + /*374*/ "device_advice7\n", + /*375*/ "device_advice8\n", + /*376*/ "device_advice9\n", + /*377*/ "device_advice10\n", + /*378*/ "Instructions for falcon2\n", + /*379*/ "Instructions for falcon2scope\n", + /*380*/ "Instructions for falcon2silenced\n", + /*381*/ "Instructions for leegun1\n", + /*382*/ "Instructions for skedarpistol\n", + /*383*/ "Instructions for maianpistol\n", + /*384*/ "Instructions for dy357\n", + /*385*/ "Instructions for dy357_trent\n", + /*386*/ "Instructions for cmp150\n", + /*387*/ "Instructions for cyclone\n", + /*388*/ "Instructions for maiansmg\n", + /*389*/ "Instructions for anothersmg\n", + /*390*/ "Instructions for pcgun\n", + /*391*/ "Instructions for dydragon\n", + /*392*/ "Instructions for k7avenger\n", + /*393*/ "Instructions for ar34\n", + /*394*/ "Instructions for dysuperdragon\n", + /*395*/ "Instructions for shotgun\n", + /*396*/ "Instructions for sniperrifle\n", + /*397*/ "Instructions for z2020\n", + /*398*/ "Instructions for crossbow\n", + /*399*/ "Instructions for druggun\n", + /*400*/ "Instructions for skedarminigun\n", + /*401*/ "Instructions for dydevastator\n", + /*402*/ "Instructions for dyrocket\n", + /*403*/ "Instructions for skedarrocket\n", + /*404*/ "Instructions for knife\n", + /*405*/ "Instructions for laser\n", + /*406*/ "Instructions for grenade\n", + /*407*/ "Instructions for nbomb\n", + /*408*/ "Instructions for timedmine\n", + /*409*/ "Instructions for proximitymine\n", + /*410*/ "Instructions for remotemine\n", + /*411*/ "Style 1", + /*412*/ "Style 2", + /*413*/ "Style 3", + /*414*/ "Style 4", + /*415*/ "Blond", + /*416*/ "Black", + /*417*/ "Auburn", + /*418*/ "Blue Rinse", + /*419*/ "Player", + /*420*/ "", + /*421*/ "Identify\n", + /*422*/ "Sim", + /*423*/ "Challenges\n", + /*424*/ "Load/Preset Games\n", + /*425*/ "Quick Start\n", + /*426*/ "Advanced Setup\n", + /*427*/ "Combat Simulator\n", + /*428*/ "Carrington Institute\n", + /*429*/ "Team Score\n", + /*430*/ "Finished Setup\n", + /*431*/ "Player 1 Team\n", + /*432*/ "Player 2 Team\n", + /*433*/ "Player 3 Team\n", + /*434*/ "Player 4 Team\n", + /*435*/ "Number Of Sims\n", + /*436*/ "Sims Per Team\n", + /*437*/ "Sim Difficulty\n", + /*438*/ "Start Game\n", + /*439*/ "Drop Out\n", + /*440*/ "Player Settings\n", + /*441*/ "Game Settings\n", + /*442*/ "Quick Go\n", + /*443*/ "Ready!\n", + /*444*/ "Quick Team\n", + /*445*/ "Players Only\n", + /*446*/ "Players and Simulants\n", + /*447*/ "Player Teams\n", + /*448*/ "Players versus Simulants\n", + /*449*/ "Player-Simulant Teams\n", + /*450*/ NULL, + /*451*/ NULL, + /*452*/ NULL, + /*453*/ NULL, + /*454*/ NULL, + /*455*/ NULL, + /*456*/ NULL, + /*457*/ NULL, + /*458*/ NULL, + /*459*/ NULL, + /*460*/ NULL, + /*461*/ NULL, + /*462*/ NULL, + /*463*/ NULL, + /*464*/ NULL, + /*465*/ NULL, + /*466*/ NULL, + /*467*/ NULL, + /*468*/ NULL, + /*469*/ NULL, + /*470*/ NULL, + /*471*/ NULL, + /*472*/ NULL, + /*473*/ NULL, + /*474*/ NULL, + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/miscP.c b/src/files/lang/ntsc-beta/miscP.c new file mode 100644 index 000000000..fd5f4834a --- /dev/null +++ b/src/files/lang/ntsc-beta/miscP.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_f.c b/src/files/lang/ntsc-beta/misc_str_f.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_f.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_g.c b/src/files/lang/ntsc-beta/misc_str_g.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_g.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_i.c b/src/files/lang/ntsc-beta/misc_str_i.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_i.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_s.c b/src/files/lang/ntsc-beta/misc_str_s.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_s.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mp10E.c b/src/files/lang/ntsc-beta/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10J.c b/src/files/lang/ntsc-beta/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10P.c b/src/files/lang/ntsc-beta/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_f.c b/src/files/lang/ntsc-beta/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_g.c b/src/files/lang/ntsc-beta/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_i.c b/src/files/lang/ntsc-beta/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_s.c b/src/files/lang/ntsc-beta/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11E.c b/src/files/lang/ntsc-beta/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11J.c b/src/files/lang/ntsc-beta/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11P.c b/src/files/lang/ntsc-beta/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_f.c b/src/files/lang/ntsc-beta/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_g.c b/src/files/lang/ntsc-beta/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_i.c b/src/files/lang/ntsc-beta/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_s.c b/src/files/lang/ntsc-beta/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12E.c b/src/files/lang/ntsc-beta/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12J.c b/src/files/lang/ntsc-beta/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12P.c b/src/files/lang/ntsc-beta/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_f.c b/src/files/lang/ntsc-beta/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_g.c b/src/files/lang/ntsc-beta/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_i.c b/src/files/lang/ntsc-beta/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_s.c b/src/files/lang/ntsc-beta/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13E.c b/src/files/lang/ntsc-beta/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13J.c b/src/files/lang/ntsc-beta/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13P.c b/src/files/lang/ntsc-beta/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_f.c b/src/files/lang/ntsc-beta/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_g.c b/src/files/lang/ntsc-beta/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_i.c b/src/files/lang/ntsc-beta/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_s.c b/src/files/lang/ntsc-beta/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14E.c b/src/files/lang/ntsc-beta/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14J.c b/src/files/lang/ntsc-beta/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14P.c b/src/files/lang/ntsc-beta/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_f.c b/src/files/lang/ntsc-beta/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_g.c b/src/files/lang/ntsc-beta/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_i.c b/src/files/lang/ntsc-beta/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_s.c b/src/files/lang/ntsc-beta/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15E.c b/src/files/lang/ntsc-beta/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15J.c b/src/files/lang/ntsc-beta/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15P.c b/src/files/lang/ntsc-beta/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_f.c b/src/files/lang/ntsc-beta/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_g.c b/src/files/lang/ntsc-beta/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_i.c b/src/files/lang/ntsc-beta/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_s.c b/src/files/lang/ntsc-beta/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16E.c b/src/files/lang/ntsc-beta/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16J.c b/src/files/lang/ntsc-beta/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16P.c b/src/files/lang/ntsc-beta/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_f.c b/src/files/lang/ntsc-beta/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_g.c b/src/files/lang/ntsc-beta/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_i.c b/src/files/lang/ntsc-beta/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_s.c b/src/files/lang/ntsc-beta/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17E.c b/src/files/lang/ntsc-beta/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17J.c b/src/files/lang/ntsc-beta/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17P.c b/src/files/lang/ntsc-beta/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_f.c b/src/files/lang/ntsc-beta/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_g.c b/src/files/lang/ntsc-beta/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_i.c b/src/files/lang/ntsc-beta/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_s.c b/src/files/lang/ntsc-beta/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18E.c b/src/files/lang/ntsc-beta/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18J.c b/src/files/lang/ntsc-beta/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18P.c b/src/files/lang/ntsc-beta/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_f.c b/src/files/lang/ntsc-beta/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_g.c b/src/files/lang/ntsc-beta/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_i.c b/src/files/lang/ntsc-beta/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_s.c b/src/files/lang/ntsc-beta/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19E.c b/src/files/lang/ntsc-beta/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19J.c b/src/files/lang/ntsc-beta/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19P.c b/src/files/lang/ntsc-beta/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_f.c b/src/files/lang/ntsc-beta/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_g.c b/src/files/lang/ntsc-beta/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_i.c b/src/files/lang/ntsc-beta/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_s.c b/src/files/lang/ntsc-beta/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1E.c b/src/files/lang/ntsc-beta/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1J.c b/src/files/lang/ntsc-beta/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1P.c b/src/files/lang/ntsc-beta/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_f.c b/src/files/lang/ntsc-beta/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_g.c b/src/files/lang/ntsc-beta/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_i.c b/src/files/lang/ntsc-beta/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_s.c b/src/files/lang/ntsc-beta/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20E.c b/src/files/lang/ntsc-beta/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20J.c b/src/files/lang/ntsc-beta/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20P.c b/src/files/lang/ntsc-beta/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_f.c b/src/files/lang/ntsc-beta/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_g.c b/src/files/lang/ntsc-beta/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_i.c b/src/files/lang/ntsc-beta/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_s.c b/src/files/lang/ntsc-beta/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2E.c b/src/files/lang/ntsc-beta/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2J.c b/src/files/lang/ntsc-beta/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2P.c b/src/files/lang/ntsc-beta/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_f.c b/src/files/lang/ntsc-beta/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_g.c b/src/files/lang/ntsc-beta/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_i.c b/src/files/lang/ntsc-beta/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_s.c b/src/files/lang/ntsc-beta/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3E.c b/src/files/lang/ntsc-beta/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3J.c b/src/files/lang/ntsc-beta/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3P.c b/src/files/lang/ntsc-beta/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_f.c b/src/files/lang/ntsc-beta/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_g.c b/src/files/lang/ntsc-beta/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_i.c b/src/files/lang/ntsc-beta/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_s.c b/src/files/lang/ntsc-beta/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4E.c b/src/files/lang/ntsc-beta/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4J.c b/src/files/lang/ntsc-beta/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4P.c b/src/files/lang/ntsc-beta/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_f.c b/src/files/lang/ntsc-beta/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_g.c b/src/files/lang/ntsc-beta/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_i.c b/src/files/lang/ntsc-beta/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_s.c b/src/files/lang/ntsc-beta/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5E.c b/src/files/lang/ntsc-beta/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5J.c b/src/files/lang/ntsc-beta/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5P.c b/src/files/lang/ntsc-beta/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_f.c b/src/files/lang/ntsc-beta/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_g.c b/src/files/lang/ntsc-beta/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_i.c b/src/files/lang/ntsc-beta/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_s.c b/src/files/lang/ntsc-beta/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6E.c b/src/files/lang/ntsc-beta/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6J.c b/src/files/lang/ntsc-beta/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6P.c b/src/files/lang/ntsc-beta/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_f.c b/src/files/lang/ntsc-beta/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_g.c b/src/files/lang/ntsc-beta/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_i.c b/src/files/lang/ntsc-beta/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_s.c b/src/files/lang/ntsc-beta/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7E.c b/src/files/lang/ntsc-beta/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7J.c b/src/files/lang/ntsc-beta/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7P.c b/src/files/lang/ntsc-beta/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_f.c b/src/files/lang/ntsc-beta/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_g.c b/src/files/lang/ntsc-beta/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_i.c b/src/files/lang/ntsc-beta/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_s.c b/src/files/lang/ntsc-beta/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8E.c b/src/files/lang/ntsc-beta/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8J.c b/src/files/lang/ntsc-beta/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8P.c b/src/files/lang/ntsc-beta/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_f.c b/src/files/lang/ntsc-beta/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_g.c b/src/files/lang/ntsc-beta/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_i.c b/src/files/lang/ntsc-beta/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_s.c b/src/files/lang/ntsc-beta/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9E.c b/src/files/lang/ntsc-beta/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9J.c b/src/files/lang/ntsc-beta/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9P.c b/src/files/lang/ntsc-beta/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_f.c b/src/files/lang/ntsc-beta/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_g.c b/src/files/lang/ntsc-beta/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_i.c b/src/files/lang/ntsc-beta/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_s.c b/src/files/lang/ntsc-beta/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mpmenuE.c b/src/files/lang/ntsc-beta/mpmenuE.c new file mode 100644 index 000000000..2b9635b7b --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenuE.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ "ENTROPICDECAY\n", + /*497*/ "ZERO-TAU\n", + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenuJ.c b/src/files/lang/ntsc-beta/mpmenuJ.c new file mode 100644 index 000000000..a7c41861e --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenuJ.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenuP.c b/src/files/lang/ntsc-beta/mpmenuP.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenuP.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_f.c b/src/files/lang/ntsc-beta/mpmenu_str_f.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_f.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_g.c b/src/files/lang/ntsc-beta/mpmenu_str_g.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_g.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_i.c b/src/files/lang/ntsc-beta/mpmenu_str_i.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_i.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_s.c b/src/files/lang/ntsc-beta/mpmenu_str_s.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_s.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweaponsE.c b/src/files/lang/ntsc-beta/mpweaponsE.c new file mode 100644 index 000000000..d8899425b --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweaponsE.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak\n", + /* 65*/ "is damaged or\n", + /* 66*/ "inserted incorrectly.\n", + /* 67*/ "Attempt Repair\n", + /* 68*/ "Retry\n", + /* 69*/ "Continue without using\nthe controller pak\n", + /* 70*/ "Full Controller Pak\n", + /* 71*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 72*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak can\nnot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*184*/ "Player Handicaps\n", + /*185*/ "L/R BUTTONS: ", + /*186*/ "UP C BUTTON: ", + /*187*/ "LEFT/RIGHT C BUTTONS: ", + /*188*/ "DOWN C BUTTON: ", + /*189*/ "A BUTTON: ", + /*190*/ "B BUTTON: ", + /*191*/ "CONTROL STICK: ", + /*192*/ "Z BUTTON: ", + /*193*/ "+ CONTROL PAD: ", + /*194*/ "AIM", + /*195*/ "AIM TOGGLE", + /*196*/ "LOOK UP", + /*197*/ "LOOK DOWN", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK UP", + /*200*/ "FORWARDS", + /*201*/ "BACKWARDS", + /*202*/ "STRAFE", + /*203*/ "WEAPON", + /*204*/ "ACTION/RELOAD", + /*205*/ "FIRE", + /*206*/ "WALK/TURN", + /*207*/ "LOOK", + /*208*/ "WALK/STRAFE", + /*209*/ "LOOK/STRAFE", + /*210*/ "AS C BUTTONS", + /*211*/ "Left Hand:", + /*212*/ "Right Hand:", + /*213*/ "Control Style %s %s\n", + /*214*/ "(One-Handed)", + /*215*/ "(Two-Handed)", + /*216*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*217*/ "Turn off all Cheats\n", + /*218*/ "Language Filter\n", + /*219*/ "USERNAME:\n", + /*220*/ "PASSWORD:\n", + /*221*/ "Perfect Dark\n", + /*222*/ "Choose Settings:\n", + /*223*/ "Enemy Reaction Speed:\n", + /*224*/ "Enemy Health:\n", + /*225*/ "Enemy Damage:\n", + /*226*/ "Enemy Accuracy:\n", + /*227*/ "OK\n", + /*228*/ "Cancel\n", + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweaponsJ.c b/src/files/lang/ntsc-beta/mpweaponsJ.c new file mode 100644 index 000000000..fd4e7f881 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweaponsJ.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Capture the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Flag\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweaponsP.c b/src/files/lang/ntsc-beta/mpweaponsP.c new file mode 100644 index 000000000..fa94f699a --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweaponsP.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_f.c b/src/files/lang/ntsc-beta/mpweapons_str_f.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_f.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_g.c b/src/files/lang/ntsc-beta/mpweapons_str_g.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_g.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_i.c b/src/files/lang/ntsc-beta/mpweapons_str_i.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_i.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_s.c b/src/files/lang/ntsc-beta/mpweapons_str_s.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_s.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/oatE.c b/src/files/lang/ntsc-beta/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oatJ.c b/src/files/lang/ntsc-beta/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oatP.c b/src/files/lang/ntsc-beta/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_f.c b/src/files/lang/ntsc-beta/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_g.c b/src/files/lang/ntsc-beta/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_i.c b/src/files/lang/ntsc-beta/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_s.c b/src/files/lang/ntsc-beta/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oldE.c b/src/files/lang/ntsc-beta/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oldJ.c b/src/files/lang/ntsc-beta/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oldP.c b/src/files/lang/ntsc-beta/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_f.c b/src/files/lang/ntsc-beta/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_g.c b/src/files/lang/ntsc-beta/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_i.c b/src/files/lang/ntsc-beta/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_s.c b/src/files/lang/ntsc-beta/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/optionsE.c b/src/files/lang/ntsc-beta/optionsE.c new file mode 100644 index 000000000..b90a9a955 --- /dev/null +++ b/src/files/lang/ntsc-beta/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 6.4 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file\ninto any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Take Off\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak Onboard\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/optionsJ.c b/src/files/lang/ntsc-beta/optionsJ.c new file mode 100644 index 000000000..9766367e0 --- /dev/null +++ b/src/files/lang/ntsc-beta/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "Choose Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/optionsP.c b/src/files/lang/ntsc-beta/optionsP.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_f.c b/src/files/lang/ntsc-beta/options_str_f.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_g.c b/src/files/lang/ntsc-beta/options_str_g.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_i.c b/src/files/lang/ntsc-beta/options_str_i.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_s.c b/src/files/lang/ntsc-beta/options_str_s.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pamE.c b/src/files/lang/ntsc-beta/pamE.c new file mode 100644 index 000000000..f8f1096ef --- /dev/null +++ b/src/files/lang/ntsc-beta/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo Wasted - Unable to disable Megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pamJ.c b/src/files/lang/ntsc-beta/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/ntsc-beta/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pamP.c b/src/files/lang/ntsc-beta/pamP.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_f.c b/src/files/lang/ntsc-beta/pam_str_f.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_g.c b/src/files/lang/ntsc-beta/pam_str_g.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_i.c b/src/files/lang/ntsc-beta/pam_str_i.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_s.c b/src/files/lang/ntsc-beta/pam_str_s.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/peteE.c b/src/files/lang/ntsc-beta/peteE.c new file mode 100644 index 000000000..b7c24cf86 --- /dev/null +++ b/src/files/lang/ntsc-beta/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine Has Been Wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/peteJ.c b/src/files/lang/ntsc-beta/peteJ.c new file mode 100644 index 000000000..088c12b76 --- /dev/null +++ b/src/files/lang/ntsc-beta/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/peteP.c b/src/files/lang/ntsc-beta/peteP.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_f.c b/src/files/lang/ntsc-beta/pete_str_f.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_g.c b/src/files/lang/ntsc-beta/pete_str_g.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_i.c b/src/files/lang/ntsc-beta/pete_str_i.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_s.c b/src/files/lang/ntsc-beta/pete_str_s.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/propobjE.c b/src/files/lang/ntsc-beta/propobjE.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobjE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobjJ.c b/src/files/lang/ntsc-beta/propobjJ.c new file mode 100644 index 000000000..e2c9a5da7 --- /dev/null +++ b/src/files/lang/ntsc-beta/propobjJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "hand grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "drugs", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "speed pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobjP.c b/src/files/lang/ntsc-beta/propobjP.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobjP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_f.c b/src/files/lang/ntsc-beta/propobj_str_f.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_g.c b/src/files/lang/ntsc-beta/propobj_str_g.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_i.c b/src/files/lang/ntsc-beta/propobj_str_i.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_s.c b/src/files/lang/ntsc-beta/propobj_str_s.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/refE.c b/src/files/lang/ntsc-beta/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/refJ.c b/src/files/lang/ntsc-beta/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/refP.c b/src/files/lang/ntsc-beta/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_f.c b/src/files/lang/ntsc-beta/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_g.c b/src/files/lang/ntsc-beta/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_i.c b/src/files/lang/ntsc-beta/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_s.c b/src/files/lang/ntsc-beta/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ritE.c b/src/files/lang/ntsc-beta/ritE.c new file mode 100644 index 000000000..c3234e95a --- /dev/null +++ b/src/files/lang/ntsc-beta/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ritJ.c b/src/files/lang/ntsc-beta/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/ntsc-beta/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ritP.c b/src/files/lang/ntsc-beta/ritP.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_f.c b/src/files/lang/ntsc-beta/rit_str_f.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_g.c b/src/files/lang/ntsc-beta/rit_str_g.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_i.c b/src/files/lang/ntsc-beta/rit_str_i.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_s.c b/src/files/lang/ntsc-beta/rit_str_s.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/runE.c b/src/files/lang/ntsc-beta/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/runJ.c b/src/files/lang/ntsc-beta/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/runP.c b/src/files/lang/ntsc-beta/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_f.c b/src/files/lang/ntsc-beta/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_g.c b/src/files/lang/ntsc-beta/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_i.c b/src/files/lang/ntsc-beta/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_s.c b/src/files/lang/ntsc-beta/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevE.c b/src/files/lang/ntsc-beta/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevJ.c b/src/files/lang/ntsc-beta/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevP.c b/src/files/lang/ntsc-beta/sevP.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_f.c b/src/files/lang/ntsc-beta/sev_str_f.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_g.c b/src/files/lang/ntsc-beta/sev_str_g.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_i.c b/src/files/lang/ntsc-beta/sev_str_i.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_s.c b/src/files/lang/ntsc-beta/sev_str_s.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevbE.c b/src/files/lang/ntsc-beta/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevbJ.c b/src/files/lang/ntsc-beta/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevbP.c b/src/files/lang/ntsc-beta/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_f.c b/src/files/lang/ntsc-beta/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_g.c b/src/files/lang/ntsc-beta/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_i.c b/src/files/lang/ntsc-beta/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_s.c b/src/files/lang/ntsc-beta/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevxE.c b/src/files/lang/ntsc-beta/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxJ.c b/src/files/lang/ntsc-beta/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxP.c b/src/files/lang/ntsc-beta/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_f.c b/src/files/lang/ntsc-beta/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_g.c b/src/files/lang/ntsc-beta/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_i.c b/src/files/lang/ntsc-beta/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_s.c b/src/files/lang/ntsc-beta/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxbE.c b/src/files/lang/ntsc-beta/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxbJ.c b/src/files/lang/ntsc-beta/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxbP.c b/src/files/lang/ntsc-beta/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_f.c b/src/files/lang/ntsc-beta/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_g.c b/src/files/lang/ntsc-beta/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_i.c b/src/files/lang/ntsc-beta/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_s.c b/src/files/lang/ntsc-beta/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/shoE.c b/src/files/lang/ntsc-beta/shoE.c new file mode 100644 index 000000000..60389f002 --- /dev/null +++ b/src/files/lang/ntsc-beta/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, theres another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, theres another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, theres another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/shoJ.c b/src/files/lang/ntsc-beta/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/ntsc-beta/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/shoP.c b/src/files/lang/ntsc-beta/shoP.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_f.c b/src/files/lang/ntsc-beta/sho_str_f.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_g.c b/src/files/lang/ntsc-beta/sho_str_g.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_i.c b/src/files/lang/ntsc-beta/sho_str_i.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_s.c b/src/files/lang/ntsc-beta/sho_str_s.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/siloE.c b/src/files/lang/ntsc-beta/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/siloJ.c b/src/files/lang/ntsc-beta/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/siloP.c b/src/files/lang/ntsc-beta/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_f.c b/src/files/lang/ntsc-beta/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_g.c b/src/files/lang/ntsc-beta/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_i.c b/src/files/lang/ntsc-beta/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_s.c b/src/files/lang/ntsc-beta/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/statE.c b/src/files/lang/ntsc-beta/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/statJ.c b/src/files/lang/ntsc-beta/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/ntsc-beta/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/statP.c b/src/files/lang/ntsc-beta/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_f.c b/src/files/lang/ntsc-beta/stat_str_f.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_g.c b/src/files/lang/ntsc-beta/stat_str_g.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_i.c b/src/files/lang/ntsc-beta/stat_str_i.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_s.c b/src/files/lang/ntsc-beta/stat_str_s.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/titleE.c b/src/files/lang/ntsc-beta/titleE.c new file mode 100644 index 000000000..505278802 --- /dev/null +++ b/src/files/lang/ntsc-beta/titleE.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "rare twycross\n", + /*111*/ "chris stamper\n", + /*112*/ "wombat\n", + /*113*/ "rare miami\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "nintendo\n", + /*135*/ "mr arakawa\n", + /*136*/ "mike fukuda\n", + /*137*/ "don james\n", + /*138*/ "michael kelbaugh\n", + /*139*/ "howard lincoln\n", + /*140*/ "ken lobb\n", + /*141*/ "jacqualee story\n", + /*142*/ "gail tilden\n", + /*143*/ "copyright rare 2000\n", + /*144*/ "perfect dark and the pd device\n", + /*145*/ "are trademarks\n", + /*146*/ "rare\n", + /*147*/ "designs on the future\n", + /*148*/ "perfect dark is forever\n", + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/titleJ.c b/src/files/lang/ntsc-beta/titleJ.c new file mode 100644 index 000000000..f1ac89ef0 --- /dev/null +++ b/src/files/lang/ntsc-beta/titleJ.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j. northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons animator\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "(is watching)\n", + /* 17*/ "b jones\n", + /* 18*/ "(unknown purpose)\n", + /* 19*/ "steve malpass\n", + /* 20*/ "edge wrangler\n", + /* 21*/ "brian marshall\n", + /* 22*/ "code janitor\n", + /* 23*/ "russell irwin\n", + /* 24*/ "pak man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "pad jockey\n", + /* 27*/ "ross bury\n", + /* 28*/ "pixel pusher\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonsz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "background artist\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "development tools\n", + /* 59*/ "richard gale\n", + /* 60*/ "mark green\n", + /* 61*/ "mark wilson\n", + /* 62*/ "hardware support\n", + /* 63*/ "pete cox\n", + /* 64*/ "paul mikell\n", + /* 65*/ "doug crouch\n", + /* 66*/ "thanks\n", + /* 67*/ "neil gallagher\n", + /* 68*/ "jonathon o'conner\n", + /* 69*/ "gareth glover\n", + /* 70*/ "motion capture\n", + /* 71*/ "alan tipper\n", + /* 72*/ "des easen\n", + /* 73*/ "jim ballard\n", + /* 74*/ "michelle tipper\n", + /* 75*/ "testing (rare)\n", + /* 76*/ "huw ward\n", + /* 77*/ "david wong\n", + /* 78*/ "adam munton\n", + /* 79*/ "luke munton\n", + /* 80*/ "garry phelps\n", + /* 81*/ "jon silke\n", + /* 82*/ "matthew carter\n", + /* 83*/ "gavin price\n", + /* 84*/ "gareth stevenson\n", + /* 85*/ "joe stamper\n", + /* 86*/ "stephen stamper\n", + /* 87*/ "testing (noa)\n", + /* 88*/ "nintendo guy\n", + /* 89*/ "nintendo gal\n", + /* 90*/ "rare miami\n", + /* 91*/ "eileen hochberg\n", + /* 92*/ "joel hochberg\n", + /* 93*/ "rare twycross\n", + /* 94*/ "chris stamper\n", + /* 95*/ "tim stamper\n", + /* 96*/ "nintendo\n", + /* 97*/ "ken lobb\n", + /* 98*/ "howard lincoln\n", + /* 99*/ "mr arrakawa\n", + /*100*/ "mr yamauchi\n", + /*101*/ "copyright rare 2000\n", + /*102*/ "perfect dark, the pd device and\n", + /*103*/ "perfecthead are trademarks\n", + /*104*/ "rare\n", + /*105*/ "designs on the future\n", + /*106*/ "t&a support\n", + /*107*/ "emma scully\n", + /*108*/ "claire phelan\n", + /*109*/ "joanna dark is forever\n", + /*110*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*111*/ NULL, + /*112*/ NULL, + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/titleP.c b/src/files/lang/ntsc-beta/titleP.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/titleP.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_f.c b/src/files/lang/ntsc-beta/title_str_f.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_f.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_g.c b/src/files/lang/ntsc-beta/title_str_g.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_g.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_i.c b/src/files/lang/ntsc-beta/title_str_i.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_i.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_s.c b/src/files/lang/ntsc-beta/title_str_s.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_s.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/traE.c b/src/files/lang/ntsc-beta/traE.c new file mode 100644 index 000000000..26aea314a --- /dev/null +++ b/src/files/lang/ntsc-beta/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/traJ.c b/src/files/lang/ntsc-beta/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/ntsc-beta/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/traP.c b/src/files/lang/ntsc-beta/traP.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_f.c b/src/files/lang/ntsc-beta/tra_str_f.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_g.c b/src/files/lang/ntsc-beta/tra_str_g.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_i.c b/src/files/lang/ntsc-beta/tra_str_i.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_s.c b/src/files/lang/ntsc-beta/tra_str_s.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/uffE.c b/src/files/lang/ntsc-beta/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uffJ.c b/src/files/lang/ntsc-beta/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uffP.c b/src/files/lang/ntsc-beta/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_f.c b/src/files/lang/ntsc-beta/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_g.c b/src/files/lang/ntsc-beta/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_i.c b/src/files/lang/ntsc-beta/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_s.c b/src/files/lang/ntsc-beta/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/waxE.c b/src/files/lang/ntsc-beta/waxE.c new file mode 100644 index 000000000..0810f4685 --- /dev/null +++ b/src/files/lang/ntsc-beta/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift Has Been Disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/waxJ.c b/src/files/lang/ntsc-beta/waxJ.c new file mode 100644 index 000000000..ccf1f85d0 --- /dev/null +++ b/src/files/lang/ntsc-beta/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/waxP.c b/src/files/lang/ntsc-beta/waxP.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_f.c b/src/files/lang/ntsc-beta/wax_str_f.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_g.c b/src/files/lang/ntsc-beta/wax_str_g.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_i.c b/src/files/lang/ntsc-beta/wax_str_i.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_s.c b/src/files/lang/ntsc-beta/wax_str_s.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ameE.c b/src/files/lang/ntsc-final/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/ntsc-final/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ameJ.c b/src/files/lang/ntsc-final/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/ntsc-final/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ameP.c b/src/files/lang/ntsc-final/ameP.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_f.c b/src/files/lang/ntsc-final/ame_str_f.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_g.c b/src/files/lang/ntsc-final/ame_str_g.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_i.c b/src/files/lang/ntsc-final/ame_str_i.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_s.c b/src/files/lang/ntsc-final/ame_str_s.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/archE.c b/src/files/lang/ntsc-final/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/archJ.c b/src/files/lang/ntsc-final/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/archP.c b/src/files/lang/ntsc-final/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_f.c b/src/files/lang/ntsc-final/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_g.c b/src/files/lang/ntsc-final/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_i.c b/src/files/lang/ntsc-final/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_s.c b/src/files/lang/ntsc-final/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arecE.c b/src/files/lang/ntsc-final/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arecJ.c b/src/files/lang/ntsc-final/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arecP.c b/src/files/lang/ntsc-final/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_f.c b/src/files/lang/ntsc-final/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_g.c b/src/files/lang/ntsc-final/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_i.c b/src/files/lang/ntsc-final/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_s.c b/src/files/lang/ntsc-final/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arkE.c b/src/files/lang/ntsc-final/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/ntsc-final/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/arkJ.c b/src/files/lang/ntsc-final/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/ntsc-final/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/arkP.c b/src/files/lang/ntsc-final/arkP.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_f.c b/src/files/lang/ntsc-final/ark_str_f.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_g.c b/src/files/lang/ntsc-final/ark_str_g.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_i.c b/src/files/lang/ntsc-final/ark_str_i.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_s.c b/src/files/lang/ntsc-final/ark_str_s.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ashE.c b/src/files/lang/ntsc-final/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ashJ.c b/src/files/lang/ntsc-final/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ashP.c b/src/files/lang/ntsc-final/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_f.c b/src/files/lang/ntsc-final/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_g.c b/src/files/lang/ntsc-final/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_i.c b/src/files/lang/ntsc-final/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_s.c b/src/files/lang/ntsc-final/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ateE.c b/src/files/lang/ntsc-final/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ateJ.c b/src/files/lang/ntsc-final/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/ntsc-final/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ateP.c b/src/files/lang/ntsc-final/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_f.c b/src/files/lang/ntsc-final/ate_str_f.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_g.c b/src/files/lang/ntsc-final/ate_str_g.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_i.c b/src/files/lang/ntsc-final/ate_str_i.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_s.c b/src/files/lang/ntsc-final/ate_str_s.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/aztE.c b/src/files/lang/ntsc-final/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/ntsc-final/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/aztJ.c b/src/files/lang/ntsc-final/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/ntsc-final/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/ntsc-final/aztP.c b/src/files/lang/ntsc-final/aztP.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_f.c b/src/files/lang/ntsc-final/azt_str_f.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_g.c b/src/files/lang/ntsc-final/azt_str_g.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_i.c b/src/files/lang/ntsc-final/azt_str_i.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_s.c b/src/files/lang/ntsc-final/azt_str_s.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/catE.c b/src/files/lang/ntsc-final/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/catJ.c b/src/files/lang/ntsc-final/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/catP.c b/src/files/lang/ntsc-final/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_f.c b/src/files/lang/ntsc-final/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_g.c b/src/files/lang/ntsc-final/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_i.c b/src/files/lang/ntsc-final/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_s.c b/src/files/lang/ntsc-final/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/caveE.c b/src/files/lang/ntsc-final/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/ntsc-final/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/caveJ.c b/src/files/lang/ntsc-final/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/ntsc-final/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/caveP.c b/src/files/lang/ntsc-final/caveP.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_f.c b/src/files/lang/ntsc-final/cave_str_f.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_g.c b/src/files/lang/ntsc-final/cave_str_g.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_i.c b/src/files/lang/ntsc-final/cave_str_i.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_s.c b/src/files/lang/ntsc-final/cave_str_s.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cradE.c b/src/files/lang/ntsc-final/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cradJ.c b/src/files/lang/ntsc-final/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cradP.c b/src/files/lang/ntsc-final/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_f.c b/src/files/lang/ntsc-final/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_g.c b/src/files/lang/ntsc-final/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_i.c b/src/files/lang/ntsc-final/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_s.c b/src/files/lang/ntsc-final/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crypE.c b/src/files/lang/ntsc-final/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crypJ.c b/src/files/lang/ntsc-final/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crypP.c b/src/files/lang/ntsc-final/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_f.c b/src/files/lang/ntsc-final/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_g.c b/src/files/lang/ntsc-final/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_i.c b/src/files/lang/ntsc-final/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_s.c b/src/files/lang/ntsc-final/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/damE.c b/src/files/lang/ntsc-final/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/ntsc-final/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/damJ.c b/src/files/lang/ntsc-final/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/ntsc-final/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/damP.c b/src/files/lang/ntsc-final/damP.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_f.c b/src/files/lang/ntsc-final/dam_str_f.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_g.c b/src/files/lang/ntsc-final/dam_str_g.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_i.c b/src/files/lang/ntsc-final/dam_str_i.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_s.c b/src/files/lang/ntsc-final/dam_str_s.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/depoE.c b/src/files/lang/ntsc-final/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/ntsc-final/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depoJ.c b/src/files/lang/ntsc-final/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/ntsc-final/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/ntsc-final/depoP.c b/src/files/lang/ntsc-final/depoP.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_f.c b/src/files/lang/ntsc-final/depo_str_f.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_g.c b/src/files/lang/ntsc-final/depo_str_g.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_i.c b/src/files/lang/ntsc-final/depo_str_i.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_s.c b/src/files/lang/ntsc-final/depo_str_s.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/destE.c b/src/files/lang/ntsc-final/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/destJ.c b/src/files/lang/ntsc-final/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/destP.c b/src/files/lang/ntsc-final/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_f.c b/src/files/lang/ntsc-final/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_g.c b/src/files/lang/ntsc-final/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_i.c b/src/files/lang/ntsc-final/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_s.c b/src/files/lang/ntsc-final/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dishE.c b/src/files/lang/ntsc-final/dishE.c new file mode 100644 index 000000000..932fa468d --- /dev/null +++ b/src/files/lang/ntsc-final/dishE.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dishJ.c b/src/files/lang/ntsc-final/dishJ.c new file mode 100644 index 000000000..9ac44c2cf --- /dev/null +++ b/src/files/lang/ntsc-final/dishJ.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight From Table To Begin\n", + /* 9*/ "Activate The Night Sight\nLocate The Light Switch\nTurn The Lights Back On\n", + /* 10*/ "Collect Data Uplink From Table To Begin\n", + /* 11*/ "Stand next to the terminal and use the uplink\n", + /* 12*/ "You Need To Be Holding The Data Uplink\n", + /* 13*/ "Connection Established...\n", + /* 14*/ "Terminal Has Been Successfully Hacked\n", + /* 15*/ "Connection Broken - Too Far From PC\n", + /* 16*/ "Collect ECM Mine From Table To Begin\n", + /* 17*/ "Locate Hub And Throw ECM Mine Onto Hub\n", + /* 18*/ "ECM Mine Has Been Placed Incorrectly\n", + /* 19*/ "ECM Mine Has Been Placed Correctly\n", + /* 20*/ "Collect Eye-Spy From Table To Begin\n", + /* 21*/ "Locate Info Room PC and Holograph It\n", + /* 22*/ "Info Room PC Successfully Holographed\n", + /* 23*/ "Lights Have Been Re-activated\n", + /* 24*/ "Collect Door Decoder From Table To Begin\n", + /* 25*/ "Use Decoder On Door Pad To Unlock It\n", + /* 26*/ "You Need To Be Holding The Door Decoder\n", + /* 27*/ "Decoder Attached. Initiating Cracking Routines..\n", + /* 28*/ "Decoding Complete. Door Has Been Unlocked.\n", + /* 29*/ "Collect Tracker From Table To Begin\n", + /* 30*/ "Locate IR Scanner Using Tracker\n", + /* 31*/ "IR Scanner Has Been Successfully Located\n", + /* 32*/ "Collect IR Scanner From Table To Begin\n", + /* 33*/ "Locate Secret Door Using IR Scanner\n", + /* 34*/ "Secret Door Has Been Successfully Located\n", + /* 35*/ "Collect XRay Scanner From Table To Begin\n", + /* 36*/ "Find Hidden Switches To Shutdown Laser Grid\n", + /* 37*/ "All Laser Grids Have Been Deactivated\n", + /* 38*/ "Collect Disguise From Table To Begin\n", + /* 39*/ "Fool Someone Into Giving You Cloaking Device\n", + /* 40*/ "Cloaking Device Successfully Retrieved\n", + /* 41*/ "Laser Grid 1 Has Been Deactivated\n", + /* 42*/ "Laser Grid 2 Has Been Deactivated\n", + /* 43*/ "I'm Here To Pick The Equipment\n", + /* 44*/ "Go away Joanna, you don't fool me!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device Has Been Secured Successfully\n", + /* 47*/ "You're Meant To Use The Disguise, remember?\n", + /* 48*/ "You'll Have To Try Harder Than That Joanna\n", + /* 49*/ "Joanna - Where Did You Spring From?\n", + /* 50*/ "You Have Been Detected By The Camera\n", + /* 51*/ "Collect Cloaking Device From Table To Begin\n", + /* 52*/ "Use Cloaking Device And Locate Carrington\n", + /* 53*/ "I think we can safely say you're training\nis now complete!\n", + /* 54*/ "Mission Accomplished - Device Training Complete!\n", + /* 55*/ "Mission Failed - You Have Been Detected\n", + /* 56*/ "Select The Uplink\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Data Uplink And Release A\n", + /* 57*/ "Select The EyeSpy\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Eye-Spy And Release A\n", + /* 58*/ "Select The Night Vision\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Night Vision And Release A\n", + /* 59*/ "Select The Door Decoder\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight DoorDecoder And Release A\n", + /* 60*/ "Select The X-Ray Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight X-Ray Scanner And Release A\n", + /* 61*/ "Select The Disguise\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Disguise And Release A\n", + /* 62*/ "Select The IR Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight IR Scanner And Release A\n", + /* 63*/ "Select The Tracker\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Tracker And Release A\n", + /* 64*/ "Select The Cloaking Device\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Device And Release A\n", + /* 65*/ "Select The ECM Mine\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight ECM Mine And Release A\n", + /* 66*/ "Joanna, It's good to see you.\n", + /* 67*/ "Come with me Joanna.\nI'll walk you to the training room.\n", + /* 68*/ "The information centre is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B next to Hovcrate to grab it...\n", + /* 74*/ "Press B when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble Tap B next to Hovbike to ride it...\n", + /* 76*/ "Double Tap B when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B next to door to open it.\n", + /* 78*/ "B will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B next to door to call elevator.\n", + /* 80*/ "Cannot Exit While Training Is In Progress\n", + /* 81*/ "Switch Code 1 Has Been Obtained.\n", + /* 82*/ "Switch Code 2 Has Been Obtained.\n", + /* 83*/ "Switch Code 3 Has Been Obtained.\n", + /* 84*/ "Switch Code 4 Has Been Obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C To Look Up At The Target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C To Look Down At The Target.\n", + /* 87*/ "Holoprogram 2 Has Been Completed Successfully.\n", + /* 88*/ "Holoprogram 4 Has Been Completed Successfully.\n", + /* 89*/ "Holoprogram 5 Has Been Completed Successfully.\n", + /* 90*/ "Guard Has Been Successfully Disarmed.\n", + /* 91*/ "Guard Has Been Successfully Knocked Out.\n", + /* 92*/ "Disarm This Live Target If You Can.\n", + /* 93*/ "Knock Out This Target - Stealth Is The Key.\n", + /* 94*/ "and the final guard....\n", + /* 95*/ "DUCK\n- Hold R Then Press Down C To Duck.\n", + /* 96*/ "CROUCH\n- When Ducking, Hold R Then Press Down C To Duck.\n", + /* 97*/ "Holoprogram 3 Has Been Completed Successfully.\n", + /* 98*/ "Activate All The Switches.\n", + /* 99*/ "Activate All Of The Wall Switches.\n- Be Quick, As They Will Quickly Reset.\n", + /*100*/ "Get The Access Codes By Examining Terminals.\n- Use The Codes On The Wall Terminals.\n", + /*101*/ "Code 1 Has Been Obtained.\n", + /*102*/ "Code 2 Has Been Obtained.\n", + /*103*/ "Code 3 Has Been Obtained.\n", + /*104*/ "Code 4 Has Been Obtained.\n", + /*105*/ "Training Failed - You Must Face Forward.\n", + /*106*/ "Holoprogram 1 Has Been Completed Successfully.\n", + /*107*/ "Unarmed Combat - Knock Out The Target.\n- Press Z repeatedly to punch.\n", + /*108*/ "Now Try Against A Moving Target...\n", + /*109*/ "And Finally Against A Target That Fights Back.\n", + /*110*/ "Defeat All Enemies Without Getting Hit.\n", + /*111*/ "Training Failed - You Have Been Hit.\n", + /*112*/ "Holoprogram 6 Has Been Completed Successfully.\n", + /*113*/ "Holoprogram 7 Has Been Completed Successfully.\n", + /*114*/ "TERMINALS\n- Press B next to terminal to use it.\n", + /*115*/ "Now Activate The Red Terminals On The Wall.\n", + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dishP.c b/src/files/lang/ntsc-final/dishP.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dishP.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_f.c b/src/files/lang/ntsc-final/dish_str_f.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_f.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_g.c b/src/files/lang/ntsc-final/dish_str_g.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_g.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_i.c b/src/files/lang/ntsc-final/dish_str_i.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_i.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_s.c b/src/files/lang/ntsc-final/dish_str_s.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_s.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/earE.c b/src/files/lang/ntsc-final/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/ntsc-final/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/earJ.c b/src/files/lang/ntsc-final/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/ntsc-final/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/earP.c b/src/files/lang/ntsc-final/earP.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_f.c b/src/files/lang/ntsc-final/ear_str_f.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_g.c b/src/files/lang/ntsc-final/ear_str_g.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_i.c b/src/files/lang/ntsc-final/ear_str_i.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_s.c b/src/files/lang/ntsc-final/ear_str_s.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eldE.c b/src/files/lang/ntsc-final/eldE.c new file mode 100644 index 000000000..746ed6f63 --- /dev/null +++ b/src/files/lang/ntsc-final/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eldJ.c b/src/files/lang/ntsc-final/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/ntsc-final/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eldP.c b/src/files/lang/ntsc-final/eldP.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_f.c b/src/files/lang/ntsc-final/eld_str_f.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_g.c b/src/files/lang/ntsc-final/eld_str_g.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_i.c b/src/files/lang/ntsc-final/eld_str_i.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_s.c b/src/files/lang/ntsc-final/eld_str_s.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gunE.c b/src/files/lang/ntsc-final/gunE.c new file mode 100644 index 000000000..d65751bc4 --- /dev/null +++ b/src/files/lang/ntsc-final/gunE.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gunJ.c b/src/files/lang/ntsc-final/gunJ.c new file mode 100644 index 000000000..4c55c54e4 --- /dev/null +++ b/src/files/lang/ntsc-final/gunJ.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gunP.c b/src/files/lang/ntsc-final/gunP.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gunP.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_f.c b/src/files/lang/ntsc-final/gun_str_f.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_f.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_g.c b/src/files/lang/ntsc-final/gun_str_g.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_g.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_i.c b/src/files/lang/ntsc-final/gun_str_i.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_i.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_s.c b/src/files/lang/ntsc-final/gun_str_s.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_s.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/impE.c b/src/files/lang/ntsc-final/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/ntsc-final/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/impJ.c b/src/files/lang/ntsc-final/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/ntsc-final/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/impP.c b/src/files/lang/ntsc-final/impP.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_f.c b/src/files/lang/ntsc-final/imp_str_f.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_g.c b/src/files/lang/ntsc-final/imp_str_g.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_i.c b/src/files/lang/ntsc-final/imp_str_i.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_s.c b/src/files/lang/ntsc-final/imp_str_s.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/junE.c b/src/files/lang/ntsc-final/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/junJ.c b/src/files/lang/ntsc-final/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/junP.c b/src/files/lang/ntsc-final/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_f.c b/src/files/lang/ntsc-final/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_g.c b/src/files/lang/ntsc-final/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_i.c b/src/files/lang/ntsc-final/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_s.c b/src/files/lang/ntsc-final/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lamE.c b/src/files/lang/ntsc-final/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lamJ.c b/src/files/lang/ntsc-final/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lamP.c b/src/files/lang/ntsc-final/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_f.c b/src/files/lang/ntsc-final/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_g.c b/src/files/lang/ntsc-final/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_i.c b/src/files/lang/ntsc-final/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_s.c b/src/files/lang/ntsc-final/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/leeE.c b/src/files/lang/ntsc-final/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/ntsc-final/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/leeJ.c b/src/files/lang/ntsc-final/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/ntsc-final/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/leeP.c b/src/files/lang/ntsc-final/leeP.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_f.c b/src/files/lang/ntsc-final/lee_str_f.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_g.c b/src/files/lang/ntsc-final/lee_str_g.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_i.c b/src/files/lang/ntsc-final/lee_str_i.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_s.c b/src/files/lang/ntsc-final/lee_str_s.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lenE.c b/src/files/lang/ntsc-final/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lenJ.c b/src/files/lang/ntsc-final/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lenP.c b/src/files/lang/ntsc-final/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_f.c b/src/files/lang/ntsc-final/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_g.c b/src/files/lang/ntsc-final/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_i.c b/src/files/lang/ntsc-final/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_s.c b/src/files/lang/ntsc-final/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lipE.c b/src/files/lang/ntsc-final/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/ntsc-final/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lipJ.c b/src/files/lang/ntsc-final/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/ntsc-final/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lipP.c b/src/files/lang/ntsc-final/lipP.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_f.c b/src/files/lang/ntsc-final/lip_str_f.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_g.c b/src/files/lang/ntsc-final/lip_str_g.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_i.c b/src/files/lang/ntsc-final/lip_str_i.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_s.c b/src/files/lang/ntsc-final/lip_str_s.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lueE.c b/src/files/lang/ntsc-final/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/ntsc-final/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lueJ.c b/src/files/lang/ntsc-final/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/ntsc-final/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lueP.c b/src/files/lang/ntsc-final/lueP.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_f.c b/src/files/lang/ntsc-final/lue_str_f.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_g.c b/src/files/lang/ntsc-final/lue_str_g.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_i.c b/src/files/lang/ntsc-final/lue_str_i.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_s.c b/src/files/lang/ntsc-final/lue_str_s.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/miscE.c b/src/files/lang/ntsc-final/miscE.c new file mode 100644 index 000000000..9b4701a18 --- /dev/null +++ b/src/files/lang/ntsc-final/miscE.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "YKK: 95935", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PeaceSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KazeSim", + /* 98*/ "FistSim", + /* 99*/ "PreySim", + /*100*/ "CowardSim", + /*101*/ "JudgeSim", + /*102*/ "FeudSim", + /*103*/ "SpeedSim", + /*104*/ "TurtleSim", + /*105*/ "VengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A51 Infiltration", + /*144*/ "A51 Infiltration X", + /*145*/ "A51 Rescue", + /*146*/ "A51 Rescue X", + /*147*/ "A51 Escape", + /*148*/ "A51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon\n", + /*171*/ "Function\n", + /*172*/ "Orders\n", + /*173*/ "No Weapon\n", + /*174*/ "Pick Target\n", + /*175*/ "Follow\n", + /*176*/ "Attack\n", + /*177*/ "Defend\n", + /*178*/ "Hold\n", + /*179*/ "Normal\n", + /*180*/ "Download\n", + /*181*/ "Get Case\n", + /*182*/ "Tag Box\n", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "JM: 201172", + /*209*/ "Save Case\n", + /*210*/ "Def Hill\n", + /*211*/ "Hold Hill\n", + /*212*/ "Get Case\n", + /*213*/ "Pop Cap\n", + /*214*/ "Protect\n", + /*215*/ "All Simulants\n", + /*216*/ "MODEL 1.3", + /*217*/ "BNC: 15877", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ "Stealth\n", +}; diff --git a/src/files/lang/ntsc-final/miscJ.c b/src/files/lang/ntsc-final/miscJ.c new file mode 100644 index 000000000..5b110ec01 --- /dev/null +++ b/src/files/lang/ntsc-final/miscJ.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Bond Invisible", + /* 5*/ "Bond Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny Bond", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Golden Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "invincibility on\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Bond Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny Bond On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy Now Karl?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Bond Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Bond Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - Abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun\n", + /* 72*/ "Don't point that gun at me\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "EYESPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is therefore the best choice for the beginner. It is not very intelligent and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills & intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists which protest the use of weapons. They will go around the level hunting for guns that are lying around and horde them so that players cannot use them. Of course, if you were to shoot them they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamiKazeSim: This simulant will stop at nothing to destroy it's target. It is very aggressive and never keeps it's distance (even if it's holding a grenade!). Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However it has no such reservations when it comes to unarmed combat. It will always try to use it's fists to attack or disarm it's opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try and survive by running away. It may sometimes attack but only if the opponent has an inferior weapon. Draw out a better gun or shoot it and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and dispises the tactics of the PredatorSim. It will always try and kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily out-run a human player so it's no use running away from a CheetahSim unless you know some good short-cuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately this restricts the hosts movement so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomise\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Flag", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Flag", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the callsign 'Perfect Dark'.\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark he held the honour of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents, runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power, dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she hates. \n\n[source: WALL STREET JOURNAL]\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne corp with an emphasis on language skills and code-breaking. Fortunately he has morals, and due to his formidable level of intelligence has guessed some of dataDyne's future plans. The voice is highly precise and educated, and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde young human male whose the voice is dull, annoying, and cringeworthy. Very tall. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar Warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The US President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys'. They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington, a formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. Tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion, and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battlecruiser of immense power was scuttled in the Pacific ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of Humans alone to develop.\n\nThe Maians meet the Skedar and they have a fight that turns into a protracted war. After hundreds of years of fighting an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations'. They fear that announcing their presence may well precipitate further wars on the planet, and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battlecruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battlecruiser is. Their tests direct them to the pacific ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne have to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the president. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the US government so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne have made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battlecruiser. When it expresses concern about the mission it is being created for the response of Cassandra De Vries is to order its personality removed. Clearly it is thinking too much. In desperation it contacts the Carrington organisation with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation, but continues with the mission to get him/it to a place of safety. With the alarm raised Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll but her boss has heard enough from the AI to prompt him into summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 building, a front for the dataDyne corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent job for her to complete first.\n\nThe specialists' have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the president's entourage to gain access to the airbase where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for the President, Elvis, herself and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible they head down to the ocean floor, where they get their first sight of the sunken Cetan battlecruiser. Entering the ship through the portal the Skedar have made they come across a dead skedar warrior... clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship where they find the AI that was once Dr. Caroll. Once his personality is restored he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. Joanna holds them off while the majority of the employees escape, before getting knocked unconscious and captured by the Skedar.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar battle shrine, which gives Elvis a shock since the Maians could never find this Skedar holiest of holy places. If the Shrine is destroyed the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the battle shrine, while Elvis returns to the Assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "dataDyne are nasty\n", + /*269*/ "Carrington Institute\n", + /*270*/ "The Carrington Institute is lovely\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human sized pulse of heat.\n\nTraining Instructions\n- Holograph the Hackers terminal next door in the Info room.\n\nOperation\n- Press Z to take a holograph. Pressing B will open any doors in the way.Hold down R to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights lifeforms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch and activate it to turn the lights back on.\n\nOperation\n- Select the Nightvision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Standalone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the door decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press B while holding the door decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the night vision and IR goggles can not.\n\nTraining Instructions\n- With the Xray Scanner on, search for the 2 hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the Xray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick witted enemy.\n\nTraining Instructions\n- Grimshaw has a cloaking device waiting to be serviced. Head next door and 'aquire' it from him.\n\nOperation\n- To wear the disguise simply select it from your inventory.\n", + /*276*/ "Drscription\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Distrupts the radiation field around the wearer, creating a chameleon type effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the cloaking device and head to Carringtons office to suprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM mine onto the lighting hub located through the secret door.\n\nOperation\n- Press Z to throw the mine. Hold down R and move the stick to fine tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Comms Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press B when holding Comms Uplink.\n", + /*281*/ "FIRING\n Press Z to fire gun\n", + /*282*/ "AUTO RELOAD\n Release Z to reload when magazine empty\n", + /*283*/ "MANUAL RELOAD\n Press B to reload early if magazine not full\n", + /*284*/ "Aiming: hold down R to enter aim mode\n", + /*285*/ "Use analog stick to move aiming sight\n", + /*286*/ "AUTO FIRE\n Hold Z to repeatedly fire automatically\n", + /*287*/ "ALTER AIM\n Press up C or down C to move sight up/down\n", + /*288*/ "ZOOM\n Hold R to enter Zoom mode\n", + /*289*/ "FAST FIRE\n Press Z quickly to fire faster\n", + /*290*/ "ELVIS IS DEAD OR FALLEN OUT OF THE BACKGROUND\n", + /*291*/ "Carrington Institute\0|Main building and base of operations\n", + /*292*/ "Lucerne Tower\0|Global Headquarters\n", + /*293*/ "Laboratory Basement\0|Underground research labs\n", + /*294*/ "Carrington Villa\0|Private coastal retreat\n", + /*295*/ "Chicago\0|Backstreets of the city\n", + /*296*/ "G5 Building\0|dataDyne front corporation\n", + /*297*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*298*/ "Alaskan Airbase\0|Brooks Range, Alaska\n", + /*299*/ "Air Force One\0|The President's Airplane\n", + /*300*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*301*/ "Pelagic 2\0|Specialised Deep Sea Research Ship\n", + /*302*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*303*/ "Skedar Assault Ship\0|Troop Carrying spacecraft\n", + /*304*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*305*/ "Dropship\0|Insert subtitle here\n", + /*306*/ "HoverCrate\0|Insert subtitle here\n", + /*307*/ "HoverBike\0|subtitle here\n", + /*308*/ "Cleaning Hovbot\0|Insert subtitle here\n", + /*309*/ "Hovercopter\0|Insert subtitle here\n", + /*310*/ "G5 Robot\0|Insert subtitle here\n", + /*311*/ "A51 Interceptor\0|Insert subtitle here\n", + /*312*/ "Maian Vessel\0|Insert subtitle here\n", + /*313*/ "Skedar Shuttle\0|Insert subtitle here\n", + /*314*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*315*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*316*/ "These heavily guarded, well hidden labs hold the key to dataDyne's future. Within them, techs work on top secret projects aimed at putting dataDyne on the top of the heap.\n", + /*317*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*318*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 corporation has their headquarters.\n", + /*319*/ "Inside the G5 building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*320*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*321*/ "One of a series of reinforced airbases available as staging posts for Air Force One. Typically, the airbase is remote, in an inhospitable region, far away from prying eyes.\n", + /*322*/ "This particular Air Force One is optimised for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*323*/ "In the rocky snow-covered landscape of the Arctic Circle the wreckage of the stricken plane has come to rest.\n", + /*324*/ "Owned by the US government, the Pelagic 2 is capable of staging deep sea diving operations in all weathers. It is the only fully integrated ocean floor research vessel in the world.\n", + /*325*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*326*/ "An interplanetary assault ship that carries Skedar Warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*327*/ "A highly arid planet, wracked by earthquakes, sandstorms and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*328*/ "that thing in the first cutscene\n", + /*329*/ "a floating crate\n", + /*330*/ "a floating bike\n", + /*331*/ "a floating hoover\n", + /*332*/ "a cool ship with startling AI and realistic dynamic movement\n", + /*333*/ "a superb attack drone with lovely rotating guns and brilliant AI\n", + /*334*/ "just as cool as the hovercopter, especially when it crashes\n", + /*335*/ "ooh! shiny\n", + /*336*/ "skedar shuttle thing\n", + /*337*/ "Description\n- A good agent notices everything around them.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press Down C\n-Look down- Press Up C\n-Free Look- Hold down R to enter aim mode and use the stick to look.\n", + /*338*/ "Description\n- Proverb type saying about movement 1 here.\n\nTraining Instructions\n- Activate All Of The Switches In Front. Be Quick Though, As Each Switch Will Reset On A Time Limit.\n\nOperation\n- Sidestep left- Left C\n- Sidestep right- Right C\n\n", + /*339*/ "Description\n- Proverb type saying about movement 2 here.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate The Switches.\n\nOperation\n- Duck- Hold R then press down C.\n- Crouch- When ducking, Hold R then press down C.\n- Get Up- Tap R.\n\n", + /*340*/ "Description\n- Proverb type saying about unarmed combat 1 here.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press Z repeatedly when unarmed to launch a flurry of punches.\n\n", + /*341*/ "Description\n- Proverb type saying about unarmed combat 2 here.\n\nTraining Instructions\n- Knockout/Disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold B then press Z to disarm an enemy.\n- Knockout Punch - punch an unaware enemy from behind.\n", + /*342*/ "Description\n- Proverb type saying about combat test 1 here.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*343*/ "Description\n- Proverb type saying about combat test 2 here.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*344*/ "holo_tips1\n", + /*345*/ "holo_tips2\n", + /*346*/ "holo_tips3\n", + /*347*/ "holo_tips4\n", + /*348*/ "holo_tips5\n", + /*349*/ "holo_tips6\n", + /*350*/ "holo_tips7\n", + /*351*/ "holo_advice1\n", + /*352*/ "holo_advice2\n", + /*353*/ "holo_advice3\n", + /*354*/ "holo_advice4\n", + /*355*/ "holo_advice5\n", + /*356*/ "holo_advice6\n", + /*357*/ "holo_advice7\n", + /*358*/ "device_tips1\n", + /*359*/ "device_tips2\n", + /*360*/ "device_tips3\n", + /*361*/ "device_tips4\n", + /*362*/ "device_tips5\n", + /*363*/ "device_tips6\n", + /*364*/ "device_tips7\n", + /*365*/ "device_tips8\n", + /*366*/ "device_tips9\n", + /*367*/ "device_tips10\n", + /*368*/ "device_advice1\n", + /*369*/ "device_advice2\n", + /*370*/ "device_advice3\n", + /*371*/ "device_advice4\n", + /*372*/ "device_advice5\n", + /*373*/ "device_advice6\n", + /*374*/ "device_advice7\n", + /*375*/ "device_advice8\n", + /*376*/ "device_advice9\n", + /*377*/ "device_advice10\n", + /*378*/ "Instructions for falcon2\n", + /*379*/ "Instructions for falcon2scope\n", + /*380*/ "Instructions for falcon2silenced\n", + /*381*/ "Instructions for leegun1\n", + /*382*/ "Instructions for skedarpistol\n", + /*383*/ "Instructions for maianpistol\n", + /*384*/ "Instructions for dy357\n", + /*385*/ "Instructions for dy357_trent\n", + /*386*/ "Instructions for cmp150\n", + /*387*/ "Instructions for cyclone\n", + /*388*/ "Instructions for maiansmg\n", + /*389*/ "Instructions for anothersmg\n", + /*390*/ "Instructions for pcgun\n", + /*391*/ "Instructions for dydragon\n", + /*392*/ "Instructions for k7avenger\n", + /*393*/ "Instructions for ar34\n", + /*394*/ "Instructions for dysuperdragon\n", + /*395*/ "Instructions for shotgun\n", + /*396*/ "Instructions for sniperrifle\n", + /*397*/ "Instructions for z2020\n", + /*398*/ "Instructions for crossbow\n", + /*399*/ "Instructions for druggun\n", + /*400*/ "Instructions for skedarminigun\n", + /*401*/ "Instructions for dydevastator\n", + /*402*/ "Instructions for dyrocket\n", + /*403*/ "Instructions for skedarrocket\n", + /*404*/ "Instructions for knife\n", + /*405*/ "Instructions for laser\n", + /*406*/ "Instructions for grenade\n", + /*407*/ "Instructions for nbomb\n", + /*408*/ "Instructions for timedmine\n", + /*409*/ "Instructions for proximitymine\n", + /*410*/ "Instructions for remotemine\n", + /*411*/ "Style 1", + /*412*/ "Style 2", + /*413*/ "Style 3", + /*414*/ "Style 4", + /*415*/ "Blond", + /*416*/ "Black", + /*417*/ "Auburn", + /*418*/ "Blue Rinse", + /*419*/ "Player", + /*420*/ "", + /*421*/ "Identify\n", + /*422*/ "Sim", + /*423*/ "Challenges\n", + /*424*/ "Load/Preset Games\n", + /*425*/ "Quick Start\n", + /*426*/ "Advanced Setup\n", + /*427*/ "Combat Simulator\n", + /*428*/ "Carrington Institute\n", + /*429*/ "Team Score\n", + /*430*/ "Finished Setup\n", + /*431*/ "Player 1 Team\n", + /*432*/ "Player 2 Team\n", + /*433*/ "Player 3 Team\n", + /*434*/ "Player 4 Team\n", + /*435*/ "Number Of Sims\n", + /*436*/ "Sims Per Team\n", + /*437*/ "Sim Difficulty\n", + /*438*/ "Start Game\n", + /*439*/ "Drop Out\n", + /*440*/ "Player Settings\n", + /*441*/ "Game Settings\n", + /*442*/ "Quick Go\n", + /*443*/ "Ready!\n", + /*444*/ "Quick Team\n", + /*445*/ "Players Only\n", + /*446*/ "Players and Simulants\n", + /*447*/ "Player Teams\n", + /*448*/ "Players versus Simulants\n", + /*449*/ "Player-Simulant Teams\n", + /*450*/ NULL, + /*451*/ NULL, + /*452*/ NULL, + /*453*/ NULL, + /*454*/ NULL, + /*455*/ NULL, + /*456*/ NULL, + /*457*/ NULL, + /*458*/ NULL, + /*459*/ NULL, + /*460*/ NULL, + /*461*/ NULL, + /*462*/ NULL, + /*463*/ NULL, + /*464*/ NULL, + /*465*/ NULL, + /*466*/ NULL, + /*467*/ NULL, + /*468*/ NULL, + /*469*/ NULL, + /*470*/ NULL, + /*471*/ NULL, + /*472*/ NULL, + /*473*/ NULL, + /*474*/ NULL, + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/miscP.c b/src/files/lang/ntsc-final/miscP.c new file mode 100644 index 000000000..fd5f4834a --- /dev/null +++ b/src/files/lang/ntsc-final/miscP.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_f.c b/src/files/lang/ntsc-final/misc_str_f.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_f.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_g.c b/src/files/lang/ntsc-final/misc_str_g.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_g.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_i.c b/src/files/lang/ntsc-final/misc_str_i.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_i.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_s.c b/src/files/lang/ntsc-final/misc_str_s.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_s.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mp10E.c b/src/files/lang/ntsc-final/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10J.c b/src/files/lang/ntsc-final/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10P.c b/src/files/lang/ntsc-final/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_f.c b/src/files/lang/ntsc-final/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_g.c b/src/files/lang/ntsc-final/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_i.c b/src/files/lang/ntsc-final/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_s.c b/src/files/lang/ntsc-final/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11E.c b/src/files/lang/ntsc-final/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11J.c b/src/files/lang/ntsc-final/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11P.c b/src/files/lang/ntsc-final/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_f.c b/src/files/lang/ntsc-final/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_g.c b/src/files/lang/ntsc-final/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_i.c b/src/files/lang/ntsc-final/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_s.c b/src/files/lang/ntsc-final/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12E.c b/src/files/lang/ntsc-final/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12J.c b/src/files/lang/ntsc-final/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12P.c b/src/files/lang/ntsc-final/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_f.c b/src/files/lang/ntsc-final/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_g.c b/src/files/lang/ntsc-final/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_i.c b/src/files/lang/ntsc-final/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_s.c b/src/files/lang/ntsc-final/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13E.c b/src/files/lang/ntsc-final/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13J.c b/src/files/lang/ntsc-final/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13P.c b/src/files/lang/ntsc-final/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_f.c b/src/files/lang/ntsc-final/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_g.c b/src/files/lang/ntsc-final/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_i.c b/src/files/lang/ntsc-final/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_s.c b/src/files/lang/ntsc-final/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14E.c b/src/files/lang/ntsc-final/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14J.c b/src/files/lang/ntsc-final/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14P.c b/src/files/lang/ntsc-final/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_f.c b/src/files/lang/ntsc-final/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_g.c b/src/files/lang/ntsc-final/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_i.c b/src/files/lang/ntsc-final/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_s.c b/src/files/lang/ntsc-final/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15E.c b/src/files/lang/ntsc-final/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15J.c b/src/files/lang/ntsc-final/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15P.c b/src/files/lang/ntsc-final/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_f.c b/src/files/lang/ntsc-final/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_g.c b/src/files/lang/ntsc-final/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_i.c b/src/files/lang/ntsc-final/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_s.c b/src/files/lang/ntsc-final/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16E.c b/src/files/lang/ntsc-final/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16J.c b/src/files/lang/ntsc-final/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16P.c b/src/files/lang/ntsc-final/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_f.c b/src/files/lang/ntsc-final/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_g.c b/src/files/lang/ntsc-final/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_i.c b/src/files/lang/ntsc-final/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_s.c b/src/files/lang/ntsc-final/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17E.c b/src/files/lang/ntsc-final/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17J.c b/src/files/lang/ntsc-final/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17P.c b/src/files/lang/ntsc-final/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_f.c b/src/files/lang/ntsc-final/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_g.c b/src/files/lang/ntsc-final/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_i.c b/src/files/lang/ntsc-final/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_s.c b/src/files/lang/ntsc-final/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18E.c b/src/files/lang/ntsc-final/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18J.c b/src/files/lang/ntsc-final/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18P.c b/src/files/lang/ntsc-final/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_f.c b/src/files/lang/ntsc-final/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_g.c b/src/files/lang/ntsc-final/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_i.c b/src/files/lang/ntsc-final/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_s.c b/src/files/lang/ntsc-final/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19E.c b/src/files/lang/ntsc-final/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19J.c b/src/files/lang/ntsc-final/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19P.c b/src/files/lang/ntsc-final/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_f.c b/src/files/lang/ntsc-final/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_g.c b/src/files/lang/ntsc-final/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_i.c b/src/files/lang/ntsc-final/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_s.c b/src/files/lang/ntsc-final/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1E.c b/src/files/lang/ntsc-final/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1J.c b/src/files/lang/ntsc-final/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1P.c b/src/files/lang/ntsc-final/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_f.c b/src/files/lang/ntsc-final/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_g.c b/src/files/lang/ntsc-final/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_i.c b/src/files/lang/ntsc-final/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_s.c b/src/files/lang/ntsc-final/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20E.c b/src/files/lang/ntsc-final/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20J.c b/src/files/lang/ntsc-final/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20P.c b/src/files/lang/ntsc-final/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_f.c b/src/files/lang/ntsc-final/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_g.c b/src/files/lang/ntsc-final/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_i.c b/src/files/lang/ntsc-final/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_s.c b/src/files/lang/ntsc-final/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2E.c b/src/files/lang/ntsc-final/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2J.c b/src/files/lang/ntsc-final/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2P.c b/src/files/lang/ntsc-final/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_f.c b/src/files/lang/ntsc-final/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_g.c b/src/files/lang/ntsc-final/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_i.c b/src/files/lang/ntsc-final/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_s.c b/src/files/lang/ntsc-final/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3E.c b/src/files/lang/ntsc-final/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3J.c b/src/files/lang/ntsc-final/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3P.c b/src/files/lang/ntsc-final/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_f.c b/src/files/lang/ntsc-final/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_g.c b/src/files/lang/ntsc-final/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_i.c b/src/files/lang/ntsc-final/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_s.c b/src/files/lang/ntsc-final/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4E.c b/src/files/lang/ntsc-final/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4J.c b/src/files/lang/ntsc-final/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4P.c b/src/files/lang/ntsc-final/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_f.c b/src/files/lang/ntsc-final/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_g.c b/src/files/lang/ntsc-final/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_i.c b/src/files/lang/ntsc-final/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_s.c b/src/files/lang/ntsc-final/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5E.c b/src/files/lang/ntsc-final/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5J.c b/src/files/lang/ntsc-final/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5P.c b/src/files/lang/ntsc-final/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_f.c b/src/files/lang/ntsc-final/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_g.c b/src/files/lang/ntsc-final/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_i.c b/src/files/lang/ntsc-final/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_s.c b/src/files/lang/ntsc-final/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6E.c b/src/files/lang/ntsc-final/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6J.c b/src/files/lang/ntsc-final/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6P.c b/src/files/lang/ntsc-final/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_f.c b/src/files/lang/ntsc-final/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_g.c b/src/files/lang/ntsc-final/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_i.c b/src/files/lang/ntsc-final/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_s.c b/src/files/lang/ntsc-final/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7E.c b/src/files/lang/ntsc-final/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7J.c b/src/files/lang/ntsc-final/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7P.c b/src/files/lang/ntsc-final/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_f.c b/src/files/lang/ntsc-final/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_g.c b/src/files/lang/ntsc-final/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_i.c b/src/files/lang/ntsc-final/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_s.c b/src/files/lang/ntsc-final/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8E.c b/src/files/lang/ntsc-final/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8J.c b/src/files/lang/ntsc-final/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8P.c b/src/files/lang/ntsc-final/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_f.c b/src/files/lang/ntsc-final/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_g.c b/src/files/lang/ntsc-final/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_i.c b/src/files/lang/ntsc-final/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_s.c b/src/files/lang/ntsc-final/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9E.c b/src/files/lang/ntsc-final/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9J.c b/src/files/lang/ntsc-final/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9P.c b/src/files/lang/ntsc-final/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_f.c b/src/files/lang/ntsc-final/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_g.c b/src/files/lang/ntsc-final/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_i.c b/src/files/lang/ntsc-final/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_s.c b/src/files/lang/ntsc-final/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mpmenuE.c b/src/files/lang/ntsc-final/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenuJ.c b/src/files/lang/ntsc-final/mpmenuJ.c new file mode 100644 index 000000000..0329540db --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpmenuP.c b/src/files/lang/ntsc-final/mpmenuP.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_f.c b/src/files/lang/ntsc-final/mpmenu_str_f.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_g.c b/src/files/lang/ntsc-final/mpmenu_str_g.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_i.c b/src/files/lang/ntsc-final/mpmenu_str_i.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_s.c b/src/files/lang/ntsc-final/mpmenu_str_s.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpweaponsE.c b/src/files/lang/ntsc-final/mpweaponsE.c new file mode 100644 index 000000000..df325961a --- /dev/null +++ b/src/files/lang/ntsc-final/mpweaponsE.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak\n", + /* 65*/ "is damaged or\n", + /* 66*/ "inserted incorrectly.\n", + /* 67*/ "Attempt Repair\n", + /* 68*/ "Retry\n", + /* 69*/ "Continue without using\nthe Controller Pak\n", + /* 70*/ "Full Controller Pak\n", + /* 71*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 72*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker/Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "SuperDragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*184*/ "Player Handicaps\n", + /*185*/ "L/R BUTTONS: ", + /*186*/ "UP C BUTTON: ", + /*187*/ "LEFT/RIGHT C BUTTONS: ", + /*188*/ "DOWN C BUTTON: ", + /*189*/ "A BUTTON: ", + /*190*/ "B BUTTON: ", + /*191*/ "CONTROL STICK: ", + /*192*/ "Z BUTTON: ", + /*193*/ "+ CONTROL PAD: ", + /*194*/ "AIM", + /*195*/ "AIM TOGGLE", + /*196*/ "LOOK UP", + /*197*/ "LOOK DOWN", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK UP", + /*200*/ "FORWARDS", + /*201*/ "BACKWARDS", + /*202*/ "STRAFE", + /*203*/ "WEAPON", + /*204*/ "ACTION/RELOAD", + /*205*/ "FIRE", + /*206*/ "WALK/TURN", + /*207*/ "LOOK", + /*208*/ "WALK/STRAFE", + /*209*/ "LOOK/STRAFE", + /*210*/ "AS C BUTTONS", + /*211*/ "Controller 1:", + /*212*/ "Controller 2:", + /*213*/ "Control Style %s %s\n", + /*214*/ "(One-Handed)", + /*215*/ "(Two-Handed)", + /*216*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*217*/ "Turn off all Cheats\n", + /*218*/ "Language Filter\n", + /*219*/ "USERNAME:\n", + /*220*/ "PASSWORD:\n", + /*221*/ "Perfect Dark\n", + /*222*/ "Choose Settings:\n", + /*223*/ "Enemy Reaction Speed:\n", + /*224*/ "Enemy Health:\n", + /*225*/ "Enemy Damage:\n", + /*226*/ "Enemy Accuracy:\n", + /*227*/ "OK\n", + /*228*/ "Cancel\n", + /*229*/ "Controller Pak Not Found\n", + /*230*/ "Name:\n", + /*231*/ "Location:\n", + /*232*/ "Duplicate File Name\n", + /*233*/ "already contains\n", + /*234*/ "a file named\n", + /*235*/ "Rename File\n", + /*236*/ "Change Location\n", + /*237*/ "Cancel\n", + /*238*/ "Change File Name\n", + /*239*/ "Enter new file name:\n", + /*240*/ "The file you are copying\ncannot be deleted.\n", + /*241*/ "ShockSim:%d\n", + /*242*/ "Target Time:\n", + /*243*/ "New Cheat Available!:\n", + /*244*/ "Continue\n", + /*245*/ "Replay Last Level\n", + /*246*/ "Save Player\n", + /*247*/ "Save new player\nand statistics?\n", + /*248*/ "Save Now\n", + /*249*/ "No Thanks!\n", + /*250*/ "Confirm player name:\n", + /*251*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*252*/ "Continue\n", + /*253*/ "Error\n", + /*254*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*255*/ "Cancel\n", + /*256*/ "Error\n", + /*257*/ "The saved data has\n", + /*258*/ "been erased due to\n", + /*259*/ "corruption or damage.\n", + /*260*/ "Cancel\n", + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweaponsJ.c b/src/files/lang/ntsc-final/mpweaponsJ.c new file mode 100644 index 000000000..40b123186 --- /dev/null +++ b/src/files/lang/ntsc-final/mpweaponsJ.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Capture the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Flag\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweaponsP.c b/src/files/lang/ntsc-final/mpweaponsP.c new file mode 100644 index 000000000..8aea3231c --- /dev/null +++ b/src/files/lang/ntsc-final/mpweaponsP.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak\n", + /* 65*/ "is damaged or\n", + /* 66*/ "inserted incorrectly.\n", + /* 67*/ "Attempt Repair\n", + /* 68*/ "Retry\n", + /* 69*/ "Continue without using\nthe Controller Pak\n", + /* 70*/ "Full Controller Pak\n", + /* 71*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 72*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker/Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "SuperDragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*184*/ "Player Handicaps\n", + /*185*/ "L/R BUTTONS: ", + /*186*/ "UP C BUTTON: ", + /*187*/ "LEFT/RIGHT C BUTTONS: ", + /*188*/ "DOWN C BUTTON: ", + /*189*/ "A BUTTON: ", + /*190*/ "B BUTTON: ", + /*191*/ "CONTROL STICK: ", + /*192*/ "Z BUTTON: ", + /*193*/ "+ CONTROL PAD: ", + /*194*/ "AIM", + /*195*/ "AIM TOGGLE", + /*196*/ "LOOK UP", + /*197*/ "LOOK DOWN", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK UP", + /*200*/ "FORWARDS", + /*201*/ "BACKWARDS", + /*202*/ "STRAFE", + /*203*/ "WEAPON", + /*204*/ "ACTION/RELOAD", + /*205*/ "FIRE", + /*206*/ "WALK/TURN", + /*207*/ "LOOK", + /*208*/ "WALK/STRAFE", + /*209*/ "LOOK/STRAFE", + /*210*/ "AS C BUTTONS", + /*211*/ "Left Hand:", + /*212*/ "Right Hand:", + /*213*/ "Control Style %s %s\n", + /*214*/ "(One-Handed)", + /*215*/ "(Two-Handed)", + /*216*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*217*/ "Turn off all Cheats\n", + /*218*/ "Language Filter\n", + /*219*/ "USERNAME:\n", + /*220*/ "PASSWORD:\n", + /*221*/ "Perfect Dark\n", + /*222*/ "Choose Settings:\n", + /*223*/ "Enemy Reaction Speed:\n", + /*224*/ "Enemy Health:\n", + /*225*/ "Enemy Damage:\n", + /*226*/ "Enemy Accuracy:\n", + /*227*/ "OK\n", + /*228*/ "Cancel\n", + /*229*/ "Controller Pak Not Found\n", + /*230*/ "Name:\n", + /*231*/ "Location:\n", + /*232*/ "Duplicate File Name\n", + /*233*/ "already contains\n", + /*234*/ "a file named\n", + /*235*/ "Rename File\n", + /*236*/ "Change Location\n", + /*237*/ "Cancel\n", + /*238*/ "Change File Name\n", + /*239*/ "Enter new file name:\n", + /*240*/ "The file you are copying\ncannot be deleted.\n", + /*241*/ "ShockSim:%d\n", + /*242*/ "Target Time:\n", + /*243*/ "New Cheat Available!:\n", + /*244*/ "Continue\n", + /*245*/ "Replay Last Level\n", + /*246*/ "Save Player\n", + /*247*/ "Save new player\nand statistics?\n", + /*248*/ "Save Now\n", + /*249*/ "No Thanks!\n", + /*250*/ "Confirm player name:\n", + /*251*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*252*/ "Continue\n", + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_f.c b/src/files/lang/ntsc-final/mpweapons_str_f.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_f.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_g.c b/src/files/lang/ntsc-final/mpweapons_str_g.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_g.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_i.c b/src/files/lang/ntsc-final/mpweapons_str_i.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_i.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_s.c b/src/files/lang/ntsc-final/mpweapons_str_s.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_s.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/oatE.c b/src/files/lang/ntsc-final/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oatJ.c b/src/files/lang/ntsc-final/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oatP.c b/src/files/lang/ntsc-final/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_f.c b/src/files/lang/ntsc-final/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_g.c b/src/files/lang/ntsc-final/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_i.c b/src/files/lang/ntsc-final/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_s.c b/src/files/lang/ntsc-final/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oldE.c b/src/files/lang/ntsc-final/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oldJ.c b/src/files/lang/ntsc-final/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oldP.c b/src/files/lang/ntsc-final/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_f.c b/src/files/lang/ntsc-final/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_g.c b/src/files/lang/ntsc-final/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_i.c b/src/files/lang/ntsc-final/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_s.c b/src/files/lang/ntsc-final/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/optionsE.c b/src/files/lang/ntsc-final/optionsE.c new file mode 100644 index 000000000..34c785342 --- /dev/null +++ b/src/files/lang/ntsc-final/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/optionsJ.c b/src/files/lang/ntsc-final/optionsJ.c new file mode 100644 index 000000000..9766367e0 --- /dev/null +++ b/src/files/lang/ntsc-final/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "Choose Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/optionsP.c b/src/files/lang/ntsc-final/optionsP.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_f.c b/src/files/lang/ntsc-final/options_str_f.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_g.c b/src/files/lang/ntsc-final/options_str_g.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_i.c b/src/files/lang/ntsc-final/options_str_i.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_s.c b/src/files/lang/ntsc-final/options_str_s.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pamE.c b/src/files/lang/ntsc-final/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/ntsc-final/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pamJ.c b/src/files/lang/ntsc-final/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/ntsc-final/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pamP.c b/src/files/lang/ntsc-final/pamP.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_f.c b/src/files/lang/ntsc-final/pam_str_f.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_g.c b/src/files/lang/ntsc-final/pam_str_g.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_i.c b/src/files/lang/ntsc-final/pam_str_i.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_s.c b/src/files/lang/ntsc-final/pam_str_s.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/peteE.c b/src/files/lang/ntsc-final/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/ntsc-final/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/peteJ.c b/src/files/lang/ntsc-final/peteJ.c new file mode 100644 index 000000000..088c12b76 --- /dev/null +++ b/src/files/lang/ntsc-final/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/peteP.c b/src/files/lang/ntsc-final/peteP.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_f.c b/src/files/lang/ntsc-final/pete_str_f.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_g.c b/src/files/lang/ntsc-final/pete_str_g.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_i.c b/src/files/lang/ntsc-final/pete_str_i.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_s.c b/src/files/lang/ntsc-final/pete_str_s.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/propobjE.c b/src/files/lang/ntsc-final/propobjE.c new file mode 100644 index 000000000..9977a50df --- /dev/null +++ b/src/files/lang/ntsc-final/propobjE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "N-Bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "Your ", +}; diff --git a/src/files/lang/ntsc-final/propobjJ.c b/src/files/lang/ntsc-final/propobjJ.c new file mode 100644 index 000000000..e2c9a5da7 --- /dev/null +++ b/src/files/lang/ntsc-final/propobjJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "hand grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "drugs", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "speed pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobjP.c b/src/files/lang/ntsc-final/propobjP.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobjP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_f.c b/src/files/lang/ntsc-final/propobj_str_f.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_g.c b/src/files/lang/ntsc-final/propobj_str_g.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_i.c b/src/files/lang/ntsc-final/propobj_str_i.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_s.c b/src/files/lang/ntsc-final/propobj_str_s.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/refE.c b/src/files/lang/ntsc-final/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/refJ.c b/src/files/lang/ntsc-final/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/refP.c b/src/files/lang/ntsc-final/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_f.c b/src/files/lang/ntsc-final/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_g.c b/src/files/lang/ntsc-final/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_i.c b/src/files/lang/ntsc-final/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_s.c b/src/files/lang/ntsc-final/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ritE.c b/src/files/lang/ntsc-final/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/ntsc-final/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ritJ.c b/src/files/lang/ntsc-final/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/ntsc-final/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ritP.c b/src/files/lang/ntsc-final/ritP.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_f.c b/src/files/lang/ntsc-final/rit_str_f.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_g.c b/src/files/lang/ntsc-final/rit_str_g.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_i.c b/src/files/lang/ntsc-final/rit_str_i.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_s.c b/src/files/lang/ntsc-final/rit_str_s.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/runE.c b/src/files/lang/ntsc-final/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/runJ.c b/src/files/lang/ntsc-final/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/runP.c b/src/files/lang/ntsc-final/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_f.c b/src/files/lang/ntsc-final/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_g.c b/src/files/lang/ntsc-final/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_i.c b/src/files/lang/ntsc-final/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_s.c b/src/files/lang/ntsc-final/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevE.c b/src/files/lang/ntsc-final/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/ntsc-final/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevJ.c b/src/files/lang/ntsc-final/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/ntsc-final/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevP.c b/src/files/lang/ntsc-final/sevP.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_f.c b/src/files/lang/ntsc-final/sev_str_f.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_g.c b/src/files/lang/ntsc-final/sev_str_g.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_i.c b/src/files/lang/ntsc-final/sev_str_i.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_s.c b/src/files/lang/ntsc-final/sev_str_s.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevbE.c b/src/files/lang/ntsc-final/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevbJ.c b/src/files/lang/ntsc-final/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevbP.c b/src/files/lang/ntsc-final/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_f.c b/src/files/lang/ntsc-final/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_g.c b/src/files/lang/ntsc-final/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_i.c b/src/files/lang/ntsc-final/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_s.c b/src/files/lang/ntsc-final/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevxE.c b/src/files/lang/ntsc-final/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxJ.c b/src/files/lang/ntsc-final/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxP.c b/src/files/lang/ntsc-final/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_f.c b/src/files/lang/ntsc-final/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_g.c b/src/files/lang/ntsc-final/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_i.c b/src/files/lang/ntsc-final/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_s.c b/src/files/lang/ntsc-final/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxbE.c b/src/files/lang/ntsc-final/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxbJ.c b/src/files/lang/ntsc-final/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxbP.c b/src/files/lang/ntsc-final/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_f.c b/src/files/lang/ntsc-final/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_g.c b/src/files/lang/ntsc-final/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_i.c b/src/files/lang/ntsc-final/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_s.c b/src/files/lang/ntsc-final/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/shoE.c b/src/files/lang/ntsc-final/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/ntsc-final/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/shoJ.c b/src/files/lang/ntsc-final/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/ntsc-final/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/shoP.c b/src/files/lang/ntsc-final/shoP.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_f.c b/src/files/lang/ntsc-final/sho_str_f.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_g.c b/src/files/lang/ntsc-final/sho_str_g.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_i.c b/src/files/lang/ntsc-final/sho_str_i.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_s.c b/src/files/lang/ntsc-final/sho_str_s.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/siloE.c b/src/files/lang/ntsc-final/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/siloJ.c b/src/files/lang/ntsc-final/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/siloP.c b/src/files/lang/ntsc-final/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_f.c b/src/files/lang/ntsc-final/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_g.c b/src/files/lang/ntsc-final/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_i.c b/src/files/lang/ntsc-final/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_s.c b/src/files/lang/ntsc-final/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/statE.c b/src/files/lang/ntsc-final/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/statJ.c b/src/files/lang/ntsc-final/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/ntsc-final/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/statP.c b/src/files/lang/ntsc-final/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_f.c b/src/files/lang/ntsc-final/stat_str_f.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_g.c b/src/files/lang/ntsc-final/stat_str_g.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_i.c b/src/files/lang/ntsc-final/stat_str_i.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_s.c b/src/files/lang/ntsc-final/stat_str_s.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/titleE.c b/src/files/lang/ntsc-final/titleE.c new file mode 100644 index 000000000..561257e86 --- /dev/null +++ b/src/files/lang/ntsc-final/titleE.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/titleJ.c b/src/files/lang/ntsc-final/titleJ.c new file mode 100644 index 000000000..f1ac89ef0 --- /dev/null +++ b/src/files/lang/ntsc-final/titleJ.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j. northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons animator\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "(is watching)\n", + /* 17*/ "b jones\n", + /* 18*/ "(unknown purpose)\n", + /* 19*/ "steve malpass\n", + /* 20*/ "edge wrangler\n", + /* 21*/ "brian marshall\n", + /* 22*/ "code janitor\n", + /* 23*/ "russell irwin\n", + /* 24*/ "pak man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "pad jockey\n", + /* 27*/ "ross bury\n", + /* 28*/ "pixel pusher\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonsz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "background artist\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "development tools\n", + /* 59*/ "richard gale\n", + /* 60*/ "mark green\n", + /* 61*/ "mark wilson\n", + /* 62*/ "hardware support\n", + /* 63*/ "pete cox\n", + /* 64*/ "paul mikell\n", + /* 65*/ "doug crouch\n", + /* 66*/ "thanks\n", + /* 67*/ "neil gallagher\n", + /* 68*/ "jonathon o'conner\n", + /* 69*/ "gareth glover\n", + /* 70*/ "motion capture\n", + /* 71*/ "alan tipper\n", + /* 72*/ "des easen\n", + /* 73*/ "jim ballard\n", + /* 74*/ "michelle tipper\n", + /* 75*/ "testing (rare)\n", + /* 76*/ "huw ward\n", + /* 77*/ "david wong\n", + /* 78*/ "adam munton\n", + /* 79*/ "luke munton\n", + /* 80*/ "garry phelps\n", + /* 81*/ "jon silke\n", + /* 82*/ "matthew carter\n", + /* 83*/ "gavin price\n", + /* 84*/ "gareth stevenson\n", + /* 85*/ "joe stamper\n", + /* 86*/ "stephen stamper\n", + /* 87*/ "testing (noa)\n", + /* 88*/ "nintendo guy\n", + /* 89*/ "nintendo gal\n", + /* 90*/ "rare miami\n", + /* 91*/ "eileen hochberg\n", + /* 92*/ "joel hochberg\n", + /* 93*/ "rare twycross\n", + /* 94*/ "chris stamper\n", + /* 95*/ "tim stamper\n", + /* 96*/ "nintendo\n", + /* 97*/ "ken lobb\n", + /* 98*/ "howard lincoln\n", + /* 99*/ "mr arrakawa\n", + /*100*/ "mr yamauchi\n", + /*101*/ "copyright rare 2000\n", + /*102*/ "perfect dark, the pd device and\n", + /*103*/ "perfecthead are trademarks\n", + /*104*/ "rare\n", + /*105*/ "designs on the future\n", + /*106*/ "t&a support\n", + /*107*/ "emma scully\n", + /*108*/ "claire phelan\n", + /*109*/ "joanna dark is forever\n", + /*110*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*111*/ NULL, + /*112*/ NULL, + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/titleP.c b/src/files/lang/ntsc-final/titleP.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/titleP.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_f.c b/src/files/lang/ntsc-final/title_str_f.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_f.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_g.c b/src/files/lang/ntsc-final/title_str_g.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_g.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_i.c b/src/files/lang/ntsc-final/title_str_i.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_i.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_s.c b/src/files/lang/ntsc-final/title_str_s.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_s.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/traE.c b/src/files/lang/ntsc-final/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/ntsc-final/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/traJ.c b/src/files/lang/ntsc-final/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/ntsc-final/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/traP.c b/src/files/lang/ntsc-final/traP.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_f.c b/src/files/lang/ntsc-final/tra_str_f.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_g.c b/src/files/lang/ntsc-final/tra_str_g.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_i.c b/src/files/lang/ntsc-final/tra_str_i.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_s.c b/src/files/lang/ntsc-final/tra_str_s.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/uffE.c b/src/files/lang/ntsc-final/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uffJ.c b/src/files/lang/ntsc-final/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uffP.c b/src/files/lang/ntsc-final/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_f.c b/src/files/lang/ntsc-final/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_g.c b/src/files/lang/ntsc-final/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_i.c b/src/files/lang/ntsc-final/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_s.c b/src/files/lang/ntsc-final/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/waxE.c b/src/files/lang/ntsc-final/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/ntsc-final/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/waxJ.c b/src/files/lang/ntsc-final/waxJ.c new file mode 100644 index 000000000..ccf1f85d0 --- /dev/null +++ b/src/files/lang/ntsc-final/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/waxP.c b/src/files/lang/ntsc-final/waxP.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_f.c b/src/files/lang/ntsc-final/wax_str_f.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_g.c b/src/files/lang/ntsc-final/wax_str_g.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_i.c b/src/files/lang/ntsc-final/wax_str_i.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_s.c b/src/files/lang/ntsc-final/wax_str_s.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ameE.c b/src/files/lang/pal-beta/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-beta/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ameJ.c b/src/files/lang/pal-beta/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/pal-beta/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ameP.c b/src/files/lang/pal-beta/ameP.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-beta/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_f.c b/src/files/lang/pal-beta/ame_str_f.c new file mode 100644 index 000000000..d903e7cd5 --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situ sur l'un des toits de l'immeuble, loin des interf駻ences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les cam駻as de surveillance. La mine doit 黎re fix sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-cl de De Vries\n\nCassandra De Vries porte la cl d'acc鑚 aux zones interdites de l'immeuble sur son collier. Il est connect ses pulsations et cessera de fonctionner si elle vient mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Acc馘er aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est l'ordre du jour d'une r騏nion, dans l'un des bureaux. Le dirigeant charg du projet du Dr. Caroll sera pr駸ent. Suivez-le jusqu' son bureau et acc馘ez ses fichiers, puis t駘馗hargez-les gr稍e votre r馗epteur.\n\n|Objectif 4: - Brouiller les communications ext駻ieures\n\nAchevez le brouillage des communications en pla軋nt une autre mine CME sur le mat駻iel de la salle de surveillance la base de l'immeuble. Ils ne pourront ainsi appeler des renforts ext駻ieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, et elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situ sur l'un des toits de l'immeuble, loin des interf駻ences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les cam駻as de surveillance. La mine doit 黎re appliqu馥 sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-cl de De Vries\n\nCassandra De Vries porte sa cl d'acc鑚 aux zones interdites de l'immeuble sur son collier. Il est connect ses pulsations et cessera de fonctionner si elle vient mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications ext駻ieures\n\nAchevez le brouillage des communications en pla軋nt une autre mine CME sur le mat駻iel de la salle de surveillance la base de l'immeuble. Ils ne pourront ainsi appeler des renforts ext駻ieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne:\nQG central Chicago IL USA.", + /* 10*/ "Heure: 02:30 15 AOUT 2023\n", + /* 11*/ "Obtenir collier de De Vries.\n", + /* 12*/ "Cassandra De Vries\n", + /* 13*/ "Collier\n", + /* 14*/ "Collier de De Vries\n", + /* 15*/ "Collier de De Vries obtenu.\n", + /* 16*/ "Neutraliser relais int駻ieur\n", + /* 17*/ "Obtenir collier-cl饅n", + /* 18*/ "T駘馗harger fichiers\n", + /* 19*/ "Neutraliser relais ext駻ieur\n", + /* 20*/ "Acc馘er au laboratoire\n", + /* 21*/ "Qui 黎es-vous? Que faites-vous l?\n", + /* 22*/ "Attention! Elle est arm馥!\n", + /* 23*/ "Vous n'oserez pas... Jeune sotte!\n", + /* 24*/ "Savez-vous qui je suis?\n", + /* 25*/ "J'appelle la s馗urit.\n", + /* 26*/ "PITIE!!!! Ne me tuez pas!\n", + /* 27*/ "Un conseil: partez, MAINTENANT!\n", + /* 28*/ "Mine CME mal plac馥.\n", + /* 29*/ "Mine CME plac馥 correctement.\n", + /* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n", + /* 31*/ " MISSION ACCOMPLIE \n", + /* 32*/ "Objectifs inatteignables.\n", + /* 33*/ "Il est temps d'effacer les fichiers.\n", + /* 34*/ "Ordinateur dirigeant effac.\n", + /* 35*/ "Je ferai ce que vous voulez!\n", + /* 36*/ "A L'AIDE - Intrus!\n", + /* 37*/ "Vous parlez trop.\n", + /* 38*/ "AU SECOURS! A MOI!\n", + /* 39*/ "Je ferai ce que vous voulez...\n", + /* 40*/ "Je me connecte...\n", + /* 41*/ "OK. Connexion termin馥...\n", + /* 42*/ "Adieu, Dr. Caroll.\n", + /* 43*/ "La fin est proche, sale tratre!\n", + /* 44*/ "T駘馗hargement en cours.\n", + /* 45*/ "T駘馗hargement complet.\n", + /* 46*/ "ACCES REFUSE - mot de passe requis.\n", + /* 47*/ "Porte d騅errouill馥.\n", + /* 48*/ "HEIN?!\n", + /* 49*/ "Erreur t駘馗harg. - R馗epteur absent.\n", + /* 50*/ "LUMIERES ON\n", + /* 51*/ "LUMIERES OFF\n", + /* 52*/ "Effacez la conversation du Dr. Caroll.\n", + /* 53*/ "Ne...ne tirez pas!\n", + /* 54*/ "Objet crucial d騁ruit.\n", + /* 55*/ "Pertes civiles inacceptables.\n", + /* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 57*/ "Personnel crucial tu.\n", + /* 58*/ "Obtenir mines CME.\n", + /* 59*/ "Dr. Caroll: \n", + /* 60*/ "Mine CME\n", + /* 61*/ "Une Mine CME\n", + /* 62*/ "Mine CME obtenue.\n", + /* 63*/ "Obtenir r馗epteur.\n", + /* 64*/ "\n", + /* 65*/ "R馗epteur\n", + /* 66*/ "Un r馗epteur\n", + /* 67*/ "R馗epteur obtenu.\n", + /* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalit.\n", + /* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en m麥e temps.\n", + /* 70*/ "Je m'y mets tout de suite. Au revoir.\n", + /* 71*/ "Au pied!\n", + /* 72*/ "J'ai un probl鑪e de mot de passe, et vous\nallez le r駸oudre.\n", + /* 73*/ "Ne tirez pas! Ne tirez pas!\n", + /* 74*/ "Transfert interrompu - connexion perdue.\n", + /* 75*/ "Erreur transfert - t駘馗hargement incomplet.\n", + /* 76*/ "Syst鑪e de s馗urit temporairement annul.\n", + /* 77*/ "Communications ext駻ieures coup馥s.\n", + /* 78*/ "Ascenseur du laboratoire localis.\n", + /* 79*/ "S馗urit!!! A l'aide!\n", + /* 80*/ "Mine CME requise pour brouiller s馗urit.\n", + /* 81*/ "Mine CME requise pour brouiller coms.\n", + /* 82*/ "Leurre\n", + /* 83*/ "Vous osez me d駻anger?\n", + /* 84*/ "Vous allez le regretter, jeune fille!\n", + /* 85*/ "Un conseil: partez...MAINTENANT!\n", + /* 86*/ "Ne me tuez pas!\n", + /* 87*/ "Piti!\n", + /* 88*/ "Obtenir CamSpy.\n", + /* 89*/ "La CamSpy du\n", + /* 90*/ "Dr. Caroll\n", + /* 91*/ "Une CamSpy\n", + /* 92*/ "CamSpy obtenue.\n", + /* 93*/ "Signal positif -\nle relais de com int駻ieur est proche.\n", + /* 94*/ "Le bureau de Cassandra est \ncet 騁age.\n", + /* 95*/ "L'autre relais doit 黎re dans la\nsalle de surveillance.\n", + /* 96*/ "L'ascenseur souterrain doit 黎re dans\nle coin.\n", + /* 97*/ "Syst鑪e de s馗urit op駻ationnel.\n", + /* 98*/ "Bravo...軋 ne marche plus!\n", + /* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n", + /*100*/ "Pourquoi agir si vite?\n", + /*101*/ "Si le Dr. Caroll n'est pas sauv ce soir, \nses sup駻ieurs conditionneront son \nesprit et nous ne pourrons d馗ouvrir \nles plans de la dataDyne. \n", + /*102*/ "Peut-on les 駘iminer?\n", + /*103*/ "Pas de b黎ises: une cl de s馗urit ne \nfonctionne que si le d騁enteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes arm駸...\n", + /*104*/ "O se trouve la cible?\n", + /*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninf駻ieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n", + /*106*/ "Comment le reconnatre?\n", + /*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n", + /*108*/ "OK. J'y suis...\n", + /*109*/ "Je...Je me connecte.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_g.c b/src/files/lang/pal-beta/ame_str_g.c new file mode 100644 index 000000000..d0a43b2dd --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Verkehrs-Interferenzen geschtzt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die ワberwachungskameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu knnen. Sie mssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vriesエ Halskette in Ihren Besitz!\n\nCassandra De Vries tr臠t den Codeschlssel fr Sperrzonen innerhalb des Geb舫des an ihrer Halskette. Der Schlssel steht in Verbindung mit ihrem persnlichen Gesundheitsstatus-ワberwachungsger舩. Sobald kein Lebenszeichen mehr bertragen wird, verliert der Schlssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafr, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird ber Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der fr Dr. Carrols Projekt verantwortlich zeichnet anwesend ist, findet in einem der Brotrakte statt. Folgen Sie ihm in sein Bro, greifen Sie auf die Projektdaten zu und bertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Ger舩es.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Geb舫des anbringen. Dadurch werden s舂tliche automatisch generierten SOS-Rufe nach drau゚en blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangen-gehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Verkehrs-Interferenzen geschtzt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die ワberwachungskameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu knnen. Sie mssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vriesエ Halskette in Ihren Besitz!\n\nCassandra De Vries tr臠t den Codeschlssel fr Sperrzonen innerhalb des Geb舫des an ihrer Halskette. Der Schlssel steht in Verbindung mit ihrem persnlichen Gesundheitsstatus-ワberwachungsger舩. Sobald kein Lebenszeichen mehr bertragen wird, verliert der Schlssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafr, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Geb舫des anbringen. Dadurch werden s舂tliche automatisch generierten SOS-Rufe nach drau゚en blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangen-gehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangen-gehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.", + /* 10*/ "0230 Uhr 15 AUG 2023\n", + /* 11*/ "Bringen Sie die De Vriesエ Halskette in Ihren Besitz!\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Halskette\n", + /* 14*/ "De Vriesエ Halskette\n", + /* 15*/ "De Vriesエ Halskette aufgenommen.\n", + /* 16*/ "Blockieren Sie das Sicherheitssystem!\n", + /* 17*/ "Finden Sie den Schlssel!\n", + /* 18*/ "Kopieren Sie die Projektdaten!\n", + /* 19*/ "Blockieren Sie die externe Sicherheit!\n", + /* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n", + /* 22*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 23*/ "Du wirst nicht auf mich schie゚en, dummes Kind!\n", + /* 24*/ "Du wei゚t wohl nicht, wer ich bin.\n", + /* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n", + /* 26*/ "BITTE!!!! Tun Sie mir nichts!\n", + /* 27*/ "W舐e ich du, wrde ich verschwinden... und zwar JETZT!\n", + /* 28*/ "ECM Mine wurde nicht korrekt platziert.\n", + /* 29*/ "ECM Mine wurde korrekt platziert.\n", + /* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollst舅dig.\n", + /* 31*/ " MISSION ERFOLGREICH \n", + /* 32*/ "Erreichung aller Ziele UNMヨGLICH.\n", + /* 33*/ "Es ist an der Zeit, diese Daten zu lschen.\n", + /* 34*/ "Festplatte gelscht.\n", + /* 35*/ "Ich tue alles, was Sie verlangen!\n", + /* 36*/ "HILFE - Ein Eindringling!\n", + /* 37*/ "Du sprichst zuviel.\n", + /* 38*/ "HILFE, HILFE!\n", + /* 39*/ "Ich tue alles, was Sie verlangen...\n", + /* 40*/ "Ich logge mich jetzt ein...\n", + /* 41*/ "Okay, ich bin drin...\n", + /* 42*/ "Auf Wiedersehen, Dr. Caroll.\n", + /* 43*/ "Du hast deinen letzten Virus geschrieben, Verr舩er!\n", + /* 44*/ "Kopiervorgang gestartet.\n", + /* 45*/ "Kopiervorgang abgeschlossen.\n", + /* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich.\n", + /* 47*/ "Trverriegelung aufgehoben.\n", + /* 48*/ "HトH!\n", + /* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n", + /* 50*/ "BELEUCHTUNG AKTIVIERT\n", + /* 51*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 52*/ "Lschen Sie die Konversation mit Dr. Caroll...\n", + /* 53*/ "Nicht schie゚en, nicht schie゚en!\n", + /* 54*/ "Wichtiges Objekt zerstrt.\n", + /* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n", + /* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmglich.\n", + /* 57*/ "Wichtige Person neutralisiert.\n", + /* 58*/ "Erlangen Sie ECM Minen.\n", + /* 59*/ "Dr. Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "Eine ECM Mine\n", + /* 62*/ "ECM Mine aufgenommen.\n", + /* 63*/ "Erlangen Sie das Data Uplink-Ger舩.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "Ein Data Uplink\n", + /* 67*/ "Data Uplink aufgenommen.\n", + /* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n", + /* 69*/ "Nein, ich kann den Vorgang von meinem Bro\naus initiieren und die entsprechenden Files lschen.\nJa, das erfolgt gleichzeitig.\n", + /* 70*/ "Ich fange sofort an. Wiederhren.\n", + /* 71*/ "Beweg dich!\n", + /* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n", + /* 73*/ "Nicht schie゚en, nicht schie゚en!\n", + /* 74*/ "Datalink defekt - Verbindung terminiert.\n", + /* 75*/ "Datalink Error - Kopiervorgang unvollst舅dig.\n", + /* 76*/ "Internes Sicherheitssystem tempor舐 au゚er Kraft gesetzt.\n", + /* 77*/ "Externe Kommunikationssysteme au゚er Kraft gesetzt.\n", + /* 78*/ "Aufzug zum Labor geortet.\n", + /* 79*/ "Security... Hilfe!\n", + /* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM Mine bentigt.\n", + /* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM Mine bentigt.\n", + /* 82*/ "Dummy\n", + /* 83*/ "Wie kannst du es wagen, mich zu stren?\n", + /* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n", + /* 85*/ "W舐e ich du, wrde ich verschwinden,... und zwar JETZT!\n", + /* 86*/ "Bitte tun Sie mir nichts!\n", + /* 87*/ "Nicht schie゚en!\n", + /* 88*/ "Erlangen Sie den CamSpy.\n", + /* 89*/ "Dr. Carolls\n", + /* 90*/ "CamSpy\n", + /* 91*/ "Ein CamSpy\n", + /* 92*/ "CamSpy aufgenommen.\n", + /* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock fr die internen Sicherheitssysteme muss in der N臧e sein.\n", + /* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Bro.\n", + /* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n", + /* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n", + /* 97*/ "Das Sicherheitssystem ist wieder online.\n", + /* 98*/ "Du Vandale, du hast es zerstrt!\n", + /* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n", + /*100*/ "Warum die Hektik?\n", + /*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So wrden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n", + /*102*/ "Sind dort alle Personen entbehrlich?\n", + /*103*/ "Machen Sie keine Witze! Sie mssen vorsichtig sein, Joanna. \nCodeschlssel ntzen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlssel seinen Wert. Bewaffnete Wachen sind natrlich \nein anderes Thema...\n", + /*104*/ "Wie lautet der Zielbereich?\n", + /*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n", + /*106*/ "Woran erkenne ich ihn?\n", + /*107*/ "Wir verfgen ber kein Bildmaterial, und wir knnen \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glck, Perfect Dark.\n", + /*108*/ "Ich bin jetzt drin...\n", + /*109*/ "Ich...Ich logge mich jetzt ein.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_i.c b/src/files/lang/pal-beta/ame_str_i.c new file mode 100644 index 000000000..c1d6cda62 --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington - \n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perch abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana connessa ad un sensore del suo stato di salute e si disattiver in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo dispositivo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo mander in tilt la richiesta automatica d'aiuto esterno, mettendo cos totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington - \n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perch abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana connessa ad un sensore del suo stato di salute e si disattiver in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo mander in tilt la richiesta automatica d'aiuto esterno, mettendo cos totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington - \n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.", + /* 10*/ "Ore 0230 15 AGO 2023\n", + /* 11*/ "Prendi collana di De Vries.\n", + /* 12*/ "La collana di\n", + /* 13*/ "Cassandra De Vries\n", + /* 14*/ "Collana di De Vries\n", + /* 15*/ "Prendi collana di De Vries.\n", + /* 16*/ "Disattiva sistema di sicurezza interno\n", + /* 17*/ "Prendi collana-chiave\n", + /* 18*/ "Scarica file del progetto\n", + /* 19*/ "Disattiva sistema di sicurezza esterno\n", + /* 20*/ "Cerca di entrare nel laboratorio\n", + /* 21*/ "Chi sei e che ci fai qui?\n", + /* 22*/ "Attenzione! ネ armata.\n", + /* 23*/ "Non lo farei se fossi in te!\n", + /* 24*/ "Tu non sai chi sono io!\n", + /* 25*/ "Vediamo come fai con la sicurezza.\n", + /* 26*/ "TI PREGO!!! Non sparare!\n", + /* 27*/ "Se fossi in te girerei i tacchi!\n", + /* 28*/ "Mina in posizione errata\n", + /* 29*/ "Mina piazzata correttamente\n", + /* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 31*/ " MISSIONE COMPIUTA \n", + /* 32*/ "IMPOSSIBILE completare obiettivi!\n", + /* 33*/ "ネ ora di cancellare i file.\n", + /* 34*/ "Cancellato PC direttore.\n", + /* 35*/ "Far quel che vuoi!\n", + /* 36*/ "ALLARME - Intrusione!\n", + /* 37*/ "Tu parli troppo!\n", + /* 38*/ "AIUTO! AIUTO!\n", + /* 39*/ "Far quel che vuoi...\n", + /* 40*/ "Connessione in corso...\n", + /* 41*/ "Bene, ci sono...\n", + /* 42*/ "Arrivederci, Dr. Caroll.\n", + /* 43*/ "Comincia a pregare, verme!\n", + /* 44*/ "Scaricamento in corso\n", + /* 45*/ "Scaricamento completato\n", + /* 46*/ "ACCESSO NEGATO: inserire password\n", + /* 47*/ "Aperta la porta!\n", + /* 48*/ "TOH!\n", + /* 49*/ "Impossibile scaricare: serve Connettore Dati\n", + /* 50*/ "LUCI ACCESE\n", + /* 51*/ "LUCI SPENTE\n", + /* 52*/ "Cancellare conversazione con Dr. Caroll\n", + /* 53*/ "Non sparare! Non sparare!\n", + /* 54*/ "Distrutto strumento essenziale alla missione\n", + /* 55*/ "Vittime civili inaccettabili\n", + /* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 57*/ "Ucciso personale essenziale alla missione\n", + /* 58*/ "Procurati mina ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Mina ECM\n", + /* 62*/ "Presa mina ECM\n", + /* 63*/ "Procurati Connettore Dati.\n", + /* 64*/ "\n", + /* 65*/ "C. Dati\n", + /* 66*/ "Un Connettore Dati\n", + /* 67*/ "Preso Connettore Dati.\n", + /* 68*/ "S, s! Sono d'accordo. Possibili vittime\n sono giustificate.\n", + /* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n", + /* 70*/ "Inizier subito. A dopo.\n", + /* 71*/ "Muoviti!\n", + /* 72*/ "Ho problemi con la password, e tu sei \nl'unico che pu aiutarmi.\n", + /* 73*/ "Non sparare! Non sparare!\n", + /* 74*/ "Errore datalink: connessione terminata\n", + /* 75*/ "Errore datalink: scaricamento incompleto\n", + /* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n", + /* 77*/ "Sistema di sicurezza esterno fuori uso.\n", + /* 78*/ "Ascensore laboratorio localizzato.\n", + /* 79*/ "Sicurezza... Aiuto!\n", + /* 80*/ "Serve mina ECM per disattivare sicurezza interno\n", + /* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n", + /* 82*/ "Idiota\n", + /* 83*/ "Come osi disturbarmi!\n", + /* 84*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 85*/ "Se fossi in te starei alla larga!\n", + /* 86*/ "Ti prego, risparmiami!\n", + /* 87*/ "Non sparare!\n", + /* 88*/ "Procurati TeleSpia.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "TeleSpia\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "Presa la TeleSpia.\n", + /* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n", + /* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n", + /* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n", + /* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n", + /* 97*/ "Il sistema di sicurezza funziona ora.\n", + /* 98*/ "L'hai rotto, maledizione!\n", + /* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n", + /*100*/ "Cos' tutta 'sta fretta?\n", + /*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli far il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n", + /*102*/ "Posso fare piazza pulita?\n", + /*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta \nancora vivo; altrimenti si disattiver. \nCerto, con le guardie armate \n tutta un'altra storia! \n", + /*104*/ "Dove si trova l'obiettivo?\n", + /*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n", + /*106*/ "Come faccio a riconoscerlo?\n", + /*107*/ "Non abbiamo n sue foto, n file \nufficiali. Tutto ci che abbiamo il \nsuo nome. Buona fortuna, Perfect Dark.\n", + /*108*/ "Ok, ci sono...\n", + /*109*/ "Sto... sto entrando!\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_s.c b/src/files/lang/pal-beta/ame_str_s.c new file mode 100644 index 000000000..fdc335b5e --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para notrosos. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nノste est localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tr畴ico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las c疥aras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Acta r疳ido ya que la mina durar m疽 o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las 疵eas restringidas del edificio en su collar. Est conectado con su monitor personal de corazn y dejar de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll est siendo decidido en una reunin en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll est all presente. Sguele a su oficina y accede a los ficheros de su proyecto, entonces m疣danoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexin Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagn' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloquear cualquier llamada autom疸ica para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para notrosos. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nノste est localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tr畴ico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las c疥aras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Acta r疳ido ya que la mina durar m疽 o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las 疵eas restringidas del edificio en su collar. Est conectado con su monitor personal de corazn y dejar de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexin Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagn' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloquear cualquier llamada autom疸ica para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para notrosos. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCG Divisin Central Chicago IL EE.UU.", + /* 10*/ "0230 Horas 15 AGO 2023\n", + /* 11*/ "Obt駭 el collar de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collar\n", + /* 14*/ "Collar de De Vries\n", + /* 15*/ "Collar de De Vries obtenido.\n", + /* 16*/ "Desactivar puerto interno de seguridad\n", + /* 17*/ "Obtener el collar-cdigo\n", + /* 18*/ "Descargar los ficheros del proyecto\n", + /* 19*/ "Desactivar puerto de com. externas\n", + /* 20*/ "Entrar en el laboratorio\n", + /* 21*/ "ソQui駭 eres t y qu est疽 haciendo aqu?\n", + /* 22*/ "。Cuidado! Tiene un arma.\n", + /* 23*/ "。No me disparar疽, tonta criatura!\n", + /* 24*/ "ソNo sabes qui駭 soy?\n", + /* 25*/ "Veamos cmo te las apaas con seguridad.\n", + /* 26*/ "。。。。POR FAVOR!!!! 。No me mates!\n", + /* 27*/ "Si fuera t, me marchara... 。AHORA!\n", + /* 28*/ "Mina ECM mal colocada.\n", + /* 29*/ "Mina ECM colocada correctamente.\n", + /* 30*/ "MISIモN FALLADA: objetivos incompletos.\n", + /* 31*/ " MISIモN CONSEGUIDA \n", + /* 32*/ "NO PUEDES completar todos los objetivos.\n", + /* 33*/ "Es hora de borrar esos ficheros.\n", + /* 34*/ "Ordenador del ejecutivo borrado.\n", + /* 35*/ "。Har lo que t quieras!\n", + /* 36*/ "AYUDA. 。Intruso!\n", + /* 37*/ "Hablas demasiado.\n", + /* 38*/ "。AYUDA, AYUDA!\n", + /* 39*/ "。Har lo que t quieras!\n", + /* 40*/ "Conectando ahora...\n", + /* 41*/ "Vale, estoy dentro...\n", + /* 42*/ "Adis, Dr. Caroll.\n", + /* 43*/ "。Has procesado tu ltimo error, traidor!\n", + /* 44*/ "Descarga del fichero iniciada.\n", + /* 45*/ "Descarga del fichero completada.\n", + /* 46*/ "ACCESO DENEGADO. Necesitas la contrasea.\n", + /* 47*/ "Puerta desbloqueada.\n", + /* 48*/ "。OH!\n", + /* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n", + /* 50*/ "LUCES ENCENDIDAS\n", + /* 51*/ "LUCES APAGADAS\n", + /* 52*/ "Borra la conversacin del Dr. Caroll...\n", + /* 53*/ "。No dispares, no dispares!\n", + /* 54*/ "Objeto crtico de la misin destruido.\n", + /* 55*/ "Bajas civiles inaceptables.\n", + /* 56*/ "MISIモN FALLADA:\n los objetivos no pueden ser completados.\n", + /* 57*/ "Ha muerto una persona crtica para misin.\n", + /* 58*/ "Obt駭 las Minas ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Una Mina ECM\n", + /* 62*/ "Mina ECM obtenida.\n", + /* 63*/ "Obt駭 el Conector de Datos.\n", + /* 64*/ "\n", + /* 65*/ "Conector de Datos\n", + /* 66*/ "Un Conector de Datos\n", + /* 67*/ "Conector de Datos obtenido.\n", + /* 68*/ "S, s, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n", + /* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n", + /* 70*/ "Empezar enseguida. Adis.\n", + /* 71*/ "。En marcha!\n", + /* 72*/ "Tengo un problema de contraseas, y t \neres el hombre que puede ayudarme con ello.\n", + /* 73*/ "。No dispares, no dispares!\n", + /* 74*/ "Enlace de Datos perdido - conexin terminada.\n", + /* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n", + /* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n", + /* 77*/ "Puerto de comunicaciones externas desactivado.\n", + /* 78*/ "Ascensor del laboratorio localizado.\n", + /* 79*/ "Seguridad... 。Aydenme!\n", + /* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n", + /* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n", + /* 82*/ "Tonto\n", + /* 83*/ "。Cmo te atreves a molestarme!\n", + /* 84*/ "。Te vas a arrepentir de esta intrusin, chica!\n", + /* 85*/ "Si yo fuera t, me ira... 。YA!\n", + /* 86*/ "。Por favor, no me mates!\n", + /* 87*/ "。No dispares!\n", + /* 88*/ "Obt駭 la C疥ara Espa.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "C疥ara Espa\n", + /* 91*/ "Una C疥ara Espa\n", + /* 92*/ "C疥ara Espa obtenida.\n", + /* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno est cerca.\n", + /* 94*/ "Est疽 en la misma planta que \nla oficina de Cassandra.\n", + /* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n", + /* 96*/ "El ascensor del stano debe de estar por \naqu en algn lugar.\n", + /* 97*/ "El sistema de seguridad est activo de nuevo.\n", + /* 98*/ "。V疣dalo! 。Lo has roto!\n", + /* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n", + /*100*/ "ソPor qu tanta prisa?\n", + /*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavar el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n", + /*102*/ "ソSon todos prescindibles?\n", + /*103*/ "。No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves cdigo slo funcionan cuando el \npropietario est vivo... Si les matas, la llave \nes intil. Los guardas armados son otra cosa, \npor supuesto.\n", + /*104*/ "ソDnde se encuentra el objetivo?\n", + /*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estar en el laboratorio de \ninvestigacin en algn lugar del subsuelo.\n", + /*106*/ "ソCmo le reconocer?\n", + /*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n", + /*108*/ "Bien, estoy dentro...\n", + /*109*/ "Estoy... estoy entrando ahora.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/archE.c b/src/files/lang/pal-beta/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/archJ.c b/src/files/lang/pal-beta/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/archP.c b/src/files/lang/pal-beta/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_f.c b/src/files/lang/pal-beta/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_g.c b/src/files/lang/pal-beta/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_i.c b/src/files/lang/pal-beta/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_s.c b/src/files/lang/pal-beta/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arecE.c b/src/files/lang/pal-beta/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arecJ.c b/src/files/lang/pal-beta/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arecP.c b/src/files/lang/pal-beta/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_f.c b/src/files/lang/pal-beta/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_g.c b/src/files/lang/pal-beta/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_i.c b/src/files/lang/pal-beta/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_s.c b/src/files/lang/pal-beta/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arkE.c b/src/files/lang/pal-beta/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-beta/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/arkJ.c b/src/files/lang/pal-beta/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/pal-beta/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/arkP.c b/src/files/lang/pal-beta/arkP.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-beta/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_f.c b/src/files/lang/pal-beta/ark_str_f.c new file mode 100644 index 000000000..05b3c23cb --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - R饌ctiver l'ascenseur\n\nNous avons d騁ect la commande d'arr黎 de fonctionnement de l'ascenseur donn馥 par un PC des bureaux inf駻ieurs. Trouvez ce terminal et modifiez la commande pour r饌ctiver l'ascenseur.\n\n|Objectif 3: - D騁ruire l'h駘ico de combat dataDyne\n\nUn h駘ico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous interdire l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 5: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - D騁ruire l'h駘ico de combat dataDyne\n\nUn h駘ico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous barrer l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 4: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous barrer l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 3: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acc馘er l'ascenseur du hall\n", + /* 10*/ "R饌ctiver l'ascenseur du bureau\n", + /* 11*/ "D騁ruire l'hovercopter dataDyne\n", + /* 12*/ "Battre les gardes de Cassandra\n", + /* 13*/ "Retour l'h駘iport avec Dr. Caroll\n", + /* 14*/ "Acc鑚 param鑼res ascenseur...\n", + /* 15*/ "LUMIERES ON\n", + /* 16*/ "Dr. Caroll abattu!\n", + /* 17*/ "Dr. Caroll sous feu ennemi!\n", + /* 18*/ "Dr. Caroll endommag!\n", + /* 19*/ "Trop tard! La voici...\n", + /* 20*/ "Vous 黎es une sacr馥 peste, vous...\n", + /* 21*/ "Bonne nuit, Miss Dark.\n", + /* 22*/ "LUMIERES ON\n", + /* 23*/ "LUMIERES OFF\n", + /* 24*/ "MISSION ECHOUEE\n", + /* 25*/ "MISSION ACCOMPLIE\n", + /* 26*/ "Emplacement pour warning h駘ico.\n", + /* 27*/ "Obtenir Vision nocturne.\n", + /* 28*/ "Vision nocturne de\n", + /* 29*/ "Cassandra De Vries\n", + /* 30*/ "Vision nocturne\n", + /* 31*/ "Vision nocturne obtenue.\n", + /* 32*/ "Re-bonjour, jeune fille!\n", + /* 33*/ "Ascenseur hall atteint.\n", + /* 34*/ "Porte ascenseur bureau ouverte.\n", + /* 35*/ "Hovercopter dataDyne 駘imin.\n", + /* 36*/ "Gardes de Cassandra vaincus.\n", + /* 37*/ "Mais...pas comme 軋!\n", + /* 38*/ "Mais si.\n", + /* 39*/ "Vous faites n'importe quoi!\n", + /* 40*/ "Silence.\n", + /* 41*/ "Mais d駱鹹hez-vous!\n", + /* 42*/ "Oh, non...trop tard.\n", + /* 43*/ "La voil...\n", + /* 44*/ "Attrapez-la!\n", + /* 45*/ "Objet crucial d騁ruit. \n", + /* 46*/ "Obtenir CamSpy.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "CamSpy\n", + /* 49*/ "Une CamSpy\n", + /* 50*/ "CamSpy obtenue.\n", + /* 51*/ "Ils ont verrouill le rez-de-chauss馥 - \nallez l'ascenseur!\n", + /* 52*/ "Il faut d騁ruire cet h駘ico ou le \ntransport sera descendu!\n", + /* 53*/ "Je ne peux laisser un garde du corps vivant.\n", + /* 54*/ "Ne faites attendre le transport - \nretournez l'h駘iport.\n", + /* 55*/ "Obtenir la carte alpha.\n", + /* 56*/ "Garde: \n", + /* 57*/ "Carte de bureau\n", + /* 58*/ "Carte du bureau\n", + /* 59*/ "Carte de bureau de Cassandra obtenue.\n", + /* 60*/ "Alerte! Elle est ici!\n", + /* 61*/ "Bonne nuit!\n", + /* 62*/ "Qu'est-ce qu...?\n", + /* 63*/ "On se balade?\n", + /* 64*/ "Qu'est-ce qu'elle veut m鑽e-grand?\n", + /* 65*/ "Remettez-moi le sapiens imm馘iatement! Vous ne\nsavez pas ce que vous faites...\n", + /* 66*/ "Oh que si. Je rentre chez moi.\n", + /* 67*/ "Pour la derni鑽e fois: rendez ce qui\nm'appartient et je vous offre un poste.\n", + /* 68*/ "D駸ol馥! Je me tire.\n", + /* 69*/ "Il nous faut le sapiens. Le reste de \nl'op駻ation en d駱end.\n", + /* 70*/ "J'en suis consciente!\n", + /* 71*/ "Je sais aussi qui m'adresser...\nMr. Carrington.\n", + /* 72*/ "Porte d'ascenseur inutilisable cet 騁age.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_g.c b/src/files/lang/pal-beta/ark_str_g.c new file mode 100644 index 000000000..ffebb5d75 --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Truppenkonzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Brotrakt. Sie mssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne Gunship!\n\nEin dataDyne Gunship umkreist das Geb舫de. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit mssen Sie mit 舫゚erster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Truppenkonzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne Gunship!\n\nEin dataDyne Gunship umkreist das Geb舫de. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit mssen Sie mit 舫゚erster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Truppenkonzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n", + /* 10*/ "Reaktivieren Sie den Bro-Aufzug!\n", + /* 11*/ "Zerstren Sie das dataDyne-Gunship!\n", + /* 12*/ "Neutralisieren Sie De Vries Bodyguards!\n", + /* 13*/ "Erreichen Sie das Helipad!\n", + /* 14*/ "Zugriff auf die Aufzge erfolgt...\n", + /* 15*/ "BELEUCHTUNG AKTIVIERT!\n", + /* 16*/ "Dr. Caroll erlitt einen kritischen Treffer!\n", + /* 17*/ "Dr. Caroll wird angegriffen!\n", + /* 18*/ "Dr. Caroll wurde besch臈igt!\n", + /* 19*/ "Zu sp舩! Sie ist hier...\n", + /* 20*/ "Du wirst langsam richtig l舖tig...\n", + /* 21*/ "Gute Nacht, Ms. Dark.\n", + /* 22*/ "BELEUCHTUNG AKTIVIERT\n", + /* 23*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 24*/ "MISSION FEHLGESCHLAGEN\n", + /* 25*/ "MISSION ERFOLGREICH\n", + /* 26*/ "Gunship-Warnung!!!\n", + /* 27*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 28*/ "Cassandra De Vries\n", + /* 29*/ "Nachtsichtger舩\n", + /* 30*/ "Nachtsichtger舩\n", + /* 31*/ "Nachtsichtger舩 aufgenommen.\n", + /* 32*/ "So trifft man sich wieder, Kleine!\n", + /* 33*/ "Foyer-Aufzug betreten.\n", + /* 34*/ "Tr zum Bro-Aufzug entriegelt.\n", + /* 35*/ "dataDyne Gunship eliminiert.\n", + /* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n", + /* 37*/ "So funktioniert das nicht.\n", + /* 38*/ "Doch, tut es.\n", + /* 39*/ "Gib das her - du machst das falsch!\n", + /* 40*/ "Hr auf mich zu nerven.\n", + /* 41*/ "Wrdest du dich bitte beeilen?\n", + /* 42*/ "Oh nein, ...zu sp舩!\n", + /* 43*/ "Sie ist hier...\n", + /* 44*/ "Schnappt sie!\n", + /* 45*/ "Wichtiges Objekt zerstrt. \n", + /* 46*/ "Erlangen Sie den CamSpy.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "CamSpy\n", + /* 49*/ "Ein CamSpy\n", + /* 50*/ "CamSpy aufgenommen.\n", + /* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n", + /* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n", + /* 53*/ "Ich muss mich noch um die Bodyguards kmmern.\n", + /* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurck zum Helipad!\n", + /* 55*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 56*/ "Wachen\n", + /* 57*/ "Bro-Schlsselkarte\n", + /* 58*/ "Bro-Schlsselkarte\n", + /* 59*/ "Cassandras Bro-Schlusselkarte aufgenommen.\n", + /* 60*/ "Gebt Alarm - sie ist hier!\n", + /* 61*/ "Licht AUS!\n", + /* 62*/ "Was zum...?\n", + /* 63*/ "Na, wohin willst du denn?\n", + /* 64*/ "Kann ich etwas fr dich tun, alte Frau?\n", + /* 65*/ "Geben Sie uns den Sapienten sofort zurck! Sie wissen \nnicht, was Sie da tun!\n", + /* 66*/ "Doch, das tue ich. Ich verschwinde.\n", + /* 67*/ "Letzte Chance: Geben Sie ihn zurck, und Sie\nknnten vielleicht in Zukunft fr mich arbeiten.\n", + /* 68*/ "Tut mir leid, ich bin in Eile.\n", + /* 69*/ "Sie mssen uns das Ding zurckbringen. Wir knnen \nsonst nicht fortfahren.\n", + /* 70*/ "Das wei゚ ich!\n", + /* 71*/ "Ich wei゚ auch, mit wem ich sprechen muss... \nMr. Carrington.\n", + /* 72*/ "Die Aufzugstren sind auf diesem Stockwerk inaktiv.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_i.c b/src/files/lang/pal-beta/ark_str_i.c new file mode 100644 index 000000000..22f5e66b0 --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington - \n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatter la navetta e annienter anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington - \n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatter la navetta e annienter anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington - \n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Usa l'ascensore dell'atrio\n", + /* 10*/ "Riattiva l'ascensore degli uffici\n", + /* 11*/ "Distruggi la cannoniera dataDyne\n", + /* 12*/ "Elimina guardie del corpo di Cassandra\n", + /* 13*/ "Appuntamento all'eliporto\n", + /* 14*/ "I comandi dell'ascensore...\n", + /* 15*/ "LE LUCI SONO ACCESE!\n", + /* 16*/ "Il Dr. Caroll stato ucciso!\n", + /* 17*/ "Attaccano il Dr. Caroll!\n", + /* 18*/ "Il Dr. Caroll ferito!\n", + /* 19*/ "Troppo tardi! ネ gi qui!\n", + /* 20*/ "Sei una vera scocciatura!\n", + /* 21*/ "Buona notte, Perfect Dark!\n", + /* 22*/ "LUCI ACCESE ORA\n", + /* 23*/ "LUCI SPENTE ORA\n", + /* 24*/ "MISSIONE FALLITA\n", + /* 25*/ "MISSIONE COMPIUTA\n", + /* 26*/ "Allarme cannoniera!\n", + /* 27*/ "Procurati Vista Notturna\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Vista Notturna\n", + /* 31*/ "Presa Vista Notturna\n", + /* 32*/ "Chi non muore si rivede!\n", + /* 33*/ "Raggiunto l'ascensore nell'atrio.\n", + /* 34*/ "Aperta la porta ascensore uffici.\n", + /* 35*/ "Eliminata la cannoniera dataDyne.\n", + /* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n", + /* 37*/ "Non si fa cos, idiota!\n", + /* 38*/ "S, invece!\n", + /* 39*/ "Dammi qua! Faccio io!\n", + /* 40*/ "Non scocciarmi!\n", + /* 41*/ "Ti vuoi dare una mossa?!\n", + /* 42*/ "Oh, no! Troppo tardi.\n", + /* 43*/ "Ci ha raggiunti...\n", + /* 44*/ "Prendila!\n", + /* 45*/ "Distrutto strumento essenziale alla missione\n", + /* 46*/ "Procurati TeleSpia.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "TeleSpia\n", + /* 49*/ "TeleSpia\n", + /* 50*/ "Presa la TeleSpia.\n", + /* 51*/ "Hanno chiuso il pianterreno! \n Va all'ascensore!\n", + /* 52*/ "Bisogna tirar gi quella cannoniera \n o abbatter la navetta!\n", + /* 53*/ "Non posso lasciar vive le guardie!\n", + /* 54*/ "Fai presto: vai alla navetta! \n Torna all'eliporto!\n", + /* 55*/ "Procurati la chiave alfa\n", + /* 56*/ "Guardia:\n", + /* 57*/ "Chiave dell'ufficio\n", + /* 58*/ "Chiave dell'ufficio\n", + /* 59*/ "Presa chiave ufficio di Cassandra\n", + /* 60*/ "Date l'allarme: qui!\n", + /* 61*/ "Spegnete le luci!\n", + /* 62*/ "Ma cosa...?\n", + /* 63*/ "Dove credi di andare?\n", + /* 64*/ "Posso aiutarla, madama?\n", + /* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n", + /* 66*/ "Certo che lo so: me ne vado!\n", + /* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n", + /* 68*/ "Spiacente! Devo farlo!\n", + /* 69*/ "Devi recuperare il Sapiente: senza \nnon possibile andare avanti.\n", + /* 70*/ "Lo so benissimo!\n", + /* 71*/ "So anche con chi parlare... \nSig. Carrington.\n", + /* 72*/ "La porta dell'ascensore fuori servizio.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_s.c b/src/files/lang/pal-beta/ark_str_s.c new file mode 100644 index 000000000..3052b14c6 --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el nico ascensor accesible enviada a un PC situado en el piso de oficinas m疽 bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicptero Gunship de dataDyne\n\nHay un helicptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudar en derribaros. Acaba con el helicptero sin prejuicios, ya que 駘 intentar hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicptero Gunship de dataDyne\n\nHay un helicptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudar en derribaros. Acaba con el helicptero sin prejuicios, ya que 駘 intentar hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acceder al ascensor del vestbulo\n", + /* 10*/ "Reactivar ascensor de las oficinas\n", + /* 11*/ "Destruir helicptero de dataDyne\n", + /* 12*/ "Derrotar a las guard. de Cassandra\n", + /* 13*/ "Encuentro en el helipuerto\n", + /* 14*/ "Accediendo a los controles del ascensor...\n", + /* 15*/ "。LUCES ENCENDIDAS!\n", + /* 16*/ "。El Dr. Caroll ha muerto!\n", + /* 17*/ "。Est疣 atacando al Dr. Caroll!\n", + /* 18*/ "。El Dr. Caroll ha sido daado!\n", + /* 19*/ "。Demasiado tarde! Ella est aqu...\n", + /* 20*/ "Est疽 empezando a ser un fastidio...\n", + /* 21*/ "Buenas noches, Srta. Dark.\n", + /* 22*/ "LUCES ENCENDIDAS\n", + /* 23*/ "LUCES APAGADAS\n", + /* 24*/ "MISIモN FALLADA\n", + /* 25*/ "MISIモN CUMPLIDA\n", + /* 26*/ "Aviso del Helicptero va aqu.\n", + /* 27*/ "Obt駭 Visin Nocturna.\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Visin Nocturna\n", + /* 30*/ "Visin Nocturna\n", + /* 31*/ "Visin Nocturna obtenida.\n", + /* 32*/ "。Nos vemos de nuevo, chica!\n", + /* 33*/ "Accediste al ascensor del vestbulo.\n", + /* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n", + /* 35*/ "Helicptero de dataDyne eliminado.\n", + /* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n", + /* 37*/ "As no es como va.\n", + /* 38*/ "S, as es.\n", + /* 39*/ "D疥elo. Lo est疽 haciendo mal.\n", + /* 40*/ "Deja de molestarme.\n", + /* 41*/ "。Debemos darnos prisa!\n", + /* 42*/ "Oh, no... demasiado tarde.\n", + /* 43*/ "Ella est aqu...\n", + /* 44*/ "。Cogedla!\n", + /* 45*/ "Objeto crtico de la misin destruido. \n", + /* 46*/ "Obt駭 la C疥ara Espa.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "C疥ara Espa\n", + /* 49*/ "Una C疥ara Espa\n", + /* 50*/ "C疥ara Espa obtenida.\n", + /* 51*/ "Han cerrado la planta baja: \n。Ve al ascensor!\n", + /* 52*/ "。Necesitamos acabar con ese helicptero, \no derribar la nave de escape!\n", + /* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n", + /* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n", + /* 55*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 56*/ "Guarda:\n", + /* 57*/ "Llave magn騁ica de la oficina\n", + /* 58*/ "Llave magn騁ica de la oficina\n", + /* 59*/ "Llave magn騁ica de la oficina de Cassandra obtenida.\n", + /* 60*/ "Activa la alarma: 。ella est aqu!\n", + /* 61*/ "。Luces fuera!\n", + /* 62*/ "ソQu dem...?\n", + /* 63*/ "ソVas a alguna parte?\n", + /* 64*/ "ソPuedo hacer algo por ti, anciana?\n", + /* 65*/ "。Devuelve nuestra IA inmediatamente! No sabes \nlo que est疽 haciendo.\n", + /* 66*/ "S lo s. Me largo.\n", + /* 67*/ "。Otra oportunidad! Devu駘velo, y podr疽 \ntrabajar para m.\n", + /* 68*/ "。Lo siento! ソLo pillas?\n", + /* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n", + /* 70*/ "。Ya lo s!\n", + /* 71*/ "Tambi駭 s con qui駭 hablar... \ncon el Sr. Carrington.\n", + /* 72*/ "La puerta del ascensor no funciona en este piso.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ashE.c b/src/files/lang/pal-beta/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ashJ.c b/src/files/lang/pal-beta/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ashP.c b/src/files/lang/pal-beta/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_f.c b/src/files/lang/pal-beta/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_g.c b/src/files/lang/pal-beta/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_i.c b/src/files/lang/pal-beta/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_s.c b/src/files/lang/pal-beta/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ateE.c b/src/files/lang/pal-beta/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-beta/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ateJ.c b/src/files/lang/pal-beta/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/pal-beta/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ateP.c b/src/files/lang/pal-beta/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-beta/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_f.c b/src/files/lang/pal-beta/ate_str_f.c new file mode 100644 index 000000000..532da82cf --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez bout de la r駱lique de Jonathan Dark, le meilleur 駘駑ent de l'Institut en mati鑽e de test holographique. Il poss鐡e de grandes et surprenantes capacit駸 au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent exp駻iment du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez 黎re fi鑽e de vos prouesses.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez bout de la r駱lique de Jonathan Dark, le meilleur 駘駑ent de l'Institut en mati鑽e de test holographique. Il poss鐡e de grandes et surprenantes capacit駸 au combat.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\nFIN\n", + /* 4*/ "Vaincre le garde dataDyne\n", + /* 5*/ "Vaincre Jonathan Dark\n", + /* 6*/ "Vaincre Trent Easton\n", + /* 7*/ "LE DUEL\n", + /* 8*/ "Vaincre votre adversaire.\n", + /* 9*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 10*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 11*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 12*/ "Niveau adverse: AGENT\n", + /* 13*/ "Niveau adverse: AGENT SPECIAL\n", + /* 14*/ "Niveau adverse: AGENT PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_g.c b/src/files/lang/pal-beta/ate_str_g.c new file mode 100644 index 000000000..78a7eab25 --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfgt ber gute Kampff臧igkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu berraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines 舫゚erst gef臧rlichen Regierungsagenten. Der Simulant ist ein berdurchschnittlich erfahrener K舂pfer. Wenn Sie diesen Test bestehen, drfen Sie zu Recht stolz auf sich sein.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfgt ber gute Kampff臧igkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu berraschen.\n\nEND\n", + /* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\nEND\n", + /* 4*/ "Besiegen Sie die dataDyne-Wache!\n", + /* 5*/ "Besiegen Sie Jonathan Dark!\n", + /* 6*/ "Besiegen Sie Trent Easton!\n", + /* 7*/ "DAS DUEL\n", + /* 8*/ "Besiegen Sie Ihren Gegner!\n", + /* 9*/ "Ausgezeichnet! Sie waren zu schnell fr ihn!\n", + /* 10*/ "Ausgezeichnet! Sie waren zu schnell fr ihn!\n", + /* 11*/ "Ausgezeichnet! Sie waren zu schnell fr ihn!\n", + /* 12*/ "Gegnerischer Schwierigkeitsgrad: AGENT\n", + /* 13*/ "Gegnerischer Schwierigkeitsgrad: SPEZIALAGENT\n", + /* 14*/ "Gegnerischer Schwierigkeitsgrad: PERFEKTER AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_i.c b/src/files/lang/pal-beta/ate_str_i.c new file mode 100644 index 000000000..3d92c8b13 --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington - \n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacit di combattimento ed in grado di mettere in difficolt anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington - \n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacit di combattimento ed in grado di mettere in difficolt anche combattenti affermati.\n\nFINE\n ", + /* 3*/ "|Situazione - \n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington - \n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ", + /* 4*/ "Sconfiggi la guardia dataDyne \n", + /* 5*/ "Sconfiggi Jonathan Dark \n", + /* 6*/ "Sconfiggi Trent Easton \n", + /* 7*/ "IL DUELLO\n", + /* 8*/ "Sconfiggi l'avversario.\n", + /* 9*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 10*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 11*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 12*/ "Livello abilit avversario: AGENTE\n", + /* 13*/ "Livello abilit avversario: AGENTE SPECIALE\n", + /* 14*/ "Livello abilit avversario: AGENTE PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_s.c b/src/files/lang/pal-beta/ate_str_s.c new file mode 100644 index 000000000..72f79a1e7 --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulacin de Jonathan Dark, actual poseedora del r馗ord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulacin de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podr疽 estar orgullosa de tu logro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulacin de Jonathan Dark, actual poseedor del r馗ord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n", + /* 4*/ "Derrotar al guardi疣 de dataDyne\n", + /* 5*/ "Derrotar a Jonathan Dark\n", + /* 6*/ "Derrotar a Trent Easton\n", + /* 7*/ "EL DUELO\n", + /* 8*/ "Derrota a tu oponente.\n", + /* 9*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 10*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 11*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 12*/ "Nivel del oponente: AGENTE\n", + /* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n", + /* 14*/ "Nivel del oponente: AGENTE PERFECTO\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/aztE.c b/src/files/lang/pal-beta/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-beta/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/aztJ.c b/src/files/lang/pal-beta/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/pal-beta/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/pal-beta/aztP.c b/src/files/lang/pal-beta/aztP.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-beta/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_f.c b/src/files/lang/pal-beta/azt_str_f.c new file mode 100644 index 000000000..14caeac06 --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - R馗up駻er scanner m馘ical pr駸identiel\n\nCet appareil actualise en permanence le journal m馘ical du Pr駸ident et lui assure un 騁at de sant stable. Trouvez- le pour garder le Pr駸ident en bonne sant.\n\n|Objectif 2: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin駑ais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - D駸activer appareil brouillage ennemi\n\nUn syst鑪e ennemi sophistiqu inonde le secteur d'un brouillage CME imp駭騁rable. Vous pourrez d騁erminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouv, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 5: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 1*/ "SITE du CRASH\n", + /* 2*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - R馗up駻er scanner m馘ical pr駸identiel\n\nCet appareil actualise en permanence le journal m馘ical du Pr駸ident et lui assure un 騁at de sant stable. Trouvez- le pour garder le Pr駸ident en bonne sant.\n\n|Objectif 2: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin駑ais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 4: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin駑ais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 3: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R馗up駻er scanner m馘ical pr駸identiel\n", + /* 6*/ "Activer le signal de d騁resse\n", + /* 7*/ "D駸activer appareil brouillage ennemi\n", + /* 8*/ "Eliminer le clone du Pr駸ident\n", + /* 9*/ "Trouver et sauver le Pr駸ident\n", + /* 10*/ "Voil le point d'騅acuation.\n", + /* 11*/ "Le signal peut venir de l.\n", + /* 12*/ "Le brouillage... Il vient de ce vaisseau.\n", + /* 13*/ "Elvis... Il pourra prot馮er le Pr駸ident.\n", + /* 14*/ "Signal de d騁resse activ.\n", + /* 15*/ "Objet crucial d騁ruit.\n", + /* 16*/ "Obtenir le scanner pr駸identiel.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Scanner pr駸identiel\n", + /* 20*/ "Scanner pr駸identiel obtenu.\n", + /* 21*/ "Appareil de brouillage d駸activ.\n", + /* 22*/ "Le Pr駸ident a 騁 abattu.\n", + /* 23*/ "Clone pr駸identiel 駘imin.\n", + /* 24*/ "Vous ne pourrez pas le sauver!\n", + /* 25*/ "Pr駸ident sauv.\n", + /* 26*/ "Obtenir Vision nocturne.\n", + /* 27*/ "Cassandra De Vries: \n", + /* 28*/ "Vision nocturne\n", + /* 29*/ "Vision nocturne\n", + /* 30*/ "Vision nocturne obtenue.\n", + /* 31*/ "Prenez ceci. Cela vous sera utile!\n", + /* 32*/ "Ahhh... oohhhh...\n", + /* 33*/ "Ahhh... ohh... ouuuuhhh...\n", + /* 34*/ "Agent Dark! Quel est votre statut?\n", + /* 35*/ "Perfect Dark, r駱ondez!\n", + /* 36*/ "A-agent Dark au rapport...\n", + /* 37*/ "Agent Dark! Parlez bon sang!\n", + /* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-黎re de l'autre appareil.\n", + /* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne sant. Sans oublier le Pr駸ident...\n", + /* 40*/ "Comment vous sentez-vous, M. le Pr駸ident?\n", + /* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journ馥. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n", + /* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n", + /* 43*/ "Un vaisseau de recherche sous-marin du gouvernement am駻icain. Un mod鑞e unique pouvant mener des exp駻iences de grandes profondeurs. Trent a formul une demande de pr黎 au nom de la dataDyne Corporation. J'ai refus.\n", + /* 44*/ "Trent devra r駱ondre de ses actes. Encore faut-il le trouver.\n", + /* 45*/ "Vous avez 馗hou, Easton. Vous 黎es un 駘駑ent corrompu. Nous nous passerons de vous.\n", + /* 46*/ "C'est 軋 oui. P騁asse su馘oise, va!\n", + /* 47*/ "Noooooooon!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_g.c b/src/files/lang/pal-beta/azt_str_g.c new file mode 100644 index 000000000..ed3f99dcf --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes ECM-D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzeige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Pr舖identen!\n\nDieses Ger舩 zeichnet st舅dig die medizinischen Daten des Pr舖identen auf. Mit seiner Hilfe knnen Sie Daten ber den Gesundheitszustand des Pr舖identen abrufen. Um sicherzustellen, dass er unversehrt bleibt, bentigen Sie dieses Ger舩 auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Handlungsspielraum.\n\n|3. Ziel: - Deaktivieren Sie den D舂pfungsfeld-Generator!\n\nEin High-Tech D舂pfungsfeld-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des D舂pfungs-Signals ausfindig zu machen, als unsere Luft-Aufkl舐er. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann knnen wir Sie orten und Ihnen zur Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 1*/ "ABSTURZSTELLE\n", + /* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes ECM-D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzeige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Pr舖identen!\n\nDieses Ger舩 zeichnet st舅dig die medizinischen Daten des Pr舖identen auf. Mit seiner Hilfe knnen Sie Daten ber den Gesundheitszustand des Pr舖identen abrufen. Um sicherzustellen, dass er unversehrt bleibt, bentigen Sie dieses Ger舩 auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Handlungsspielraum.\n\n|3. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes ECM-D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzeige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Handlungsspielraum.\n\n|2. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden Sie den medizinischen Scanner!\n", + /* 6*/ "Aktivieren Sie das Notsignal!\n", + /* 7*/ "Deaktivieren Sie den Generator!\n", + /* 8*/ "Eliminieren Sie den Pr舖identen-Klon!\n", + /* 9*/ "Orten und retten Sie den Pr舖identen!\n", + /* 10*/ "Ich habe die Rettungskapsel gefunden.\n", + /* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n", + /* 12*/ "Das D舂pfungsfeld... Es wird von diesem Schiff aus generiert.\n", + /* 13*/ "Elvis... Er ist sicher in der Lage, den Pr舖identen zu beschtzen.\n", + /* 14*/ "Notsignal wurde aktiviert.\n", + /* 15*/ "Wichtiges Objekt zerstrt.\n", + /* 16*/ "Finden Sie den medizinischen Scanner!\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Ein medizinischer Scanner\n", + /* 20*/ "Medizinischer Scanner aufgenommen.\n", + /* 21*/ "D舂pfungsfeld-Generator deaktiviert.\n", + /* 22*/ ".\n", + /* 23*/ "Pr舖identen-Klon wurde eliminiert.\n", + /* 24*/ "Du kannst ihn nicht retten!\n", + /* 25*/ "Pr舖ident wurde gerettet.\n", + /* 26*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 27*/ "Cassandra De Vries\n", + /* 28*/ "Nachtsichtger舩\n", + /* 29*/ "Nachtsichtger舩\n", + /* 30*/ "Nachtsichtger舩 aufgenommen.\n", + /* 31*/ "Nimm das; es wird sich als ntzlich erweisen!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... ouuu...\n", + /* 34*/ "Agent Dark! Bitte melden Sie sich!\n", + /* 35*/ "Perfect Dark, kommen!\n", + /* 36*/ "A-Agent Dark hier...\n", + /* 37*/ "Agent Dark! Bitte antworten Sie!\n", + /* 38*/ "Diese Frequenz wird gestrt... Das Signal kommt von dort drben.\n", + /* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Pr舖identen retten.\n", + /* 40*/ "Wie fhlen Sie sich, Mr. President?\n", + /* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n", + /* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n", + /* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n", + /* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n", + /* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht l舅ger von Nutzen.\n", + /* 46*/ "Versuchエs nur, du skandinavischer Freak!\n", + /* 47*/ "Neiiiiiiiin!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_i.c b/src/files/lang/pal-beta/azt_str_i.c new file mode 100644 index 000000000..6ceea455c --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington - \n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere pi facile localizzarla e disattivarla. Fatto ci potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 1*/ "LUOGO DEL DISASTRO\n", + /* 2*/ "|Situazione - \n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington - \n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington - \n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Recupera scanner medico del Presidente\n", + /* 6*/ "Attiva il segnale di pericolo\n", + /* 7*/ "Disattiva il dispositivo di disturbo\n", + /* 8*/ "Trova ed elimina il clone del Presidente\n", + /* 9*/ "Trova e salva il Presidente\n", + /* 10*/ "Ecco la capsula di salvataggio!\n", + /* 11*/ "Forse si pu mandare un segnale da l!\n", + /* 12*/ "Queste onde... Vengono da quella navicella!\n", + /* 13*/ "Elvis... Pu proteggere lui il Presidente.\n", + /* 14*/ "Inviato segnale di pericolo.\n", + /* 15*/ "Distrutto strumento essenziale alla missione.\n", + /* 16*/ "Procurati scanner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Scanner del Presidente!\n", + /* 20*/ "Preso scanner del Presidente.\n", + /* 21*/ "Disattivato dispositivo per onde di disturbo.\n", + /* 22*/ "Il Presidente stato ucciso.\n", + /* 23*/ "Il clone del Presidente stato eliminato.\n", + /* 24*/ "Non riuscirai mai a salvarlo!\n", + /* 25*/ "Il Presidente stato salvato.\n", + /* 26*/ "Procurati Vista Notturna!\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Vista Notturna\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Presa Vista Notturna.\n", + /* 31*/ "Ecco, tieni: ti sar utile!\n", + /* 32*/ "Aaah... uuuh...\n", + /* 33*/ "Aaah... uuuh... oooh...\n", + /* 34*/ "Agente Dark! A rapporto!\n", + /* 35*/ "Perfect Dark, rispondi!\n", + /* 36*/ "Agente Dark a rapporto, signore!\n", + /* 37*/ "Agente Dark! Rispondi!\n", + /* 38*/ "C' qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n", + /* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n", + /* 40*/ "Come sta, Sig. Presidente?\n", + /* 41*/ "Molto meglio, grazie. Penso che mi ci vorr un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo s che era ambizioso, ma fino a questo punto...\n", + /* 42*/ "Solo una cosa, signore? Cos' il Pelagic II che Trent voleva ad ogni costo?\n", + /* 43*/ "ネ un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondit oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n", + /* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n", + /* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi pi!\n", + /* 46*/ "Provaci, pazzo scandinavo!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_s.c b/src/files/lang/pal-beta/azt_str_s.c new file mode 100644 index 000000000..13089d2ef --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Recuperar Esc疣er M馘ico del Presidente\n\nEste dispositivo est actualizando constantemente el historial m馘ico del Presidente y es capaz de chequear su estado de salud. Lo necesitar疽 para asegurarte de que est en buenas condiciones.\n\n|Objetivo Dos: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo est inundando el 疵ea con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra m疽 efectivamente de lo que nuestros aviones espa est疣 haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posicin y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 1*/ "LUGAR DEL IMPACTO\n", + /* 2*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Recuperar Esc疣er M馘ico del Presidente\n\nEste dispositivo est actualizando constantemente el historial m馘ico del Presidente y es capaz de chequear su estado de salud. Lo necesitar疽 para asegurarte de que est en buenas condiciones.\n\n|Objetivo Dos: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Recuperar esc疣er m馘ico del Presidente\n", + /* 6*/ "Activar la seal de socorro\n", + /* 7*/ "Apagar la seal de bloqueo enemiga\n", + /* 8*/ "Eliminar al clon del Presidente\n", + /* 9*/ "Localizar y rescatar al Presidente\n", + /* 10*/ "Ah est la c疳sula de escape.\n", + /* 11*/ "Quiz haya un emisor dentro.\n", + /* 12*/ "El bloqueo... Proviene de esa nave.\n", + /* 13*/ "Elvis... ノl ser capaz de proteger al Presidente.\n", + /* 14*/ "Seal de socorro activada.\n", + /* 15*/ "Objeto crtico de la misin destruido.\n", + /* 16*/ "Obt駭 el Esc疣er del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Esc疣er Presidencial\n", + /* 20*/ "Esc疣er Presidencial obtenido.\n", + /* 21*/ "Dispositivo de bloqueo apagado.\n", + /* 22*/ "El Presidente ha muerto.\n", + /* 23*/ "El clon del Presidente ha sido eliminado.\n", + /* 24*/ "。Ahora ya no podr疽 salvarle!\n", + /* 25*/ "El Presidente ha sido rescatado.\n", + /* 26*/ "Obt駭 Visin Nocturna.\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Visin Nocturna\n", + /* 29*/ "Visin Nocturna\n", + /* 30*/ "Visn Nocturna obtenida.\n", + /* 31*/ "Toma esto, 。lo encontrar疽 muy til!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "。Agente Dark! 。Informe, por favor!\n", + /* 35*/ "。Perfect Dark, responda!\n", + /* 36*/ "A-agente Dark informando...\n", + /* 37*/ "。Agente Dark! 。Por favor, responda!\n", + /* 38*/ "Algo est bloqueando mis transmisiones... Proviene de esa otra nave.\n", + /* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis est bien. No olvidando al Presidente, por supuesto.\n", + /* 40*/ "ソCmo se siente, Sr. Presidente?\n", + /* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo as. Saba que era ambicioso, s, pero esto...\n", + /* 42*/ "Slo una cosa, seor. ソQu es el Pelagic II que tanto ansiaba Trent?\n", + /* 43*/ "Es un navo de investigacin de profundidad del gobierno norteamericano, nico en su clase... El nico barco capaz de dirigir una operacin a gran escala a profundidad extrema. Trent quera que se lo prestara a la Corporacin dataDyne, pero rehus.\n", + /* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n", + /* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n", + /* 46*/ "。Int駭talo, mamarracho escandinavo!\n", + /* 47*/ "。。。Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/catE.c b/src/files/lang/pal-beta/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/catJ.c b/src/files/lang/pal-beta/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/catP.c b/src/files/lang/pal-beta/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_f.c b/src/files/lang/pal-beta/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_g.c b/src/files/lang/pal-beta/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_i.c b/src/files/lang/pal-beta/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_s.c b/src/files/lang/pal-beta/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/caveE.c b/src/files/lang/pal-beta/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-beta/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-beta/caveJ.c b/src/files/lang/pal-beta/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/pal-beta/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/pal-beta/caveP.c b/src/files/lang/pal-beta/caveP.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-beta/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_f.c b/src/files/lang/pal-beta/cave_str_f.c new file mode 100644 index 000000000..c5f139a43 --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Ranger l'駲uipement\n\nD饕arrassez-vous de votre 駲uipement le plus tt possible et 騅itez de transporter des objets compromettants. Vous pourrez r馗up駻er votre paquetage une fois bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme se d馗lenchera et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol du coffre\n\nLe plan de vol de l'Air Force One est gard dans un coffre de la base. D駻obez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n", + /* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Ranger l'駲uipement\n\nD饕arrassez-vous de votre 駲uipement le plus tt possible et 騅itez de transporter des objets compromettants. Vous pourrez r馗up駻er votre paquetage une fois bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme se d馗lenchera et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme sera donn馥 et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Voler uniforme et entrer dans la base\n", + /* 6*/ "Ranger l'駲uipement\n", + /* 7*/ "Leurrer le syst鑪e de d騁ection\n", + /* 8*/ "Obtenir le plan de vol du coffre\n", + /* 9*/ "Monter bord de l'Air Force One\n", + /* 10*/ "Obtenir valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir uniforme d'htesse.\n", + /* 16*/ "\n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme\n", + /* 19*/ "Uniforme d'htesse obtenu.\n", + /* 20*/ "Obtenir plans de vol du coffre.\n", + /* 21*/ "\n", + /* 22*/ "Plans de vol\n", + /* 23*/ "Plans de vol\n", + /* 24*/ "Plans de vol obtenus.\n", + /* 25*/ "Attention - un intrus...\n", + /* 26*/ "Civils innocents abattus.\n", + /* 27*/ "Va-t-il bien?\n", + /* 28*/ "Je vais chercher de l'aide.\n", + /* 29*/ "Bonjour.\n", + /* 30*/ "Vous connaissez le chemin.\n", + /* 31*/ "Rangez votre arme, je vous prie.\n", + /* 32*/ "...??? Oh, mon Dieu!\n", + /* 33*/ "Les armes sont interdites dans la base.\n", + /* 34*/ "J'appelle la s馗urit.\n", + /* 35*/ "Coupure syst鑪e initialis馥...\n", + /* 36*/ "Syst鑪es s馗urit coup駸.\n", + /* 37*/ "Armement d騁ect.\n", + /* 38*/ "Valise d駱os馥.\n", + /* 39*/ "Valise scann馥.\n", + /* 40*/ "Vous, l! Cette zone est interdite.\n", + /* 41*/ "Vous 黎es nouvelle ou quoi?\n", + /* 42*/ "H! Ma valise!\n", + /* 43*/ "Appelle la s馗urit... Je m'occupe d'elle.\n", + /* 44*/ "En haut...il y a un intrus.\n", + /* 45*/ "Acc鑚 grilles laser refus.\n", + /* 46*/ "Syst鑪e grilles laser: surcharge.\n", + /* 47*/ "Trop de cibles neutres abattues.\n", + /* 48*/ "Emp鹹hez-les d'avoir le coffre...\n", + /* 49*/ "Costume rev黎u.\n", + /* 50*/ "Vite! Attrapez le sac de l'htesse \net prenez son uniforme.\n", + /* 51*/ "Utilisez cette caisse pour cacher votre 駲uipement.\n", + /* 52*/ "Cette caisse se fera arr黎er si vous n'intervenez pas.\n", + /* 53*/ "C'est 軋 Air Force One, hein? ... C'est assez\npetit en fait.\n", + /* 54*/ "Arr黎ez-les - ils ouvrent le coffre...\n", + /* 55*/ "Agent Dark en position. Je vois l'entr馥 principale de la base. J'aper輟is aussi le point d'arriv馥 du t駘駱h駻ique.\n", + /* 56*/ "Excellent, Joanna. Ce t駘駱h駻ique est votre billet d'entr馥. Notre contact a rep駻 une htesse montant bord il y a une minute. Elle est escort馥 par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n", + /* 57*/ "...qu'ils ne font srement pas partie de l'op駻ation de Trent et que je ne dois pas les abattre m麥e sous leur feu. Et les agents de la NSA?\n", + /* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis n饌nmoins persuad que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois bord et pr駸entez-les au Pr駸ident.\n", + /* 59*/ "Et le prot馮er de ses ravisseurs. Avez-vous une th駮rie sur les plans de Trent et sur les types blonds?\n", + /* 60*/ "Que de vagues soup輟ns. Concentrez-vous plutt sur la mission. Bonne chance. Carrington, termin.\n", + /* 61*/ "Ascenseur inactif - syst鑪e s馗urit actif.\n", + /* 62*/ "Personnel crucial inutilisable.\n", + /* 63*/ "Objet crucial d騁ruit.\n", + /* 64*/ "Entr馥 de la base s馗uris馥.\n", + /* 65*/ "On s'en charge!!\n", + /* 66*/ "Chariot coup.\n", + /* 67*/ "Equipement ne peut 黎re enregistr.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_g.c b/src/files/lang/pal-beta/cave_str_g.c new file mode 100644 index 000000000..d4d9a0d26 --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Luftwaffen-Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrstung ein!\n\nSie mssen Ihre Ausrstung so schnell wie mglich loswerden. Vermeiden Sie es, verd臘htig wirkende Gegenst舅de mit sich herumzutragen. Sie knnen wieder auf Ihre Ausrstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst mssen Sie natrlich einen Koffer finden, um die Ausrstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische ワberwachungssystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, das die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpl舅e aus dem Safe!\n\nDie Route, welche fr die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pl舅e in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamit舩 dient er als Ihre Verst舐kung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 1*/ "PRトSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n", + /* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Luftwaffen-Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in Ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrstung ein!\n\nSie mssen Ihre Ausrstung so schnell wie mglich loswerden. Vermeiden Sie es, verd臘htig wirkende Gegenst舅de mit sich herumzutragen. Sie knnen wieder auf Ihre Ausrstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst mssen Sie natrlich einen Koffer finden, um die Ausrstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische ワberwachungssystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, das die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Luftwaffen-Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in Ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische ワberwachungssystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, das die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Erlangen Sie die Tarnung!\n", + /* 6*/ "Checken Sie Ihre Ausrstung ein!\n", + /* 7*/ "Unterminieren Sie die ワberwachung!\n", + /* 8*/ "Entwenden Sie die Flugpl舅e!\n", + /* 9*/ "Gehen Sie an Bord der Air Force One!\n", + /* 10*/ "Erlangen Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer aufgenommen\n", + /* 15*/ "Erlangen Sie die Uniform!\n", + /* 16*/ "\n", + /* 17*/ "Verkleidung\n", + /* 18*/ "Verkleidung\n", + /* 19*/ "Uniform aufgenommen\n", + /* 20*/ "Entwenden Sie die Flugpl舅e aus dem Safe!\n", + /* 21*/ "\n", + /* 22*/ "Flugpl舅e\n", + /* 23*/ "Flugpl舅e\n", + /* 24*/ "Flugpl舅e aufgenommen\n", + /* 25*/ "Vorsicht - Ein Eindringling...\n", + /* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n", + /* 27*/ "Ist er OK?\n", + /* 28*/ "Ich gehe und hole Hilfe.\n", + /* 29*/ "Schnen guten Tag.\n", + /* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n", + /* 31*/ "Sie mssen Ihre Waffe hier einchecken, Miss.\n", + /* 32*/ "Oh nein!\n", + /* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n", + /* 34*/ "Ich alarmiere die Security.\n", + /* 35*/ "System wird heruntergefahren...\n", + /* 36*/ "ワberwachungssystem wurde deaktiviert.\n", + /* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n", + /* 38*/ "Der Koffer wurde deponiert.\n", + /* 39*/ "Der Koffer wurde gescannt.\n", + /* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n", + /* 41*/ "Sind Sie neu hier?\n", + /* 42*/ "Hey - geben Sie mir meinen Koffer zurck!\n", + /* 43*/ "Du holst die Security - Ich kmmere mich um sie...\n", + /* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n", + /* 45*/ "Zugriff auf die Lasermatrix verweigert.\n", + /* 46*/ "Lasermatrix-System wurde berladen!!!\n", + /* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n", + /* 48*/ "Haltet sie vom Safe fern...\n", + /* 49*/ "Verkleidung wurde abgetragen.\n", + /* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess \n", + /* 51*/ "mit ihrer Uniform. Verbergen Sie Ihre Ausrstung in der Tasche. \n", + /* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n", + /* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n", + /* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n", + /* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n", + /* 56*/ "Ausgezeichnet, Joanna. Mit der Bahn gelangen Sie in die Basis. Unser Beobachter hat uns mitgeteilt, das ein Crew-Mitglied vor einer Minute das Flugzeug betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n", + /* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA Agenten?\n", + /* 58*/ "Ich wei゚ nicht, wie weit diese Verschwrung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenber absolut loyal sind. Sie mssen einen Beweis gegen Trent erbringen und diesen dem Pr舖identen vorlegen.\n", + /* 59*/ "Und ich soll ihn auch noch beschtzen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten knnte? Und was hat es mit diesen blonden Kerlen auf sich?\n", + /* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glck! Over und out.\n", + /* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n", + /* 62*/ "Wichtige Person ausgeschaltet.\n", + /* 63*/ "Wichtiges Objekt zerstrt.\n", + /* 64*/ "Eingang wurde gesichert.\n", + /* 65*/ "Wir bernehmen jetzt!!\n", + /* 66*/ "Hover-Trolley wurde abgeschaltet.\n", + /* 67*/ "Ausrstung kann nicht berprft werden.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_i.c b/src/files/lang/pal-beta/cave_str_i.c new file mode 100644 index 000000000..ef396368e --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington - \n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al pi presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli pi tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n", + /* 2*/ "|Situazione - \n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington - \n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al pi presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli pi tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington - \n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Travestiti ed entra nella base\n", + /* 6*/ "Deposita i tuoi strumenti\n", + /* 7*/ "Neutralizza il sistema di sicurezza\n", + /* 8*/ "Prendi i piani di volo dalla cassaforte\n", + /* 9*/ "Sali a bordo dell'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati la divisa dell'hostess.\n", + /* 16*/ "\n", + /* 17*/ "Travestimento\n", + /* 18*/ "Travestimento\n", + /* 19*/ "Presa divisa dell'hostess.\n", + /* 20*/ "Procurati piani di volo.\n", + /* 21*/ "\n", + /* 22*/ "Piani di volo\n", + /* 23*/ "Piani di volo\n", + /* 24*/ "Presi piani di volo.\n", + /* 25*/ "Attenzione! C' un intruso!\n", + /* 26*/ "Sono stati uccisi troppi civili.\n", + /* 27*/ "Sta bene?\n", + /* 28*/ "Vado a cercare aiuto!\n", + /* 29*/ "Buonasera.\n", + /* 30*/ "Bene, la strada la conosce.\n", + /* 31*/ "Si tolga il cinturone, per favore!\n", + /* 32*/ "Oh, per la miseria!\n", + /* 33*/ "Non sono ammesse armi alla base!\n", + /* 34*/ "Bene, chiamer la sicurezza!\n", + /* 35*/ "Chiusura del sistema in corso...\n", + /* 36*/ "Il sistema di sicurezza stato disattivato.\n", + /* 37*/ "Sono state rilevate delle armi.\n", + /* 38*/ "La valigia stata depositata.\n", + /* 39*/ "La valigia stata esaminata.\n", + /* 40*/ "Ehi! L'accesso a quest'area vietato.\n", + /* 41*/ "ネ la prima volta che viene qui?\n", + /* 42*/ "Ehi! Mi restituisca la valigia.\n", + /* 43*/ "Chiami pure la sicurezza: me la vedr io con loro!\n", + /* 44*/ "Di sopra... c' un intruso.\n", + /* 45*/ "Negato l'accesso alla griglia laser.\n", + /* 46*/ "Sistema a griglie laser in sovraccarico.\n", + /* 47*/ "Vittime ingiustificate.\n", + /* 48*/ "Non devono prendere la cassaforte!\n", + /* 49*/ "Indossato travestimento.\n", + /* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n", + /* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n", + /* 52*/ "Se non fai qualcosa la valigia verr fermata.\n", + /* 53*/ "Cos quello l'Air Force One? Mhm... \n pi piccolo di quanto pensassi.\n", + /* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n", + /* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n", + /* 56*/ "Eccellente, Joanna. Quella navetta il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. ネ scortata da una squadra della base aerea. ネ superfluo ricordarti che...\n", + /* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n", + /* 58*/ "Non sono a conoscenza della misura in cui sisia diffusa la cospirazione all'interno dell' NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n", + /* 59*/ "S e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n", + /* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n", + /* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n", + /* 62*/ "Ucciso personale essenziale alla missione.\n", + /* 63*/ "Distrutto strumento essenziale alla missione.\n", + /* 64*/ "L'entrata alla base stata chiusa.\n", + /* 65*/ "Stiamo decollando!!!\n", + /* 66*/ "Chiuso carrello del velivolo.\n", + /* 67*/ "L'attrezzatura non pu essere depositata.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_s.c b/src/files/lang/pal-beta/cave_str_s.c new file mode 100644 index 000000000..dacf86886 --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos m疽 tarde tras cargarlos a bordo del Air Force One usando un carrito a駻eo. Primero, creo, necesitar疽 encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One est guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENCIAL \nBASE AノREA EE.UU., ALASKA\n", + /* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos m疽 tarde tras cargarlos a bordo del Air Force One usando un carrito a駻eo. Primero, creo, necesitar疽 encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Obtener el disfraz y entrar a la base\n", + /* 6*/ "Facturar el equipo\n", + /* 7*/ "Burlar al sistema monitor de seguridad\n", + /* 8*/ "Obtener los planos de la caja fuerte\n", + /* 9*/ "Abordar el Air Force One\n", + /* 10*/ "Obt駭 la maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obt駭 el uniforme de azafata de vuelo.\n", + /* 16*/ "\n", + /* 17*/ "Disfraz\n", + /* 18*/ "Disfraz\n", + /* 19*/ "Uniforme de azafata obtenido.\n", + /* 20*/ "Obt駭 los planes de vuelo de la caja fuerte.\n", + /* 21*/ "\n", + /* 22*/ "Planes de Vuelo\n", + /* 23*/ "Planes de Vuelo\n", + /* 24*/ "Planes de vuelo obtenidos.\n", + /* 25*/ "Cuidado. Es un intruso...\n", + /* 26*/ "Han muerto civiles inocentes.\n", + /* 27*/ "ソEst bien?\n", + /* 28*/ "Ir para obtener alguna ayuda.\n", + /* 29*/ "Buenas tardes.\n", + /* 30*/ "Muy bien, ya conoce el camino desde aqu.\n", + /* 31*/ "Deber疽 dejar ese arma aqu.\n", + /* 32*/ "。Oh, Dios mo!\n", + /* 33*/ "No se permiten armas en la base.\n", + /* 34*/ "De acuerdo, avisar a seguridad.\n", + /* 35*/ "Cierre del sistema iniciado...\n", + /* 36*/ "Los sistemas de seguridad han sido apagados.\n", + /* 37*/ "Se han detectado armas.\n", + /* 38*/ "La maleta ha sido facturada.\n", + /* 39*/ "La maleta ha sido escaneada.\n", + /* 40*/ "Hey, t: 駸ta es un 疵ea restringida.\n", + /* 41*/ "ソEres nueva por aqu?\n", + /* 42*/ "Hey. Devu駘veme mi maleta.\n", + /* 43*/ "Trae a seguridad, yo me encargo de ella...\n", + /* 44*/ "Arriba... hay un intruso.\n", + /* 45*/ "Acceso a la rejilla de l疽er denegado.\n", + /* 46*/ "Sistema de rejilla de l疽er sobrecargado.\n", + /* 47*/ "Demasiados civiles heridos.\n", + /* 48*/ "Detenles antes de que abran la caja fuerte...\n", + /* 49*/ "Disfraz puesto.\n", + /* 50*/ "。ノsta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n", + /* 51*/ "Usa la maleta para ocultar tu equipo.\n", + /* 52*/ "La maleta ser detenida a menos que hagas algo.\n", + /* 53*/ "ソAs que ese es el Air Force One? ... Huh, es m疽 \npequeo de lo que pensaba.\n", + /* 54*/ "Detenlos: est疣 accediendo a la caja fuerte...\n", + /* 55*/ "Agente Dark en posicin. Puedo ver la entrada principal de la base, y distingo el punto de llegada del telef駻ico.\n", + /* 56*/ "Excelente, Joanna. Ese telef駻ico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulacin entrar hace un minuto. Est siendo escoltada por tropas de la base a駻ea. No debo recordarte que probablemente...\n", + /* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequea trama de Trent. Y que no puedo dispararles aunque ellos me disparen a m. ソQu pasa con los agentes de la ANS?\n", + /* 58*/ "No s cu疣 lejos ha llegado la conspiracin a trav駸 de la ANS, pero podra apostar a que los hombres que Trent ha situado por aqu son leales a su plan y a 駘 mismo. Debes encontrar evidencias de la traicin de Trent en el Air Force One y ense疵selas al Presidente.\n", + /* 59*/ "S, y protegerle de sus secuestradores. ソTienes alguna idea sobre de qu puede tratar el plan de Trent, y qu pasa con esos chicos rubios?\n", + /* 60*/ "Slo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n", + /* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n", + /* 62*/ "Personal crtico de la misin eliminado.\n", + /* 63*/ "Objeto crtico de la misin destruido.\n", + /* 64*/ "Entrada a la base asegurada.\n", + /* 65*/ "。。Nos ocupamos nosotros!!\n", + /* 66*/ "El telef駻ico ha sido derribado.\n", + /* 67*/ "El equipo no puede ser registrado.\n", +}; diff --git a/src/files/lang/pal-beta/cradE.c b/src/files/lang/pal-beta/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cradJ.c b/src/files/lang/pal-beta/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cradP.c b/src/files/lang/pal-beta/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_f.c b/src/files/lang/pal-beta/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_g.c b/src/files/lang/pal-beta/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_i.c b/src/files/lang/pal-beta/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_s.c b/src/files/lang/pal-beta/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crypE.c b/src/files/lang/pal-beta/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crypJ.c b/src/files/lang/pal-beta/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crypP.c b/src/files/lang/pal-beta/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_f.c b/src/files/lang/pal-beta/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_g.c b/src/files/lang/pal-beta/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_i.c b/src/files/lang/pal-beta/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_s.c b/src/files/lang/pal-beta/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/damE.c b/src/files/lang/pal-beta/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-beta/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-beta/damJ.c b/src/files/lang/pal-beta/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/pal-beta/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/damP.c b/src/files/lang/pal-beta/damP.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-beta/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_f.c b/src/files/lang/pal-beta/dam_str_f.c new file mode 100644 index 000000000..166cefac8 --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoqua des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - S馗uriser labos et donn馥s de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. S馗urisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 1*/ "Vaisseau Cetan\n", + /* 2*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoqua des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoqua des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "D駸activer GPS et Auto-pilote\n", + /* 6*/ "D駸activer source d'駭ergie principale\n", + /* 7*/ "S馗uriser labos et donn馥s de recherche\n", + /* 8*/ "Activer l'ascenseur du sas\n", + /* 9*/ "Retrouver Elvis et s'enfuir avec lui\n", + /* 10*/ "On sabote les moteurs et le vaisseau \nd駻ivera... Parfait!\n", + /* 11*/ "Le sous-marin doit 黎re contrl d'ici.\n", + /* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'駘oignera de la station.\n", + /* 13*/ "Ils ne pourront plus continuer l'op駻ation \nsans 駭ergie.\n", + /* 14*/ "Syst鑪e auto-pilote d駸activ.\n", + /* 15*/ "Syst鑪e GPS d駸activ.\n", + /* 16*/ "Objet crucial d騁ruit.\n", + /* 17*/ "Porte de commande d'arr黎 du r饌cteur ouverte.\n", + /* 18*/ "R饌cteur d駸activ.\n", + /* 19*/ "Centre de contrle de plong馥 localis.\n", + /* 20*/ "Personnel crucial abattu.\n", + /* 21*/ "Donn馥s de recherche s馗uris馥s.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disque de recherche\n", + /* 25*/ "Un disque de recherche\n", + /* 26*/ "Disque de recherche obtenu.\n", + /* 27*/ "Personnel crucial abattu.\n", + /* 28*/ "Porte ascenseur d騅errouill馥.\n", + /* 29*/ "Ascenseur activ.\n", + /* 30*/ "Op駻ation refus馥 - portes du hangar ferm馥s.\n", + /* 31*/ "S駲uence de d騅errouillage r駟nitialis馥.\n", + /* 32*/ "Vas-y. Je s馗urise le p駻im鑼re.\nOn se retrouve plus tard.\n", + /* 33*/ "Elvis a 騁 abattu.\n", + /* 34*/ "Qu'est-ce que tu faisais? Suis-moi...\nOn d馗ampe.\n", + /* 35*/ "Des civils ont 騁 abattus.\n", + /* 36*/ "Objet crucial d騁ruit.\n", + /* 37*/ "Alarme activ馥.\n", + /* 38*/ "Alarme d駸activ馥.\n", + /* 39*/ "Bien. L'op駻ation de plong馥 a 騁 annul馥 la surface.\nIl est temps de piquer une t黎e.\n", + /* 40*/ "J'esp鑽e que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n", + /* 41*/ "On y est all un peu fort, non?\n", + /* 42*/ "Mais non.\n", + /* 43*/ "D饕ranche ce truc.\n", + /* 44*/ "Eteins-moi 軋.\n", + /* 45*/ "Je vais l'騁eindre.\n", + /* 46*/ "Ne me faites pas de mal!\n", + /* 47*/ "Crevez, charognes!\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_g.c b/src/files/lang/pal-beta/dam_str_g.c new file mode 100644 index 000000000..4a52cce6b --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tiefsee-Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungsergebnisse!\n\nWir wollen s舂tliche Informationen, die dataDyne bis dato ber dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker au゚er Gefecht. Vergessen Sie nicht, dass wir sie sp舩er noch verhren wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente fr das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es fr Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 1*/ "Cetanisches Schiff\n", + /* 2*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tiefsee-Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente fr das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es fr Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tiefsee-Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Deaktivieren Sie den Autopiloten!\n", + /* 6*/ "Setzen Sie den Generator au゚er Kraft!\n", + /* 7*/ "Sichern Sie die Daten!\n", + /* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n", + /* 9*/ "Flchten Sie gemeinsam mit Elvis!\n", + /* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n", + /* 11*/ "Von hier aus wird das Schiff gesteuert.\n", + /* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n", + /* 13*/ "Das Schiff wird ohne Stromzufuhr vllig \nnavigationsunf臧ig sein.\n", + /* 14*/ "Autopilot wurde deaktiviert.\n", + /* 15*/ "GPS-System wurde deaktiviert.\n", + /* 16*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 17*/ "Reaktor-Kontrollkonsole geffnet.\n", + /* 18*/ "Reaktor wurde abgeschaltet.\n", + /* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n", + /* 20*/ "Wichtige Person neutralisiert.\n", + /* 21*/ "Forschungsdaten wurden gesichert.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Sicherungsdiskette\n", + /* 25*/ "Eine Sicherungsdiskette\n", + /* 26*/ "Sicherungsdiskette aufgenommen.\n", + /* 27*/ "Wichtige Personen wurden neutralisiert.\n", + /* 28*/ "Aufzugstr wurde entriegelt.\n", + /* 29*/ "Aufzug wurde aktiviert.\n", + /* 30*/ "Unzul舖sige Operation - Die Hangartren sind noch geschlossen.\n", + /* 31*/ "Entriegelungssequenz wurde abgebrochen.\n", + /* 32*/ "Du gehst voraus, Jo. Ich sichere das Gel舅de. \nWir treffen uns sp舩er.\n", + /* 33*/ "Elvis wurde neutralisiert.\n", + /* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschssel verschwinden.\n", + /* 35*/ "Zivile Verluste!!!\n", + /* 36*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 37*/ "Alarm wurde aktiviert.\n", + /* 38*/ "Alarm wurde deaktiviert.\n", + /* 39*/ "Korrekt. Die Operation wurde an der Oberfl臘he unterbrochen.\nZeit fr ein wenig Badevergngen.\n", + /* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n", + /* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n", + /* 42*/ "Ach, stell Dich nicht so m臈chenhaft an!\n", + /* 43*/ "Zieh den Stecker raus!\n", + /* 44*/ "Schalte das Ding ab!\n", + /* 45*/ "Ich schalte es ab.\n", + /* 46*/ "Bitte tu mir nichts.\n", + /* 47*/ "Jetzt seid ihr dran, Verr舩er.\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_i.c b/src/files/lang/pal-beta/dam_str_i.c new file mode 100644 index 000000000..5adef333a --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington - \n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano l: li interrogheremo pi tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se viene disattivato solo uno dei due, non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiver il pilota automatico dell'unit sommergibile minore, richiamandola affinch tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 1*/ "Astronave Cetan\n", + /* 2*/ "|Situazione - \n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington - \n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se viene disattivato solo uno dei due, non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiver il pilota automatico dell'unit sommergibile minore, richiamandola affinch tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington - \n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se viene disattivato solo uno dei due, non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il GPS e il pilota automatico\n", + /* 6*/ "Disattiva la fonte d'energia primaria\n", + /* 7*/ "Chiudi a chiave i laboratori\n", + /* 8*/ "Attiva il sollevatore del Moon Pool\n", + /* 9*/ "Incontro e fuga con Elvis\n", + /* 10*/ "Disattivando il motore il sottomarino\n andr alla deriva... Perfetto!\n", + /* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n", + /* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontaner dalla sua posizione.\n", + /* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n", + /* 14*/ "Disattivato pilota automatico.\n", + /* 15*/ "Disattivato sistema GPS.\n", + /* 16*/ "Distrutto strumento essenziale alla missione.\n", + /* 17*/ "Aperto sportello comandi del reattore.\n", + /* 18*/ "Disattivato il reattore.\n", + /* 19*/ "Localizzato centro di comando immersione.\n", + /* 20*/ "Ucciso personale essenziale alla missione.\n", + /* 21*/ "I dati di ricerca sono al sicuro.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco dati di ricerca\n", + /* 25*/ "Disco dati di ricerca\n", + /* 26*/ "Preso disco dati di ricerca.\n", + /* 27*/ "Ucciso personale essenziale alla missione.\n", + /* 28*/ "Aperta porta sollevatore.\n", + /* 29*/ "Attivato sollevatore.\n", + /* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n", + /* 31*/ "La sequenza di sblocco stata resettata.\n", + /* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 33*/ "Elvis stato ucciso.\n", + /* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n", + /* 35*/ "Uccisi dei civili.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Attivato allarme.\n", + /* 38*/ "Disattivato allarme.\n", + /* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n", + /* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n", + /* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n", + /* 42*/ "Ma va l!!!\n", + /* 43*/ "E ora stacca la spina!\n", + /* 44*/ "Spegni 'sto coso!\n", + /* 45*/ "Ora lo chiudo!\n", + /* 46*/ "Non farmi del male!\n", + /* 47*/ "Crepa, traditore!\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_s.c b/src/files/lang/pal-beta/dam_str_s.c new file mode 100644 index 000000000..c8e1be261 --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigacin\n\nQueremos cualquier informacin que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los cientficos y t馗nicos que all trabajan; queremos interrogarles m疽 tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activar el piloto autom疸ico del sumergible de profundidad, tray駭dolo de vuelta para que lo us駟s Elvis y t. Los controles est疣 en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 1*/ "Nave Cetan\n", + /* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activar el piloto autom疸ico del sumergible de profundidad, tray駭dolo de vuelta para que lo us駟s Elvis y t. Los controles est疣 en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar GPS y piloto autom疸ico\n", + /* 6*/ "Desactivar fuente primaria de energa\n", + /* 7*/ "Asegurar laboratorios y datos\n", + /* 8*/ "Activar el ascensor de la piscina\n", + /* 9*/ "Encontrar y escapar con Elvis\n", + /* 10*/ "Estropea los motores y la nave ir \na la deriva... 。Perfecto!\n", + /* 11*/ "Desde aqu se debe controlar el submarino.\n", + /* 12*/ "Sin el piloto autom疸ico y el GPS, la nave \ndeambular fuera de la estacin.\n", + /* 13*/ "No podr疣 realizar ninguna operacin \nsin energa.\n", + /* 14*/ "El sistema de piloto autom疸ico ha sido desactivado.\n", + /* 15*/ "El sistema GPS ha sido desactivado.\n", + /* 16*/ "Objeto crtico de la misin destruido.\n", + /* 17*/ "Escotilla del control de apagado del reactor abierta.\n", + /* 18*/ "El reactor ha sido apagado.\n", + /* 19*/ "El centro de control de buceo ha sido localizado.\n", + /* 20*/ "Ha muerto personal crtico de la misin.\n", + /* 21*/ "Datos de investigacin asegurados.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco de datos de investigacin\n", + /* 25*/ "Un disco de datos de investigacin\n", + /* 26*/ "Disco de datos de investigacin obtenido.\n", + /* 27*/ "Ha muerto personal crtico de la misin.\n", + /* 28*/ "La puerta del ascensor ha sido abierta.\n", + /* 29*/ "El ascensor ha sido activado.\n", + /* 30*/ "Operacin denegada: puertas del hangar todava cerradas.\n", + /* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n", + /* 32*/ "Ve delante, Joanna. Asegurar el permetro. \nNos vemos m疽 tarde.\n", + /* 33*/ "Elvis ha muerto.\n", + /* 34*/ "Joanna... ソPor qu has tardado tanto? Sgueme. \nSalgamos de esta vieja baera.\n", + /* 35*/ "Han muerto civiles.\n", + /* 36*/ "Objeto crtico de la misin destruido.\n", + /* 37*/ "La alarma ha sido activada.\n", + /* 38*/ "La alarma ha sido desactivada.\n", + /* 39*/ "Correcto. La operacin de buceo ha sido desbaratada en la superficie. \nEs la hora del bao.\n", + /* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n", + /* 41*/ "ソPiensas que fuimos un poquito torpes?\n", + /* 42*/ "Nooohhhh.\n", + /* 43*/ "Tira del enchufe ahora.\n", + /* 44*/ "Apaga esa cosa.\n", + /* 45*/ "Lo apagar.\n", + /* 46*/ "Por favor, no me hagas dao.\n", + /* 47*/ "Morid, traidores...\n", +}; diff --git a/src/files/lang/pal-beta/depoE.c b/src/files/lang/pal-beta/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-beta/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-beta/depoJ.c b/src/files/lang/pal-beta/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/pal-beta/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/pal-beta/depoP.c b/src/files/lang/pal-beta/depoP.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-beta/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_f.c b/src/files/lang/pal-beta/depo_str_f.c new file mode 100644 index 000000000..f6f729fb1 --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - D駸activer le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble emp鹹he tout syst鑪e d'enregistrement de fonctionner. Une fois coup馥, la Camspy pourra transmettre les donn馥s au QG.\n\n|Objectif 2: - D駸activer les syst鑪es de grilles laser\n\nUn examen du tableau 駭erg騁ique du b穰iment G5 indique la pr駸ence d'un r駸eau de grilles laser. Celles-ci sont plac馥s pour barrer la route vers la salle de r騏nion. D駸activez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit pr駸erv馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 1*/ "IMMEUBLE G5\n", + /* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - D駸activer les syst鑪es de grille laser\n\nUn examen du tableau 駭erg騁ique du b穰iment G5 indique la pr駸ence d'un r駸eau de grilles laser. Celles-ci sont plac馥s pour barrer la route vers la salle de r騏nion. D駸activez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit pr駸erv馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit pr駸erv馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "D駸activer le champ d'isolement\n", + /* 10*/ "D駸activer les syst鑪es de grilles laser\n", + /* 11*/ "Holographier les conspirateurs\n", + /* 12*/ "R馗up駻er la sauvegarde dans le coffre\n", + /* 13*/ "Sortir de l'immeuble\n", + /* 14*/ "Obtenir carte alpha.\n", + /* 15*/ "Garde: \n", + /* 16*/ "Carte Niveau 1\n", + /* 17*/ "Carte du garde\n", + /* 18*/ "Carte du garde obtenue.\n", + /* 19*/ "Obtenir carte alpha.\n", + /* 20*/ "Garde: \n", + /* 21*/ "Carte Niveau 2\n", + /* 22*/ "Carte du garde\n", + /* 23*/ "Carte du garde obtenue.\n", + /* 24*/ "Objet crucial d騁ruit.\n", + /* 25*/ "G駭駻ateur champ d'isolement coup.\n", + /* 26*/ "G駭駻ateur ne peut 黎re rallum.\n", + /* 27*/ "Unit grilles laser coup馥.\n", + /* 28*/ "Unit grilles laser activ馥.\n", + /* 29*/ "Tous syst鑪es grilles laser coup駸.\n", + /* 30*/ "Obtenir cassette DAT.\n", + /* 31*/ "Dr. Caroll: \n", + /* 32*/ "Disque sauvegarde\n", + /* 33*/ "Disque sauvegarde\n", + /* 34*/ "Disque sauvegarde obtenu.\n", + /* 35*/ "D馗odeur porte fix sur panneau d'acc鑚.\n", + /* 36*/ "Commandes piratages lanc馥s.\n", + /* 37*/ "D馗odage porte achev - porte d騅errouill馥.\n", + /* 38*/ "ALERTE INTRUSION - s馗urit dans l'abri.\n", + /* 39*/ "D馗odeur porte plac correctement.\n", + /* 40*/ "D馗odeur porte mal plac.\n", + /* 41*/ "Conspirateurs alert駸.\n", + /* 42*/ "Alarme activ馥.\n", + /* 43*/ "Alarme d駸activ馥.\n", + /* 44*/ "Porte du coffre ferm馥.\n", + /* 45*/ "D馗odeur porte fix.\n", + /* 46*/ "Obtenir explosif porte.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "Explosif porte\n", + /* 49*/ "Explosif porte\n", + /* 50*/ "Explosif porte obtenu.\n", + /* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n", + /* 52*/ "MISSION ACCOMPLIE\n", + /* 53*/ "Mouchard plac correctement.\n", + /* 54*/ "Mouchard mal plac.\n", + /* 55*/ "Obtenir CamSpy.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "CamSpy\n", + /* 58*/ "Une CamSpy\n", + /* 59*/ "CamSpy obtenue.\n", + /* 60*/ "C'est impossible de passer avec tous \nces lasers activ駸.\n", + /* 61*/ "La salle de r騏nion doit 黎re droit devant.\nIl est temps d'utiliser la CamSpy.\n", + /* 62*/ "La combinaison du coffre est tr鑚 complexe.\nLe d馗odeur va mettre plus de temps.\n", + /* 63*/ "Il faut partir maintenant! Je retourne vite 濬nla porte de tout l'heure.\n", + /* 64*/ "Objet crucial d騁ruit.\n", + /* 65*/ "Reculez, Joanna. Nous allons vous ouvrir\nun passage.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "D騁onateur\n", + /* 69*/ "D騁onateur\n", + /* 70*/ "D騁onateur obtenue.\n", + /* 71*/ "CamSpy d騁ruite - abandonner la mission.\n", + /* 72*/ "Nous avons r馗up駻 le Sapiens chez Carrington \net chang son programme. Il n'a plus de \npersonnalit. Cela 騅itera de futurs \nincidents.\n", + /* 73*/ "Cela r馘uira son efficacit. Mon 駲uipe le \nm鈩era au centre. Ils prendront donc \ndes risques inutiles. Vous auriez d \npr騅oir ce d騅eloppement de conscience chez \nle Sapiens.\n", + /* 74*/ "Comment pr騅oir une chose pareille?! \nEt pourquoi suis-je la seule porter \nle chapeau? Et lui alors?\n", + /* 75*/ "Le Pr駸ident a-t-il refus votre demande \nde pr黎 du Pelagic II?\n", + /* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n", + /* 77*/ "Non! J'ai peut-黎re sous-estim son ct \nint鑒re. Mais nous avons un plan de \nsecours. Nous agirons d鑚 que l'駲uipe \npr駸identielle arrivera la base a駻ienne. \nJe n'ai besoin que d'un 馗hantillon de la \npeau du Pr駸ident.\n", + /* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n", + /* 79*/ "Mr. Carrington ne b駭馭iciera d'aucune aide \next駻ieure. L'駲uipement que vous nous \navez offert est install au Nevada et est \nop駻ationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n", + /* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de d騁ruire tout ce qui ne veut pas \nfonctionner. Appliquez-la donc aussi \nvotre 'plan de secours.'\n", + /* 81*/ "Agent Dark au rapport! Pr駱arez-vous \nrecevoir les donn馥s de la r騏nion. \nDemande prioritaire d'une 駲uipe de \nl'Institut pour prot馮er le Pr駸ident \navant son d駱art pour l'Alaska.\n", + /* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tt a 騁 \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, l o les \nrescap駸 et les d饕ris ont d 黎re amen駸. \nRevenez au poste et pr駱arez-vous \npour un d駱art imminent. \nCarrington, termin.\n", + /* 83*/ "Secteur 51? Et le Pr駸ident alors?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_g.c b/src/files/lang/pal-beta/depo_str_g.c new file mode 100644 index 000000000..74469fe1f --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den D舂pfungsfeld-Generator au゚er Kraft!\n\nAuf dem Garagen-Deck des Geb舫des befindet sich eine Vorrichtung, die den Einsatz jeglicher Aufzeichnungsger舩e verhindert. Finden Sie das Ger舩 und schalten Sie es ab! Anschlie゚end sollte der CamSpy die Daten ohne Probleme bermitteln knnen.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Geb舫de zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten knnen, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seines Persnlichkeitsprofils aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|5. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierten Tren, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 1*/ "G5-BUILDING\n", + /* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Geb舫de zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten knnen, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seines Persnlichkeitsprofils aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|4. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierten Tren, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seines Persnlichkeitsprofils aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|3. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierten Tren, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Setzen Sie den Generator au゚er Kraft!\n", + /* 10*/ "Deaktivieren Sie das Laser-Netz!\n", + /* 11*/ "Holografieren Sie die Verschwrer!\n", + /* 12*/ "Stehlen Sie die Sicherheitskopie!\n", + /* 13*/ "Verlassen Sie das Geb舫de!\n", + /* 14*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 15*/ "Level 1 Schlsselkarte\n", + /* 16*/ "der Wache\n", + /* 17*/ "Schlsselkarte der Wache\n", + /* 18*/ "Schlsselkarte der Wache aufgenommen.\n", + /* 19*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 20*/ "Level 2 Schlsselkarte\n", + /* 21*/ "der Wache\n", + /* 22*/ "Schlsselkarte der Wache\n", + /* 23*/ "Schlsselkarte der Wache aufgenommen.\n", + /* 24*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 25*/ "D舂pfungsfeld-Generator wurde abgeschaltet.\n", + /* 26*/ "Der Generator kann nicht wieder gestartet werden.\n", + /* 27*/ "Laser-Netz wurde deaktiviert.\n", + /* 28*/ "Laser-Netz wurde aktiviert.\n", + /* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n", + /* 30*/ "Erlangen Sie das DAT-Tape.\n", + /* 31*/ "Dr. Carolls\n", + /* 32*/ "Sicherheitskopie\n", + /* 33*/ "Sicherheitskopie\n", + /* 34*/ "Sicherheitskopie aufgenommen.\n", + /* 35*/ "Tr-Decoder wurde an der Konsole angebracht.\n", + /* 36*/ "Crack-Routine wurde initiiert.\n", + /* 37*/ "Crack-Vorgang abgeschlossen - Tr wurde entriegelt.\n", + /* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskr臟te sofort ins Kellergescho゚!\n", + /* 39*/ "Tr-Decoder wurde korrekt platziert.\n", + /* 40*/ "Tr-Decoder wurde nicht korrekt platziert.\n", + /* 41*/ "Die Verschwrer wurden alarmiert.\n", + /* 42*/ "Alarm wurde aktiviert.\n", + /* 43*/ "Alarm wurde deaktiviert.\n", + /* 44*/ "Die Safetr ist versperrt.\n", + /* 45*/ "Tr-Decoder wurde angebracht.\n", + /* 46*/ "Erlangen Sie den Sprengsatz.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "Sprengsatz\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Sprengsatz aufgenommen.\n", + /* 51*/ "Zielerreichung unvollst舅dig - MISSION FEHLGESCHLAGEN.\n", + /* 52*/ "MISSION ERFOLGREICH\n", + /* 53*/ "Sender wurde korrekt platziert.\n", + /* 54*/ "Sender wurde nicht korrekt platziert.\n", + /* 55*/ "Erlangen Sie den CamSpy.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "CamSpy\n", + /* 58*/ "Ein CamSpy\n", + /* 59*/ "CamSpy aufgenommen.\n", + /* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n", + /* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit fr den CamSpy.\n", + /* 62*/ "Der Safe-Code ist sehr ausgeklgelt.\nDer Decoder wird etwas mehr Zeit bentigen.\n", + /* 63*/ "Zeit zu gehen! Ich muss zu der Tr, die ich \nvorhin 'pr舊ariert' habe.\n", + /* 64*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Detonator aufgenommen.\n", + /* 71*/ "Der CamSpy wurde zerstrt - Brechen Sie die Mission ab!\n", + /* 72*/ "Wir haben uns den Sapienten von Carrington zurckgeholt \nund sein Programm ver舅dert. Es hat nun keine \nPersnlichkeit mehr. Daher sind auch keine \nweiteren Zwischenf舁le mehr zu befrchten.\n", + /* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie h舩ten \nvoraussehen mssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n", + /* 74*/ "Niemand h舩te das voraussehen knnen! Und ich \nlehne es ab, dafr verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n", + /* 75*/ "Der Pr舖ident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n", + /* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig bersch舩zt haben?\n", + /* 77*/ "Nein! Ich habe nur seine Entschlossenheit untersch舩zt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Sttzpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPr舖identen.\n", + /* 78*/ "Ha! Vorausgesetzt, es gibt keine Strma゚nahmen. \nWenn Carrington eins und eins zusammengez臧lt hat, \ndann ist Verst舐kung schon unterwegs.\n", + /* 79*/ "Carrington wird keine Hilfe von au゚en erhalten. \nDie Technologie, die Sie uns zur Verfgung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit knnen wir jedes Flugzeug vom Himmel holen.\n", + /* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstrt werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n", + /* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nワbertragung der Aufzeichnung vor. Ich beantrage ein \nUntersttzungsteam des Instituts zum Schutz des \nPr舖identen, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorit舩 Eins.\n", + /* 82*/ "Dafr ist nun keine Zeit, Agent Dark. W臧rend \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde ber Nevada abgeschossen. \nDie dafr verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nワberlebende und die Wrackteile gebracht. Bereiten \nSie sich fr die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n", + /* 83*/ "Area 51? Aber was geschieht mit dem Pr舖identen?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_i.c b/src/files/lang/pal-beta/depo_str_i.c new file mode 100644 index 000000000..8d47f1e76 --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington - \n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato la TeleSpia potr trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell' Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Situazione - \n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington - \n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell' Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington - \n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell' Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disattiva generatore segnali di disturbo\n", + /* 10*/ "Disattiva il sistema delle griglie laser\n", + /* 11*/ "Olografa i cospiratori in riunione\n", + /* 12*/ "Prendi copia backup dalla cassaforte\n", + /* 13*/ "Esci dall'edificio\n", + /* 14*/ "Procurati chiave alfa\n", + /* 15*/ "Guardia:\n", + /* 16*/ "Chiave 1ー piano\n", + /* 17*/ "Chiave della guardia\n", + /* 18*/ "Presa chiave della guardia\n", + /* 19*/ "Procurati chiave alfa\n", + /* 20*/ "Guardia:\n", + /* 21*/ "Chiave 2ー piano\n", + /* 22*/ "Chiave della guardia\n", + /* 23*/ "Presa chiave della guardia\n", + /* 24*/ "Distrutto strumento essenziale alla missione\n", + /* 25*/ "Disattivato generatore segnali di disturbo\n", + /* 26*/ "Impossibile riaccendere il generatore\n", + /* 27*/ "Disattivata unit griglie laser\n", + /* 28*/ "Attivata unit griglie laser\n", + /* 29*/ "Disattivati tutti i sistemi griglie laser\n", + /* 30*/ "Procurati nastro DAT\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco di backup \n", + /* 33*/ "Disco di backup\n", + /* 34*/ "Preso disco di backup.\n", + /* 35*/ "Decodificatore porta in azione\n", + /* 36*/ "Decodifica in corso...\n", + /* 37*/ "Decodificatore ha finito: porta aperta.\n", + /* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n", + /* 39*/ "Decodificatore piazzato correttamente\n", + /* 40*/ "Decodificatore in posizione errata\n", + /* 41*/ "Allertati i cospiratori\n", + /* 42*/ "Attivato l'allarme\n", + /* 43*/ "Disattivato l'allarme\n", + /* 44*/ "Bloccata porta di sicurezza \n", + /* 45*/ "Decodificatore in azione\n", + /* 46*/ "Procurati Esplodiporta\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Esplodiporta\n", + /* 49*/ "Esplodiporta\n", + /* 50*/ "Preso Esplodiporta\n", + /* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 52*/ "MISSIONE COMPIUTA\n", + /* 53*/ "Cimice piazzata correttamente\n", + /* 54*/ "Cimice in posizione errata\n", + /* 55*/ "Procurati TeleSpia\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "TeleSpia\n", + /* 58*/ "TeleSpia\n", + /* 59*/ "Presa TeleSpia\n", + /* 60*/ "ネ impossibile passare finch sono \nattivi quei laser.\n", + /* 61*/ "Quella dev'essere la sala riunioni. \nネ ora di usare la TeleSpia.\n", + /* 62*/ "La cassaforte criptata. \nIl decodificatore ci metter un po'.\n", + /* 63*/ "ネ ora di andare! Passiamo per la porta che ho \npredisposto!\n", + /* 64*/ "Distrutto strumento essenziale alla missione.\n", + /* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonatore\n", + /* 69*/ "Detonatore\n", + /* 70*/ "Preso detonatore.\n", + /* 71*/ "Distrutta la TeleSpia - Missione fallita\n", + /* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalit, cos non \navremo pi spiacevoli sorprese.\n", + /* 73*/ "Questo ridurr la sua efficienza. La mia \nsquadra dovr portarlo subito al centro, \nma ci li metter in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n", + /* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n", + /* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n", + /* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n", + /* 77*/ "No! Avr sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ci che mi serve \ndal Presidente un campione di tessuto.\n", + /* 78*/ "S... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avr gi chiamato i rinforzi!\n", + /* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato stata \ninstallata in Nevada ed gi operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n", + /* 80*/ "Ci significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ci che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n", + /* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n", + /* 82*/ "Ora non c' tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo stato abbattuto \nin Nevada. Il colpo stato sparato dall' \nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n", + /* 83*/ "L'Area 51? E che ne sar del Presidente?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_s.c b/src/files/lang/pal-beta/depo_str_s.c new file mode 100644 index 000000000..644f092fb --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Hmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisin de cualquier informacin grabada por la C疥ara Espa. Una vez apagado, la C疥ara Espa puede enviar cualquier grabacin al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla L疽er\n\nUn examen del suministro energ騁ico del Edificio G5 indica una red de rejillas l疽er. Estas rejillas est疣 colocadas especficamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estar limpio.\n\n|Objetivo Tres: - Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla L疽er\n\nUn examen del suministro energ騁ico del Edificio G5 indica una red de rejillas l疽er. Estas rejillas est疣 colocadas especficamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estar limpio.\n\n|Objetivo Dos- Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Desactivar generador de campo hmedo\n", + /* 10*/ "Desactivar sistemas de rejilla l疽er\n", + /* 11*/ "Holografiar reunin de conspiradores\n", + /* 12*/ "Recuperar copia del Dr. Caroll\n", + /* 13*/ "Salir del edificio\n", + /* 14*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 15*/ "Guarda:\n", + /* 16*/ "Llave magn騁ica de Nivel 1\n", + /* 17*/ "Llave Magn騁ica del Guarda\n", + /* 18*/ "Llave Magn騁ica del Guarda obtenida\n", + /* 19*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 20*/ "Guarda:\n", + /* 21*/ "Llave magn騁ica de Nivel 2\n", + /* 22*/ "Llave Magn騁ica del Guarda\n", + /* 23*/ "Llave Magn騁ica del Guarda obtenida\n", + /* 24*/ "Objeto crtico de la misin destruido.\n", + /* 25*/ "Generador de campo hmedo apagado.\n", + /* 26*/ "El generador no puede reiniciarse.\n", + /* 27*/ "Unidad de rejilla l疽er apagada.\n", + /* 28*/ "Unidad de rejilla l疽er activada.\n", + /* 29*/ "Todos los sistemas de rejilla l疽er apagados.\n", + /* 30*/ "Obt駭 la cinta de Datos.\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco de seguridad\n", + /* 33*/ "Disco de seguridad\n", + /* 34*/ "Disco de seguridad obtenido.\n", + /* 35*/ "Decodificador de puertas colocado en el acceso.\n", + /* 36*/ "Iniciando rutinas de apertura.\n", + /* 37*/ "El decodificador de puertas termin: puerta abierta.\n", + /* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n", + /* 39*/ "Decodificador de puertas colocado correctamente.\n", + /* 40*/ "Decodificador de puertas colocado incorrectamente.\n", + /* 41*/ "Los conspiradores han sido alertados.\n", + /* 42*/ "Alarma activada.\n", + /* 43*/ "Alarma desactivada.\n", + /* 44*/ "La puerta de la caja fuerte est cerrada.\n", + /* 45*/ "Decodificador de puertas colocado.\n", + /* 46*/ "Obt駭 el Revienta-puertas.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Revienta-puertas\n", + /* 49*/ "Revienta-puertas\n", + /* 50*/ "Revienta-puertas obtenido.\n", + /* 51*/ "Objetivos incompletos: MISIモN FALLADA.\n", + /* 52*/ "MISIモN CONSEGUIDA\n", + /* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 55*/ "Obt駭 la C疥ara Espa.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "C疥ara Espa\n", + /* 58*/ "Una Cam疵a Espa\n", + /* 59*/ "C疥ara Espa obtenida.\n", + /* 60*/ "No hay ningn camino posible mientras \nesos l疽eres est駭 activos.\n", + /* 61*/ "Eso de ah delante debe ser la sala de reuniones. \nHora de usar la C疥ara Espa.\n", + /* 62*/ "La caja fuerte est duramente encriptada. \nEl decodificador va a tomarse su tiempo.\n", + /* 63*/ "。Hora de irse! Vamos a la puerta que cre \nantes.\n", + /* 64*/ "Objeto crtico de la misin destruido.\n", + /* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonador\n", + /* 69*/ "Detonador\n", + /* 70*/ "Detonador obtenido.\n", + /* 71*/ "La C疥ara Espa ha sido destruida: abortar misin.\n", + /* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programacin. Nunca m疽 tendr \npersonalidad, as no podr haber posibles \nfuturos incidentes.\n", + /* 73*/ "Esto reducir su eficiencia. Mi equipo tendr \nque llevarlo al ncleo por s mismo. Esto les \npondr en peligro. Debas haber anticipado \nque la IA podra desarrollar un problem疸ico \ncdigo moral.\n", + /* 74*/ "。Nadie podra haber predecido eso! 。Y me \nmolesta que me echen la culpa de ello! \nソQu pasa con 駘?\n", + /* 75*/ "ソEl Presidente no ha admitido tu peticin \nde pr駸tamo del Pelagic II?\n", + /* 76*/ "ソNo podra ser que hayas sobreestimado \ntu influencia sobre 駘?\n", + /* 77*/ "。No! Quiz haya menospreciado su resolucin. \nTenemos un plan de contigencia preparado, \ny comenzar tan pronto como el s駲uito presidencial\nllegue a la base a駻ea. Todo lo que necesito del \nPresidente es una muestra de tejido cut疣eo.\n", + /* 78*/ "。Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisar a los refuerzos.\n", + /* 79*/ "No habr ayuda exterior para el Sr. Carrington. \nLa tecnologa que nos diste est instalada en \nNevada y totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n", + /* 80*/ "ソEntonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n", + /* 81*/ "。Agente Dark informando! Preparaos para \nrecibir los datos de la reunin. \nPeticin prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n", + /* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nチrea 51... All es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aqu. Carrington fuera.\n", + /* 83*/ "ソAl チrea 51? ソPero qu pasa con el Presidente?\n", +}; diff --git a/src/files/lang/pal-beta/destE.c b/src/files/lang/pal-beta/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/destJ.c b/src/files/lang/pal-beta/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/destP.c b/src/files/lang/pal-beta/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_f.c b/src/files/lang/pal-beta/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_g.c b/src/files/lang/pal-beta/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_i.c b/src/files/lang/pal-beta/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_s.c b/src/files/lang/pal-beta/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dishE.c b/src/files/lang/pal-beta/dishE.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-beta/dishE.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dishJ.c b/src/files/lang/pal-beta/dishJ.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-beta/dishJ.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dishP.c b/src/files/lang/pal-beta/dishP.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-beta/dishP.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_f.c b/src/files/lang/pal-beta/dish_str_f.c new file mode 100644 index 000000000..b4e1a6449 --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_f.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Prendre la Vision nocturne sur la table pour commencer.\n", + /* 9*/ "Activer la Vision nocturne.\nTrouver l'interrupteur.\nR騁ablir la lumi鑽e.\n", + /* 10*/ "Prendre le r馗epteur sur la table pour commencer.\n", + /* 11*/ "Se tenir pr鑚 du terminal et utiliser le r馗epteur.\n", + /* 12*/ "Il faut tenir le r馗epteur.\n", + /* 13*/ "Connexion 騁ablie...\n", + /* 14*/ "Terminal pirat avec succ鑚.\n", + /* 15*/ "Connexion perdue - trop loin du PC.\n", + /* 16*/ "Prendre la mine CME sur la table pour commencer.\n", + /* 17*/ "Trouver le relais et lancer la mine CME sur le relais.\n", + /* 18*/ "Mine CME mal plac馥.\n", + /* 19*/ "Mine CME plac馥 correctement.\n", + /* 20*/ "Prendre la CamSpy sur la table pour commencer.\n", + /* 21*/ "Trouver PC de salle Info et holographier.\n", + /* 22*/ "Empreinte holographique de PC correcte.\n", + /* 23*/ "Lumi鑽es r饌ctiv馥s.\n", + /* 24*/ "Prendre le d馗odeur porte sur la table pour commencer.\n", + /* 25*/ "Utiliser le d馗odeur sur la porte pour l'ouvrir.\n", + /* 26*/ "Il faut tenir le d馗odeur porte.\n", + /* 27*/ "D馗odeur fix. Commandes de piratage lanc馥s...\n", + /* 28*/ "D馗odage termin. Porte d騅errouill馥.\n", + /* 29*/ "Prendre le pisteur sur la table pour commencer.\n", + /* 30*/ "Trouver le scanner IR gr稍e au pisteur.\n", + /* 31*/ "Scanner IR localis avec succ鑚.\n", + /* 32*/ "Prendre le scanner IR sur la table pour commencer.\n", + /* 33*/ "Trouver la porte secr鑼e gr稍e au scanner IR.\n", + /* 34*/ "Porte secr鑼e localis馥 avec succ鑚.\n", + /* 35*/ "Prendre le scanner rayons X sur la table pour commencer.\n", + /* 36*/ "Trouver interrupteurs cach駸 pour couper grille laser.\n", + /* 37*/ "Toutes les grilles laser sont d駸activ馥s.\n", + /* 38*/ "Prendre le costume sur la table pour commencer.\n", + /* 39*/ "Tromper quelqu'un pour obtenir un occulteur.\n", + /* 40*/ "Occulteur r馗up駻 avec succ鑚.\n", + /* 41*/ "Grille laser 1 d駸activ馥.\n", + /* 42*/ "Grille laser 2 d駸activ馥.\n", + /* 43*/ "Je viens chercher l'駲uipement.\n", + /* 44*/ "Bonjour, Joanna. Alors comme 軋 on se d馮uise?\n", + /* 45*/ "Voil. Ne le faites pas tomber surtout.\n", + /* 46*/ "Occulteur s馗uris avec succ鑚.\n", + /* 47*/ "N'oubliez pas d'utiliser votre costume, d'accord?\n", + /* 48*/ "Il faudra faire mieux que cela, Joanna.\n", + /* 49*/ "Joanna, d'o sortez-vous?\n", + /* 50*/ "La cam駻a vous a rep駻馥.\n", + /* 51*/ "Prendre l'occulteur sur la table pour commencer.\n", + /* 52*/ "Utiliser l'occulteur et localiser Carrington.\n", + /* 53*/ "Aucun doute possible, votre entranement\nest termin!\n", + /* 54*/ "Mission accomplie - Entranement 駲uipement termin!\n", + /* 55*/ "Mission 馗hou馥 - vous 黎es rep駻馥.\n", + /* 56*/ "Choisir le R馗epteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le r馗epteur et rel稍her le bouton A.\n", + /* 57*/ "Choisir la CamSpy.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir la CamSpy et rel稍her le bouton A.\n", + /* 58*/ "Choisir la Vision nocturne.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir Vision nocturne et rel稍her A.\n", + /* 59*/ "Choisir le D馗odeur porte.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le d馗odeur porte et rel稍her le bouton A.\n", + /* 60*/ "Choisir le Scanner rayons X.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le scanner rayons X et rel稍her le bouton A.\n", + /* 61*/ "Choisir le costume.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le costume et rel稍her le bouton A.\n", + /* 62*/ "Choisir le Scanner IR.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le scanner IR et rel稍her le bouton A.\n", + /* 63*/ "Choisir le Pisteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le pisteur et rel稍her le bouton A.\n", + /* 64*/ "Choisir l'Occulteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir l'occulteur et rel稍her le bouton A.\n", + /* 65*/ "Choisir la Mine CME.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir la mine CME et rel稍her le bouton A.\n", + /* 66*/ "Joanna, quel plaisir de vous voir.\n", + /* 67*/ "Suivez-moi, Joanna.\nJe vous emm鈩e aux salles d'entranement.\n", + /* 68*/ "Le centre d'information est derri鑽e cette porte.\n", + /* 69*/ "Ici se trouve le labo d'駲uipement.\n", + /* 70*/ "Par ici se trouve la salle d'entranement et de simulation.\n", + /* 71*/ "Par l se trouve le champ de tir.\n", + /* 72*/ "Ce couloir m鈩e au hangar.\n", + /* 73*/ "CAISSE ANTI-GRAV \nAppuyer sur B pr鑚 de la caisse pour la prendre...\n", + /* 74*/ "Appuyer sur B pour rel稍her une caisse en main.\n", + /* 75*/ "HOVERBIKE \nDeux fois sur B pr鑚 de l'Hoverbike pour l'utiliser...\n", + /* 76*/ "Deux fois sur B pour descendre de l'Hoverbike.\n", + /* 77*/ "OUVRIR PORTES \nAppuyer sur B pr鑚 d'une porte pour l'ouvrir.\n", + /* 78*/ "Le bouton B active aussi un objet proche.\n", + /* 79*/ "ASCENSEURS \nAppuyer sur B pr鑚 de la porte pour appeler l'ascenseur.\n", + /* 80*/ "Sortie impossible pendant un entranement.\n", + /* 81*/ "Code interrupteur 1 obtenu.\n", + /* 82*/ "Code interrupteur 2 obtenu.\n", + /* 83*/ "Code interrupteur 3 obtenu.\n", + /* 84*/ "Code interrupteur 4 obtenu.\n", + /* 85*/ "REGARDER HAUT\n- Appuyer sur C Bas pour regarder en haut.\n", + /* 86*/ "REGARDER BAS\n- Appuyer sur C Haut pour regarder en bas.\n", + /* 87*/ "Holoprogramme 2 termin avec succ鑚.\n", + /* 88*/ "Holoprogramme 4 termin avec succ鑚.\n", + /* 89*/ "Holoprogramme 5 termin avec succ鑚.\n", + /* 90*/ "Garde d駸arm avec succ鑚.\n", + /* 91*/ "Garde neutralis avec succ鑚.\n", + /* 92*/ "D駸armez cette cible mouvante si possible.\n", + /* 93*/ "Assomez la cible - mot-cl: furtivit.\n", + /* 94*/ "Et le dernier garde...\n", + /* 95*/ "S'ACCROUPIR\n- Maintenir R puis appuyer sur C Bas pour s'accroupir.\n", + /* 96*/ "RAMPER\n- Une fois accroupie, maintenir R et appuyer sur C bas.\n", + /* 97*/ "Holoprogramme 3 termin avec succ鑚.\n", + /* 98*/ "Activer tous les interrupteurs.\n", + /* 99*/ "Activer tous les interrupteurs muraux.\n- Faire vite ou ils s'騁eindront tous.\n", + /*100*/ "Examiner les terminaux pour les codes d'acc鑚.\n- Utiliser les codes sur les terminaux muraux.\n", + /*101*/ "Code 1 obtenu.\n", + /*102*/ "Code 2 obtenu.\n", + /*103*/ "Code 3 obtenu.\n", + /*104*/ "Code 4 obtenu.\n", + /*105*/ "Entranement 馗hou - regarder vers l'avant.\n", + /*106*/ "Holoprogramme 1 termin avec succ鑚.\n", + /*107*/ "Combat sans armes - assommer la cible.\n- Appuyer sur Z plusieurs fois pour se battre.\n", + /*108*/ "Essayer maintenant sur une cible mouvante...\n", + /*109*/ "Et maintenant contre une cible offensive.\n", + /*110*/ "Battre tous les ennemis sans subir de d馮穰s.\n", + /*111*/ "Entranement 馗hou - d馮穰s subis.\n", + /*112*/ "Holoprogramme 6 termin avec succ鑚.\n", + /*113*/ "Holoprogramme 7 termin avec succ鑚.\n", + /*114*/ "TERMINAUX\n- Appuyer sur B pr鑚 d'un terminal pour l'utiliser.\n", + /*115*/ "Activer maintenant les terminaux muraux rouges.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "OK, Joanna, je vous laisse vous pr駱arer.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humain (Femelle)\n", + /*127*/ "23 ans 2 mois\n", + /*128*/ "|Fichier IC #027 -\n\nStatut entranement: Complet\nNote entranement: A++\nStatut actuel: Assign馥\n\n|Profil -\n\nBien entran馥 mais sans exp駻ience. Formidables r饌ctions. A l'aise avec un bon nombre d'armes. Adaptation remarquable. Meilleur score l'entranement. A l'origine d'un nouveau syst鑪e de notation. Etant la repr駸entation de l'agent id饌l de l'Institut Carrington, on lui donna le surnom de 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Humain (M稷e)\n", + /*131*/ "28 ans 5 mois\n", + /*132*/ "|Fichier IC #009 -\n\nStatut entranement: Complet\nNote entranement: A+\nStatut actuel: Infiltr饅n\n|Profil -\n\nNotre agent infiltr la plus grande exp駻ience. Tr鑚 habile avec son arme de choix (Magnum). Plus qualifi pour des missions d'infiltration plutt que pour le combat ouvert. Avant Joanna Dark, il d騁enait le meilleur score d'entranement.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humain (M稷e)\n", + /*135*/ "62 ans 8 mois\n", + /*136*/ "|Fichier IC #000 -\n\nStatut entranement: Non disp.\nNote entranement: Non disp.\nStatut actuel: Non disp.\n\n|Profil -\n\nPatriarche scientifique/entrepreneur de g駭ie, fondateur de l'Institut Carrington. Il planifie toutes les missions conduites par ses agents et dirige les op駻ations depuis son bureau par lien direct. Il a un got vestimentaire 騁range.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humain (Femelle)\n", + /*139*/ "39 ans ? mois\n", + /*140*/ "|Notes de l'analyste -\n\nDirectrice de la dataDyne Corp. Fanatique du pouvoir. D騁este recevoir des ordres et perdre l'initiative. Est pr黎e des actes cruels pour 駘iminer toute concurrence. Haine cons駲uente envers Daniel Carrington.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humain (M稷e)\n", + /*143*/ "46 ans ? mois\n", + /*144*/ "|Notes de l'analyste -\n\nDirecteur de la National Security Agency. Est li par une certaine amiti Cassandra De Vries ou partage des int駻黎s/affaires avec cette derni鑽e. Ob駟t Cassandra, dot馥 une personnalit plus dominante que la sienne d駛 colossale. Est la figure de proue d'op駻ations occultes conduites par la NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Le sapiens Caroll (IA)\n", + /*147*/ "6 mois\n", + /*148*/ "|Profil -\n\n Une intelligence artificielle cr鳬e par la dataDyne Corp. gratifi馥 d'un penchant pour la lexicographie et les codes cracker. Il est par chance dot d'une morale, et gr稍e son incroyable intelligence, il a pu pr馘ire les plans de la dataDyne. Sa voix et sa prononciation sont impeccables, renfor軋nt son aspect de docteur en lettres.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (M稷e)\n", + /*151*/ "320 ans\n", + /*152*/ "|Profil -\n\nUn extraterrestre de la race Maian. Il est un 'Protecteur' (garde du corps) de l'ambassadeur Maian en d駱lacement sur la Terre la demande de Daniel Carrington. Les Protecteurs sont tous d'excellents matres d'armes. Elvis adore la Terre, qu'il trouve fascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humain (M稷e)\n", + /*155*/ "20-30 ans\n", + /*156*/ "|Profil -\n\nUn homme blond platine. Tr鑚 grand, il porte des v黎ements blancs et d'habitude un imperm饌ble. Il semble contrler la conspiration impliquant Cassandra et Trent. Telles sont les seules informations recueillies sur ce personnage.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (travesti)\n", + /*159*/ "inconnu\n", + /*160*/ "|Profil mis jour -\n\nUn guerrier Skedar se dissimulant derri鑽e la projection holographique d'un homme blond d'une vingtaine d'ann馥s. Un modulateur vocal donne au Skedar une voix pr馗ise, convaincante et intelligente. Cet appareil de propagande Skedar est assez subtile pour fonctionner merveille.\n", + /*161*/ "Le Pr駸ident des Etats-Unis\n", + /*162*/ "Humain (M稷e)\n", + /*163*/ "50 ans\n", + /*164*/ "|Profil -\n\nUn Afro-Am駻icain de bonne 馘ucation, tr鑚 intelligent et perspicace. Il tente constamment de faire le bien mais il est malheureusement conseill par des gens comme Trent Easton. Il pense matriser Trent depuis qu'il lui a refus le Pelagic II pour la dataDyne Corp. Il ne b駭馭icie pas d'une grande popularit: on suppose, peut-黎re tort, que la majorit politique a tout contrle sur lui.\n", + /*165*/ "Maians\n", + /*166*/ "Les Maians sont les extraterrestres connus sur Terre sous le nom de 'Petits Gris'. Ils observent la Terre depuis longtemps (plusieurs si鐵les) et ayant d騁ect chez les humains un certain potentiel, ils appr馗ient notre monde et en sont les g駭駻eux m馗鈩es. Leur contact sur Terre est Daniel Carrington. Un contact politique officiel reste encore 騁ablir.\n", + /*167*/ "Guerrier Skedar\n", + /*168*/ "Les Skedars sont des guerriers extraterrestres qui ont combattu les Maians pendant des si鐵les jusqu'au r馗ent cessez-le-feu. Ils utilisent de colossales armures m馗aniques pour se d駱lacer et combattre: ils sont en fait de petite taille et ressemblent des reptiles. Etant tr鑚 agressifs, la guerre est leur religion et ils y sont tous d騅ou駸.\n", + /*169*/ "Briefing\n", + /*170*/ "Il y a des millions d'ann馥s, un croiseur d'une puissance colossale fut sabord dans l'Oc饌n Pacifique par une race extraterrestre, les Cetans. Il 騁ait 駲uip d'une arme jamais utilis馥: un d馗oupleur nucl饌ire, pouvant en th駮rie briser les liens entre les mol馗ules. Pour que les t駑oins croient la destruction du vaisseau, une balise fut envoy馥 vers la plan鑼e m鑽e, et ils d騁ruisirent les sondes couvrant le syst鑪e solaire dans lequel ils d馗id鑽ent de se cacher.\n\nLes Maians d馗ouvrirent des signes de vie sur Terre. Bien que disposant d'un certain potentiel, les humains primitifs ne furent pas contact駸: les Maians d馗id鑽ent d'attendre qu'ils se d騅eloppent.\n\nLes Maians rencontr鑽ent les Skedars et s'enlis鑽ent dans un conflit sans fin. Apr鑚 des centaines d'ann馥s de guerre, ils arriv鑽ent finalement une paix fragile. Les fanatiques skedar 駱rouvent constamment la r駸istance de cette paix en se livrant des activit駸 terroristes, mais les Maians refusent de se laisser entraner.\n\nLes Maians se m馭ient des humains, conscients que de trop nombreuses crises sont survenues sur Terre cause de conflits technologiques et de malentendus. Ils craignent que l'annonce de leur pr駸ence n'entrane d'autres conflits sur la plan鑼e. Ils ont donc d馗id d'observer la race humaine jusqu' ce qu'elle devienne plus mature.\n\nDaniel Carrington anticipa le cours des 騅鈩ements en contactant un vaisseau maian en orbite autour de la Terre. Il avait un plan qui aiderait humains et Maians, en acc駘駻ant la prise de contact entre les deux peuples. Les Maians, qui trouv鑽ent le plan judicieux et Carrington honn黎e, aid鑽ent ce dernier diffuser leur technologie sur Terre.\n\nLes Skedars fanatiques trouv鑽ent la sonde messag鑽e provenant du croiseur Cetan. Ils envoy鑽ent imm馘iatement des 馗laireurs sur Terre pour enqu黎er de fa輟n brutale, kidnappant les gens et mutilant les animaux dans leur tentative de r馗up駻ation du croiseur. Leur enqu黎e les m鈩e dans l'Oc饌n Pacifique, o ils localisent le vaisseau. Cependant, ils ont besoin d'aide pour y acc馘er.\n\nIls m鈩ent leur propre 騁ude de la Terre et 騁ablissent une liste des soci騁駸 qui poss鐡ent les ressources n馗essaires pour les aider retrouver le vaisseau sabord. En t黎e de cette liste figure la dataDyne Corporation. Ils prennent contact avec le P-DG de la corporation, Cassandra De Vries et lui font une proposition qui semble trop belle pour 黎re honn黎e - ce qui est vrai. En 馗hange d'une aide pour sortir'leur' vaisseau de l'oc饌n, ils donneront la dataDyne assez de technologie pour en faire la plus importante corporation sur Terre. Tout ce que la dataDyne doit faire est de construire une intelligence artificielle avec des capacit駸 linguistiques et de d馗odage. La dataDyne se met donc au travail.\n\nCassandra De Vries contacte Trent Easton, le dirigeant de la NSA, et lui expose les d騁ails. Il tente d'obtenir l'approbation du Pr駸ident pour le pr黎 d'un b穰iment de recherche oc饌nique la dataDyne mais 馗houe. Il n'existe aucun moyen pour les Skedars ou la dataDyne de voler le bateau sans provoquer la col鑽e du gouvernement am駻icain. Ils con輟ivent donc un nouveau plan : remplacer le Pr駸ident par un clone sous leur contrle Cela promet Easton et De Vries une r馗ompense suppl駑entaire une fois l'op駻ation skedar termin馥.\n\nCependant, ils ne disposent pas de beaucoup de temps pour se r駛ouir puisque les Skedars ont l'intention de tester le d馗oupleur nucl饌ire sur la Terre avant d'annihiler les Maians. Mais Cassandra, aveugl馥 par la possibilit de gagner autant de pouvoir, ne pense m麥e pas l'騅entualit de se faire doubler. Il en va de m麥e pour Trent.\n\nMais la dataDyne cr馥 la seule chose qui puisse pr騅oir l'apparition de tels dangers en analysant le flot d'informations dont elle dispose. Cette cr饌tion, c'est l'IA mise au point pour craquer les codes du croiseur cetan. Lorsque l'IA exprime ses inqui騁udes quant cette mission, De Vries ordonne que l'on modifie sa personnalit. En d'autres termes, la cr饌tion pense trop. D駸esp駻馥, l'IA - sous le pseudonyme du Dr. Caroll - contacte l'Institut Carrington pour demander de l'aide.\n", + /*171*/ "L'histoire\n", + /*172*/ "Joanna Dark, agent novice, se voit confier une mission d'extraction. Elle doit aider un savant s'馗happer d'un complexe scientifique de haute s馗urit, situ sous l'immeuble de la dataDyne. Elle est surprise de d馗ouvrir que le Dr. Caroll est en fait une IA cr鳬e par la dataDyne mais poursuit n饌nmoins sa mission de sauvetage. L'alarme donn馥, Joanna doit se frayer un chemin jusqu' l'h駘iport au sommet de la tour, afin de s'enfuir par la voie des airs.\n\nEn r駱onse cette agression, la dataDyne capture Daniel Carrington deux jours plus tard et le retient en otage dans sa propre villa. La corporation r馗lame en 馗hange le retour de leur IA, leur 'propri騁'. Mais ce qu'ils ne savent pas, c'est que l'IA se trouve dans la villa, o Carrington discutait avec elle des plans de la dataDyne. Joanna d駘ivre Daniel, mais ne peut emp鹹her la dataDyne de r馗up駻er le Dr. Caroll. L'IA en a cependant assez dit Carrington pour que celui-ci convoque sur Terre un groupe de sp馗ialistes maians.\n\nJoanna est envoy馥 Chicago pour espionner les conspirateurs dans l'immeuble du G5, une fa軋de de la dataDyne Corp. Elle apprend l'implication de Trent Easton, directeur de la NSA et celle de l'騁range homme d'origine nordique qui semble tout contrler. Une fois le plan concernant le Pr駸ident r騅駘 par Trent, Joanna rapporte la situation, mais d馗ouvre qu'il y a quelque chose de plus urgent accomplir en premier lieu.\n\nLes sp馗ialistes ont 騁 intercept駸 par les conspirateurs. Les survivants du crash et l'駱ave ont 騁 transport駸 dans le Secteur 51, dans le Nevada. Joanna est largu馥 dans le secteur afin de contacter un autre agent de l'Institut Carrington, de secourir d'騅entuels survivants et de retrouver leur 駲uipement. Lorsqu'elle p駭鑼re dans le labo, Joanna d馗ouvre le secret de l'Institut : ses alli駸 sont des Maians, les extraterrestres connus sous le nom de Petits Gris. L'extraterrestre qu'elle sauve s'appelle Elvis. Il 騁ait garde du corps de l'ambassadeur qui 騁ait la t黎e de l'駲uipe de sp馗ialistes.\n\nApr鑚 avoir aid les survivants de la d駘馮ation Maian, Joanna peut s'occuper des plans de la dataDyne concernant le Pr駸ident. Elle se fait passer pour un membre de l'entourage du Pr駸ident pour acc馘er la base a駻ienne o Air Force One est stationn. Elle r騏ssit ensuite se cacher bord de l'avion. Une fois en vol, Trent et les Skedars occult駸 se manifestent, mais Joanna est l pour les arr黎er. Elle escorte le Pr駸ident jusqu' la capsule de sauvetage, tandis que des hommes de Trent parcourent l'avion la recherche du Pr駸ident. Ils d駸irent entraner ce dernier bord de l'OVNI skedar, arrim AF1 par une passerelle amovible. Joanna endommage la passerelle, mais ne parvient pas la d騁ruire. Elle appelle Elvis la rescousse et celui-ci d馗ide de s'馗raser sur Air Force One. La capsule de sauvetage est 駛ect馥 et les trois appareils s'馗rasent dans le d駸ert glac de l'Alaska.\n\nJoanna reprend connaissance et essaie de faire son rapport, mais elle s'aper輟it que sa communication est brouill馥 par une transmission provenant de l'appareil skedar. Elle se met en route dans la neige pour retrouver le Pr駸ident et Elvis. Elle rencontre des escouades de Skedars occult駸 qui recherchent le Pr駸ident, Elvis, elle-m麥e et certaines possessions du Pr駸ident. Elle suit un groupe jusqu'au vaisseau skedar abattu, o elle d馗ouvre un clone du Pr駸ident. Elle le d騁ruit et coupe le brouilleur, puis appelle la cavalerie. Les plans skedar ont 騁 d駛ou駸 une fois de plus, le Pr駸ident est sauf et Trent est ex馗ut de fa輟n atroce par les Skedars pour son incomp騁ence.\n\nAu m駱ris de toute prudence, la dataDyne et les Skedar s'emparent du Pelagic II - le b穰iment d'騁udes oc饌niques du gouvernement - et se dirigent vers le lieu o se trouve le vaisseau cetan. Joanna et Elvis s'introduisent bord du bateau pour y semer le d駸ordre et d馗ouvrir quel est le grand projet. Apr鑚 avoir sabot les op駻ations de plong馥 et rappel le sous-marin, ils plongent vers les profondeurs de l'oc饌n, o ils aper輟ivent le croiseur cetan pour la premi鑽e fois. Ils p駭鑼rent dans le vaisseau via le passage ouvert par les Skedars et tombent sur un guerrier skedar mort... Apparemment, l'escouade d'assaut n'a pas eu la partie facile. Apr鑚 avoir combattu les Skedars et 騅it les Cetans, Joanna et Elvis atteignent le coeur du vaisseau. L, ils d馗ouvrent l'IA qui 騁ait le Dr. Caroll. Une fois sa personnalit駻estaur馥, le Dr. Caroll presse Joanna et Elvis de quitter le vaisseau, qu'il a l'intention de d騁ruire une bonne fois pour toutes.\n\nDe retour l'Institut Carrington, Joanna est sur le point de partir un cocktail pr駸identiel la Maison Blanche lorsque l'enfer se d馗hane. Les survivants de l'駲uipe d'assaut skedar lib鑽ent leur vengeance sur les responsables de leur 馗hec. Joanna parcourt l'Institut en essayant d'escorter un maximum d'employ駸 vers les hangars, tandis que les Skedars attaquent diff駻entes parties du b穰iment. Tandis que la majorit des employ駸 quittent les lieux, Joanna retient les Skedars avant de se faire assommer et capturer.\n\nElle se r騅eille dans une pi鐵e bord du croiseur Skedar avec Cassandra comme compagnon de cellule. Cette derni鑽e se sacrifie pour permettre Joanna de s'馗happer. Elle parvient abaisser les boucliers des zones d'amarrage et Elvis arrive avec quelques amis pour une petite partie de tir aux pigeons.\n\nLe vaisseau captur se place en orbite autour de la plan鑼e o se trouve l'Autel de Bataille skedar. Elvis est abasourdi : les Maians n'ont jamais r騏ssi trouver cet endroit, le saint des saints des Skedars. Si l'Autel 騁ait d騁ruit, cela an饌ntirait le moral des Skedars et une v駻itable paix pourrait 黎re instaur馥 la place d'un cessez-le-feu instable. Joanna se charge du chef des Skedar, le Grand Pr黎re de l'Autel de Bataille tandis qu'Elvis retourne au croiseur pour contacter la flotte Maian.\n\nL'histoire se termine avec le temple en ruine... Elvis demande un r駱it dans le bombardement afin de pouvoir trouver Joanna. Elle est vivante, coinc馥 sous des gravats et retenue par un Skedar accroch sa jambe. Elvis lui tend une arme pour convaincre le Skedar de la laisser partir. Les deux h駻os quittent ensuite la plan鑼e.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ " La corporation tentaculaire qu'est devenue dataDyne a commenc dans la programmation d'IA Lorsqu'il devint 騅ident que la plupart de leurs revenus provenaient de leur travail pour l'arm馥 am駻icaine, une jeune directrice aux dents longues, Cassandra De Vries, se mit traiter avec des fabricants d'armes et ignorer les offres de collaboration de Daniel Carrington et de l'Institut, pour la programmation quantique et la recherche sur les IA. Apr鑚 le rachat par dataDyne de la troisi鑪e corporation d'armement, les b駭馭ices devinrent astronomiques. Dans le mois qui suivit la r馗eption d'un contrat gouvernemental d'armement, Cassandra De Vries fut nomm馥 PDG une part importante des b駭馭ices furent inject駸 dans la recherche sur les IA, avec d'excellents r駸ultats.\n", + /*175*/ "Institut Carrington\n", + /*176*/ "Bri钁ement consid駻 comme un inventeur cingl, Daniel Carrington fut le premier diffuser la technologie anti-gravit dans le monde. Les revenus g駭駻駸 par cette nouvelle technologie et ses d駻iv駸 l'ont aid cr馥r l'Institut Carrington, un r駸ervoir des connaissances technologiques situ dans une partie recul馥 des USA. Mais l'Institut est 馮alement une base d'entranement pour ses agents, qui sont envoy駸 travers le monde pour suivre les d騅eloppements technologiques, pour des raisons connues de Carrington uniquement.\n", + /*177*/ "Description\n- Une minuscule cam駻a contrlable distance, parfaite pour l'exploration furtive. Elle est 駲uip馥 pour l'holographie spectroscopique. Elle peut ouvrir les portes en projetant une zone de chaleur de forme humaine.\n\nInstructions d'entranement\n- Prenez un hologramme du terminal informatique dans la salle Info voisine.\n\nManipulation\n- Appuyez sur le Bouton Z pour prendre un hologramme. Appuyez sur le Bouton B pour ouvrir n'importe quelle porte. Maintenez le Bouton R appuy pour regarder autour de vous.\n", + /*178*/ "Description\n- Amplifie la lumi鑽e ambiante pour fournir une image de la zone. R騅鑞e 馮alement les formes de vie. L'utilisation avec une luminosit normale entrane des surtensions, qui 'blanchissent' l'affichage.\n\n Instructions d'entranement\n- D駱lacez-vous dans le noir, trouvez l'interrupteur et actionnez-le pour faire revenir la lumi鑽e.\n\n Manipulation\n- S駘ectionnez la Vision nocturne dans votre inventaire pour l'activer. S駘ectionnez-l nouveau pour la d駸activer.\n", + /*179*/ "Description\n\n- Appareil autonome de d馗odage. S'attache au panneau de contrle et passe en revue les diff駻entes combinaisons jusqu' l'ouverture.\n\n Instructions d'entranement\n- Trouvez le panneau ct de la porte et utilisez le d馗odeur pour la d騅errouiller.\n\nManipulation\n- Tenez-vous pr鑚 de la porte et appuyez sur le Bouton tout en tenant le d馗odeur.\n", + /*180*/ "Description\n\n- Utilis pour voir travers les murs et les objets solides. Peut voir des choses que la Vision nocturne et les lunettes IR ne peuvent d騁ecter.\n\n Instructions d'entranement\n- Le scanner allum, recherchez les deux interrupteurs cach駸 et activez-les pour 騁eindre la grille laser.\n\nManipulation\n- Choisir le scanner dans l'inventaire pour l'activer. Le choisir nouveau pour le d駸activer.\n", + /*181*/ "Description\n\n- Endormez les soup輟ns en utilisant un costume. Soyez vigilant cependant, certains ennemis peuvent vous d駑asquer.\n\n Instructions d'entranement\n- Grimshaw poss鐡e un occulteur qui attend d'黎re utilis. Dirigez-vous vers la porte suivante et procurez-vous-le.\n\nOp駻ation\n- S駘ectionnez le costume pour le porter.\n", + /*182*/ "Description\n\n- Convertit les informations thermiques en images. Peut 黎re utilis dans le noir. R騅鑞e 馮alement des anomalies telles que portes secr鑼es et les pans de mur peu solides.\n\n Instructions d'entranement\n- Allumez le scanner IR, trouvez la porte cach馥 et ouvrez-la.\n\nManipulation\n- S駘ectionnez le scanner IR dans votre inventaire pour l'activer. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*183*/ "Description\n- Localise un objet particulier dans une carte radar HUD. Indique la distance et l'駲uipement.\n\n Instructions d'entranement\n- Activez le Pisteur et suivez l'馗ho radar pour retrouver l'objet.\n\nOperation\n- S駘ectionnez le Pisteur dans votre inventaire. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*184*/ "Description\n- Cr馥 une disruption du spectre lumineux autour du porteur, ce qui entrane un effet cam駘駮n presque parfait. L'effet est annul lorsque le porteur fait feu.\n\n Instructions d'entranement\n- Activez l'occulteur et dirigez-vous vers le bureau de Carrington pour le surprendre!\n\nManipulation\n- S駘ectionnez l'occulteur dans l'inventaire. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*185*/ "Description\n- Emet un signal alternatif pour brouiller les communications 駘ectroniques. Doit 黎re plac sur l'appareil pour 黎re efficace.\n\n Instructions d'entranement\n- Jetez la mine CME sur le voyant lumineux au-del de la porte secr鑼e.\n\n Manipulation\n- Appuyez sur le Bouton Z pour jeter la mine. Maintenez le Bouton R enfonc et ajustez votre vis馥 avec le Stick analogique avant de jeter la mine.\n", + /*186*/ "Description\n- Relie l'agent sur le terrain et les informaticiens de l'Institut. Ils peuvent ensuite pirater des donn馥s ou ouvrir les serrures 駘ectroniques distance.\n\n Instructions d'entranement\n- Utilisez le R馗epteur pour pirater le terminal dans le coin, pour d騅errouiller une porte secr鑼e.\n\nManipulation\n- Tenez-vous ct du terminal et appuyez sur le Bouton B lorsque vous avez le R馗epteur en main.\n", + /*187*/ "TIRER\n Appuyez sur le Bouton Z pour faire feu.\n", + /*188*/ "AUTO RECHARGE\n Rel稍hez le Bouton Z quand vous 黎es court de munitions.\n", + /*189*/ "RECHARGE MANUELLE\n Appuyez sur le Bouton B pour recharger avant la fin du chargeur.\n", + /*190*/ "Viser: Maintenez le Bouton R enfonc pour le mode vis馥.\n", + /*191*/ "Utilisez le Stick analogique pour d駱lacer le curseur de vis馥.\n", + /*192*/ "AUTO FIRE\n Maintenez le Bouton Z enfonc pour tirer en mode automatique.\n", + /*193*/ "CHANGER VUE\n Appuyez sur le Bouton C haut ou bas pour regarder en haut ou en bas.\n", + /*194*/ "ZOOM\n Maintenez le Bouton R enfonc pour le mode zoom.\n", + /*195*/ "TIR RAPIDE\n Appuyez rapidement sur le Bouton Z pour tirer plus vite.\n", + /*196*/ "Institut Carrington\0|Base d'op駻ations\n", + /*197*/ "Tour Lucerne\0|QG supr麥e\n", + /*198*/ "Sous-sol laboratoire\0|Labos de recherche souterrains\n", + /*199*/ "Villa Carrington \0|R駸idence cti鑽e priv馥\n", + /*200*/ "Chicago\0|Coins louches de la ville\n", + /*201*/ "Immeuble G5\0|Fa軋de commerciale de la dataDyne\n", + /*202*/ "Secteur 51\0|Pr鑚 du lac Groom Dry, Nevada\n", + /*203*/ "Base a駻ienne en Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'avion pr駸identiel\n", + /*205*/ "Lieu du crash\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|B穰iment de recherche sous-marine\n", + /*207*/ "Vaisseau Cetan \0|Un autre univers sur Terre\n", + /*208*/ "Croiseur Skedar \0|Vaisseau de transport de troupes\n", + /*209*/ "Monde natal Skedar\0|La plan鑼e de l'Autel de Bataille\n", + /*210*/ "Largueur\0|Appareil de troupe mobile\n", + /*211*/ "Caisse antigrav\0|Appareil d'antigravit饅n", + /*212*/ "Hoverbike\0|V馼icule de basse altitude\n", + /*213*/ "Robot de nettoyage\0|Votre copain pour la vie\n", + /*214*/ "Hovercopter\0|H駘ico antigrav de combat urbain\n", + /*215*/ "Robot G5\0|Drode de combat urbain\n", + /*216*/ "Intercepteur S51\0|Robot a駻ien d'interception\n", + /*217*/ "Vaisseau Maian\0|Vaisseau de reconnaissance et de patrouille\n", + /*218*/ "Navette Skedar\0|Vaisseau de largage de troupes\n", + /*219*/ "Le b穰iment de l'Institut comprend de nombreuses zones diff駻entes: bureaux et laboratoires, ateliers et hangars. Il est isol du monde ext駻ieur ce qui aide garder le secret des diff駻entes op駻ations.\n", + /*220*/ "Au beau milieu du quartier des affaires, l'aust鑽e b穰iment de la dataDyne Corporation, se d騁ache du reste du paysage.\n", + /*221*/ "Ces laboratoires, bien cach駸 et sous haute surveillance, sont la cl de l'avenir de la dataDyne. Dans ces labos, des techniciens travaillent avec acharnement pour propulser la dataDyne au sommet.\n", + /*222*/ "Propri騁 de l'Institut, cette r駸idence retir馥 est le refuge de Daniel Carrington pour 馗happer au stress de l'Institut. La r駸idence, 駲uip馥 d'un g駭駻ateur, sert d'observatoire et poss鐡e une cave vin bien remplie.\n", + /*223*/ "Un coin glauque et miteux de Chicago, ferm la circulation terrestre. C'est ici que la Corporation G5 poss鐡e son QG.\n", + /*224*/ "A l'int駻ieur de l'immeuble du G5, il existe une salle de r騏nion prot馮馥 par des dispositifs anti-mouchards. C'est le lieu le plus sr de dataDyne pour les discussions hautement confidentielles.\n", + /*225*/ "Cette section du complexe connu sous le nom de Secteur 51, se trouve sur les contreforts du lac Groom Dry. Les aires d'atterrissage pour h駘icos et les tours de communications donnent une id馥 de la taille du complexe souterrain.\n", + /*226*/ "L'une des nombreuses bases a駻iennes renforc馥s, servant de points de ravitaillement pour Air Force One. Ces bases sont isol馥s et se trouvent dans des r馮ions inhospitali鑽es, loin des yeux indiscrets.\n", + /*227*/ "Cet Air Force One est optimis pour les climats froids, plutt utile lorsqu'il est bas au nord de l'Alaska. Le vol est destination d'Oslo, Norv鑒e.\n", + /*228*/ "Dans le paysage rocheux et enneig du cercle polaire arctique repose l'駱ave de l'avion abattu.\n", + /*229*/ "Propri騁 du gouvernement des USA, le Pelagic II a 騁 con輹 pour les missions de plong馥 dans les profondeurs abyssales, et ce dans n'importe quelles conditions climatiques. C'est le seul b穰iment au monde pouvoir 騁udier les grands fonds oc饌niques.\n", + /*230*/ "Un gigantesque vaisseau extraterrestre qui repose au fond de l'oc饌n depuis des millions d'ann馥s.\n", + /*231*/ "Un vaisseau d'assaut interplan騁aire qui transporte les guerriers Skedar vers les zones de conflit. Fait partie de la tr鑚 diminu馥 flotte Skedar.\n", + /*232*/ "Une plan鑼e aride, secou馥 par des tremblements de terre, des temp黎es de sable et des tornades. Fait partie d'un syst鑪e solaire complexe trois soleils.\n", + /*233*/ "Un v馼icule de transport d'agents. Petit, rapide et tr鑚 maniable, il a 騁 con輹 pour une utilisation urbaine. Peut 黎re contrl par ordinateur ou pilot distance. Il peut transporter trois quatre agents, plus leur 駲uipment.\n", + /*234*/ "Un appareil antigrav con輹 pour aider les manutentionnaires qui se fixe une caisse. Lorsqu'il est activ, le champ antigrav soul钁e la caisse en r馘uisant son inertie.\n", + /*235*/ "Moto de patrouille basse altitude. Utilise une petite unit AG pour flotter, ainsi qu'une petite -mais puissante- turbine pouss馥 vectorielle pour la propulsion et la direction.\n", + /*236*/ "Il maintient une maison propre et en ordre. Il a souvent acc鑚 toutes les zones d'un b穰iment, il est donc sage de le laisser intact autant que possible. Il peut ainsi fournir l'acc鑚 malgr lui certaines zones importantes.\n", + /*237*/ "V馼icule de patrouille et d'駘imination. Equipage de deux hommes, arm d'un canon Vulcain l'avant, et d'un lance-missiles sur chaque aile. Peut 黎re descendu avec un feu nourri, ou mieux, avec une roquette bien plac馥.\n", + /*238*/ "Robot de combat urbain. Utilise une unit antigrav pour flotter. Lourdement prot馮 et arm. Utilis pour 駘oigner les visiteurs indiscrets, avec son programme 'tirer d'abord et ne pas poser de questions plus tard'.\n", + /*239*/ "Variante robotique de l'Hoverbike, avec une turbine et une unit AG beaucoup plus puissantes. Peut atteindre Mach 2 sans probl鑪e et peut avancer au pas pendant des heures. En d駱it de son armement, ce v馼icule compte plus sur sa maniabilit que sur ses boucliers.\n", + /*240*/ "Con輹 pour un seul pilote Maian. Un passager se sentirait l'騁roit, et un passager humain encore plus.\n", + /*241*/ "Capable de transporter au combat dix guerriers Skedar en armure et arm駸 jusqu'aux dents. Ind騁ectable par des radars conventionnels. Il peut 駑ettre de puissantes ondes de brouillage qui couvrent une zone importante : ces ondes brouillent les communications, ainsi que les 駲uipements de d騁ection.\n", + /*242*/ "Description\n- Un bon agent remarque chaque d騁ail autour de lui.\n\n Instructions d'entranement\n- Examinez tous les objets directement.\n\nManipulation\n- Regarder vers le haut- Appuyez sur le Bouton C bas\n- Regarder vers le bas- Appuyez sur le Bouton C haut\n- Observation- Maintenez enfonc le Bouton R pour passer en mode vis馥 et utilisez le Stick pour regarder dans une direction.\n", + /*243*/ "Description\n- Les pas de ct et les d駱lacements lat駻aux peuvent vous sortir de situations difficiles.\n\n Instructions d'entranement\n- Activez tous les interrupteurs devant vous. Soyez rapide, car chaque interrupteur reviendra dans sa position initiale au bout d'un certain temps.\n\nManipulation\n- Pas gauche- Bouton C gauche\n- Pas droite- Bouton C droit\n\n", + /*244*/ "Description\n- Se baisser et s'accroupir peut permettre d'acc馘er de nouvelles zones.\n\n Instructions d'entranement\n- Frayez-vous un chemin en utilisant les mouvements qui vous sont disponibles. Activez les interrupteurs.\n\n Manipulation\n- Se baisser- Maintenez enfonc le Bouton R et appuyez sur le Bouton C bas.\n- S'accroupir- Lorsque vous 黎es baiss, Maintenez enfonc le Bouton R et appuyez sur le Bouton C bas.\n- Se relever- Appuyez bri钁ement sur le Bouton R.\n\n", + /*245*/ "Description\n- Combattre plusieurs adversaires au corps--corps peut s'av駻er difficile.\n\n Instructions d'entranement\n- Assommez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Coup de poing - Appuyez rapidement sur le Bouton Z pour une rafale de coups de poing.\n\n", + /*246*/ "Description\n- D駸armer votre adversaire peut vous permettre d'obtenir de nouvelles armes.\n\n Instructions d'entranement\n- Assommez/d駸armez tous les ennemis sans vous faire toucher.\n\nManipulation\n- D駸armer - Maintenez le Bouton B enfonc, puis appuyez sur le Bouton Z.\n- Assommer- Assommez un ennemi inattentif par derri鑽e.\n", + /*247*/ "Description\n- Combattre plusieurs adversaires mains nues.\n\n Instructions d'entranement\n- Battez tous les ennemis d駸arm駸 sans vous faire toucher.\n\n", + /*248*/ "Description\n- Combattre plusieurs adversaires, arm駸 ou non.\n\n Instructions d'entranement\n- Battez tous les ennemis arm駸 sans vous faire toucher.\n\n", + /*249*/ "Pour plus de pr馗ision et de libert lorsque vous regardez autour de vous, utilisez le mode vis馥.\n", + /*250*/ "Pensez l'endroit o vous souhaitez aller avant de commencer le test. Placez-vous un endroit qui demandera le moins de mouvement possible entre les cibles.\n", + /*251*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous d駱lacez plus vite debout. Pour passer le test le plus vite possible, baissez-vous seulement lorsque c'est n馗essaire.\n", + /*252*/ "Attaquer vos ennemis dans le dos peut 黎re d駸honorant, mais c'est un moyen beaucoup plus sr de les 駘iminer. N'allez au corps--corps que lorsque c'est vraiment n馗essaire, et soyez pr黎 reculer lorsque l'ennemi riposte.\n", + /*253*/ "Restez au contact le temps d'attraper l'arme. Reculez hors de port馥 de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*254*/ "Ne restez pas immobile en attendant de vous faire toucher; bougez! Ne vous fixez pas sur un seul adversaire; essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu' ce que vous le puissiez.\n", + /*255*/ "Neutralisez les adversaires arm駸 une fois que vous matrisez le combat rapproch. Lorsque vous venez de d駸armer un ennemi, reculez et utilisez l'arme d駻ob馥 avant qu'il ne s'approche de vous.\n", + /*256*/ "Pour plus de pr馗ision et de libert lorsque vous regardez autour de vous, utilisez le mode Vis馥.\n", + /*257*/ "Les pas de ct et les d駱lacements lat駻aux peuvent vous sortir de situations difficiles.\n", + /*258*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous d駱lacez plus vite debout. Pour bouger le plus rapidement possible baissez-vous lorsque c'est r馥llement n馗essaire.\n", + /*259*/ "Attaquer vos ennemis dans le dos peut 黎re d駸honorant, mais c'est un moyen beaucoup plus sr de les 駘iminer. N'allez au corps--corps que lorsque c'est vraiment n馗essaire et soyez pr黎 reculer avant que l'ennemi ne riposte.\n", + /*260*/ "Restez rapproch juste le temps d'attraper l'arme. Reculez hors de port馥 de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*261*/ "Ne restez pas immobile en attendant de vous faire toucher: bougez! Ne vous fixez pas sur un seul adversaire, essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu' ce que vous le puissiez.\n", + /*262*/ "Allez chercher les adversaires arm駸 une fois que vous matrisez le combat rapproch. Lorsque vous venez de d駸armer un ennemi, reculez et utilisez l'arme que vous venez de voler avant qu'il ne s'approche de vous.\n", + /*263*/ "Veillez ce que l'objet cibl soit toujours dans votre champ de vision quand vous utilisez le R馗epteur, et restez suffisamment proche pour 騅iter que la connexion ne soit interrompue.\n", + /*264*/ "Assurez-vous que la mine se fixe bien o vous voulez en vous approchant le plus possible de la cible. Ajustez votre vis馥 en utilisant les Boutons C ou le Bouton R pour la vis馥.\n", + /*265*/ "La CamSpy peut 黎re difficile contrler, alors prenez votre temps.\n", + /*266*/ "Utile en combat, mais peut vous causer des ennuis en cas de surcharge.\n", + /*267*/ "Si vous avez des probl鑪es pour fixer le D馗odeur, rapprochez-vous de la cible en lui faisant face.\n", + /*268*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant la cible. Attention votre environnement et soyez pr黎 explorer.\n", + /*269*/ "Le viseur r馘uit votre vision p駻iph駻ique, ce qui peut 黎re un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*270*/ "Si vous utilisez cet appareil au mauvais moment, cela peut vous coter la vie, puisque cela vous emp鹹he de voir quoi que soit au del d'un certain point. A utiliser avec mod駻ation.\n", + /*271*/ "Un costume n'est pas seulement le v黎ement, c'est 馮alement la mani鑽e dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*272*/ "Economisez votre camouflage lorsqu'il n'y a personne pour vous voir.\n", + /*273*/ "Veillez ce que l'objet cible soit toujours dans votre champ de vision quand vous utilisez le R馗epteur, et restez suffisamment proche pour 騅iter que la connexion ne soit interrompue.\n", + /*274*/ "Assurez-vous que la mine se fixe bien o vous voulez en vous approchant le plus possible de la cible. Ajustez votre vis馥 en utilisant les Boutons C ou le Bouton R pour la vis馥.\n", + /*275*/ "La CamSpy n'est pas invisible - les ennemis peuvent la rep駻er : alors soyez prudent en entrant dans une zone d駸erte. Souvenez-vous que la CamSpy reste l o vous l'avez laiss馥 jusqu' ce que vous la ramassiez.\n", + /*276*/ " Utile en combat, mais peut vous causer des ennuis en cas de surcharge. Anticipez ces situations et r饌gissez avant l'ennemi.\n", + /*277*/ "Si vous avez des probl鑪es pour fixer le D馗odeur, rapprochez-vous de la cible en lui faisant face.\n", + /*278*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant la cible. Attention votre environnement et soyez pr黎 explorer.\n", + /*279*/ "Le viseur r馘uit votre vision p駻iph駻ique, ce qui peut 黎re un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*280*/ " Si vous utilisez cet appareil au mauvais moment, cela peut vous coter la vie, puisque cela vous emp鹹he de voir quoi que soit au del d'un certain point. A utiliser avec mod駻ation.\n", + /*281*/ " Un costume n'est pas seulement un v黎ement, c'est 馮alement la mani鑽e dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*282*/ " Economisez votre camouflage lorsqu'il n'y a personne pour vous voir. Evitez de tirer, sauf en cas d'absolue n馗essit et si vous 黎es sr du r駸ultat.\n", + /*283*/ "Le Falcon 2 est une arme de poing tr鑚 pr馗ise. Par cons駲uent, toute erreur dans ce test est de votre faute. Le mode secondaire est un coup de crosse et est donc inutile distance.\n", + /*284*/ "Pour rendre le Falcon 2 encore plus efficace, une lunette a 騁 ajout馥 l'arme. Tout comme pour le Falcon 2 de base, le mode coup de crosse est inutile distance.\n", + /*285*/ "La version du Falcon 2 avec silencieux est une excellente arme pour les op駻ations furtives, con輹e pour vous donner l'avantage de la surprise sur vos ennemis. Testez votre pr馗ision pour vous assurer de ne jamais g稍her votre chance.\n", + /*286*/ "Le Magsec 4 privil馮ie la puissance de feu au d騁riment de la pr馗ision, particuli鑽ement en mode rafale de trois. La seule contrainte importante est la taille du chargeur.\n", + /*287*/ "Voici une arme Skedar typique, brutale et puissante. En sacrifiant une partie des munitions, la puissance peut 黎re concentr馥 en un tir d騅astateur. La quantit importante de munitions est un avantage.\n", + /*288*/ "Ce pistolet tr鑚 versatile poss鐡e deux types de munitions: standard ou explosives. Les ing駭ieurs maians ont r騏ssi cette prouesse sans sacrifier la consommation d'駭ergie, bien que la cadence de tir soit r馘uite.\n", + /*289*/ "L'art du DY357 est de savoir quand recharger. Un chargeur de six balles influe donc sur l'issue d'un combat. Le poids de l'arme peut s'av駻er utile pour assommer quelqu'un.\n", + /*290*/ "Trent Easton est toujours la recherche du nec plus ultra et cette arme ne fait pas exception. Les balles sont aussi particuli鑽es que l'arme. Elles sont con輹es pour se fragmenter l'int駻ieur de la cible et l'駘iminer rapidement.\n", + /*291*/ "Un pistolet-mitrailleur fiable et efficace. On comprend pourquoi il reste la meilleure vente de la dataDyne depuis les deux derni鑽es ann馥s, et ceci gr稍e son mode secondaire. Le syst鑪e d'acquisition et de verrouillage de cible est en effet excellent: familiarisez-vous avec la manipulation compl鑼e de cette arme.\n", + /*292*/ "Le pistolet-mitrailleur Cyclone a 騁 con輹 pour ne PAS 黎re pr馗is, mais c'est une excellente distraction l'entranement. Sa cadence de tir est cependant extr麥ement 駘ev馥, faisant de cette arme un atout d騅astateur.\n", + /*293*/ "Cette mitraillette est issue de la flexibilit de conception Maian. Son mode secondaire est int駻essant: un projectile haute v駘ocit qui peut p駭騁rer n'importe quoi. Pour 騅iter d'endommager le canon ou le m馗anisme de mise feu, la cadence de tir - tout comme pour le Phoenix - est r馘uite en mode secondaire.\n", + /*294*/ "Le RC-P120 tire un projectile min駻al sp馗ial qui, coupl une grande cadence de tir et un chargeur important, en fait une arme parfaite contre les Skedars. Les balles peuvent 黎re utilis馥s pour alimenter un prototype d'occulteur. L'entranement a 騁 modifi pour mettre en valeur cette caract駻istique particuli鑽e.\n", + /*295*/ "Non seulement cette arme peut 黎re pli馥 pour ressembler un PC portable, mais elle peut en plus 黎re transform馥 en arme sentinelle en mode secondaire. Cela vous sera utile pour couvrir une retraite ou prot馮er une zone.\n", + /*296*/ "C'est le mod鑞e que la dataDyne a r騏ssi vendre l'arm馥 am駻icaine, bien qu'elle ne soit pas encore largement r駱andue. Con輹e dans l'esprit de la dataDyne pour faire de mauvaises surprises, le mod鑞e de base est pourvu d'une mine de proximit sous le canon. Vous devez vous d饕arrasser de votre arme pour utiliser le mode secondaire.\n", + /*297*/ "Le mode secondaire de cette arme semble 黎re un 'd騁ecteur de danger' rep駻ant mines, appareils explosifs (tels que Dragon en mode secondaire) et armes sentinelles. Bien que puissante, cette arme dispose d'un chargeur trop petit.\n", + /*298*/ "Premier essai de l'Institut pour cr馥r une arme de soutien, l'AR34 est un fusil d'assaut de base. Le mode secondaire est un zoom permanent. Optez plutt pour le tir de pr馗ision.\n", + /*299*/ "La version lourde du Dragon. La mine a 騁 remplac馥 par un petit lance-grenades. Il a 騁 adopt par l'arm馥 am駻icaine comme arme de soutien d'escouade. Entranez-vous utiliser le lance-grenades.\n", + /*300*/ "La subtilit n'est pas de mise ici. Le premier mode est un tir simple et le second un tir double. Le chargeur est grand pour un fusil pompe, mais m馭iez-vous du long temps de rechargement et calculez vos mouvements en fonction de celui-ci.\n", + /*301*/ "Un fusil de sniper bien construit et pourvu d'un silencieux ainsi que d'un zoom fort grossissement. Seul le tireur peut influer sur la pr馗ision du fusil. Utilisez le mode secondaire pour vous accroupir et stabiliser votre vis馥.\n", + /*302*/ "Bien que la technologie employ馥 pour 駘aborer ce fusil soit au-del de notre compr馼ension, nous pouvons toujours appr馗ier les effets du FarSight. Le tir est presque impossible arr黎er et la lunette peut inspecter travers les murs sur une grande profondeur, verrouillant la cible si besoin est.\n", + /*303*/ "Le premier mode de l'arbal鑼e est un tir de projectile soporifique, le second un tir de poison mortel effet imm馘iat. C'est avant tout une arme pour les missions demandant une grande discr騁ion. Recharger cette arme prend du temps, attention donc son utilisation en combat.\n", + /*304*/ "Le pistolet tranquillisant est de conception banale. On le trouve dans de nombreux laboratoires et hpitaux travers le monde. Le second mode projette des doses mortelles consommant beaucoup plus de s馘atif.\n", + /*305*/ "Essayez de matriser cette arme du mieux que vous pouvez. Ce qui est certain, c'est qu'elle a 騁 con輹e pour un utilisateur beaucoup plus fort qu'un humain. Agenouillez-vous pour stabiliser votre vis馥. Si un ennemi r騏ssit passer travers le rideau de feu, utilisez les canons comme broyeur pour hacher votre adversaire.\n", + /*306*/ "Un nouveau produit dataDyne pourvu d'une technologie int駻essante. Le mode secondaire active un champ magn騁ique autour d'une grenade, lui permettant d'adh駻er une surface. Au bout d'un certain temps, le champ s'inverse et la grenade tombe de son point d'impact et explose.\n", + /*307*/ "Un lance-roquettes compact et r騏tilisable, qui se recharge apr鑚 chaque tir. Le mode secondaire utilise une variante limit馥 du syst鑪e de verrouillage de cible du CMP150, avec la possibilit de verrouiller une seule cible. Le missile se d駱lace plus lentement en traquant sa cible, un bon timing est donc essentiel.\n", + /*308*/ "Ce lance-roquettes skedar peut soit tirer des roquettes classiques soit des missiles guid駸 par l'utilisateur. Les Skedars 駱rouvent une satisfaction perverse lorsque la cam駻a situ馥 dans la t黎e du missile se rapproche de la cible. Le missile guid acc駘鑽e automatiquement mais peut 黎re ralenti pour plus de maniabilit. L'explosion se produit au contact ou lorsque la d騁ente est press馥.\n", + /*309*/ "Un couteau de combat bien tremp, 馮alement 駲uilibr pour le lancer. La pratique est essentielle pour s'habituer la port馥 et la trajectoire de la lame.\n", + /*310*/ "Le d駱artement des armes exp駻imentales a d騅elopp ce laser de poignet avec deux rayons diff駻ents. Le premier mode envoie une salve une distance consid駻able, tandis que le mode secondaire projette un rayon continu tant que le tir est maintenu.\n", + /*311*/ "La grenade anti-personnelle poss鐡e un d騁onateur r馮l sur 4 secondes. Pour votre plaisir est inclus un mode secondaire: une grenade de proximit effet de ricochet. La grenade rebondit partout et explose au bout d'un certain temps ou si une cible est d騁ect馥.\n", + /*312*/ "Cette grenade Maian s鑪e le chaos dans l'esprit des cr饌tures soumises son effet. Si vous vous trouvez dans l'aire d'effet votre vision deviendra floue et vous l稍herez ce que vous tenez. La grenade peut 黎re r馮l馥 pour exploser l'impact ou d馗lench馥 par d騁ecteur de proximit. Prenez garde la lancer assez loin.\n", + /*313*/ "L'utilisation des mines retardement n馗essite jugement et calcul. La cible peut d駱asser la zone d'effet et vous seriez en danger. Exercez-vous avant de commettre une erreur fatale en situation de combat. La seconde fonction est un d騁ecteur de danger identique celui du K7 Avenger.\n", + /*314*/ "Le secret de l'efficacit des mines de proximit est de savoir les placer l o votre adversaire les attend le moins. Si vous pensez vous trouver dans une zone truff馥 de mines, utilisez le d騁ecteur de danger pour les rep駻er. Cela vous fera peut-黎re perdre du temps, mais si ce n'est pas le cas, cela vous sauvera la vie.\n", + /*315*/ "La derni鑽e g駭駻ation de mines contrl馥s distance, identiques aux mod鑞es plus anciens. Le premier mode place une mine et le second la fait exploser. Si vous ne voyez pas la mine, utilisez les bonnes vieilles techniques du hasard et du timing. \n", + /*316*/ "Holo 1 - Inspecter\n", + /*317*/ "Holo 2 - Mouvement 1\n", + /*318*/ "Holo 3 - Mouvement 2\n", + /*319*/ "Holo 4 - Lutte 1\n", + /*320*/ "Holo 5 - Lutte 2\n", + /*321*/ "Holo 6 - Combat r馥l 1\n", + /*322*/ "Holo 7 - Combat r馥l 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_g.c b/src/files/lang/pal-beta/dish_str_g.c new file mode 100644 index 000000000..b978fb509 --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_g.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Nehmen Sie das Nachtsicht-Ger舩 vom Tisch, um zu beginnen.\n", + /* 9*/ "Aktivieren Sie die Nachtsicht.\nFinden Sie den Lichtschalter.\nSchalten Sie das Licht wieder ein.\n", + /* 10*/ "Nehmen Sie das Data Uplink-Ger舩 vom Tisch, um zu beginnen.\n", + /* 11*/ "Stellen Sie sich neben das Terminal und setzen Sie den Uplink ein.\n", + /* 12*/ "Sie mssen das Ger舩 bereithalten.\n", + /* 13*/ "Verbindung wurde hergestellt...\n", + /* 14*/ "Das Terminal erfolgreich infiltriert.\n", + /* 15*/ "Verbindung abgebrochen - Entfernung zum PC ist zu gro゚.\n", + /* 16*/ "Nehmen Sie die ECM-Mine vom Tisch, um zu beginnen.\n", + /* 17*/ "Finden Sie den Schaltblock und platzieren Sie die ECM-Mine.\n", + /* 18*/ "Die ECM-Mine wurde korrekt platziert.\n", + /* 19*/ "Die ECM-Mine wurde nicht korrekt platziert.\n", + /* 20*/ "Nehmen Sie den CamSpy vom Tisch, um zu beginnen.\n", + /* 21*/ "Finden Sie den PC im Info-Raum und holografieren Sie ihn.\n", + /* 22*/ "Der PC wurde erfolgreich holografiert.\n", + /* 23*/ "Das Licht wurde wieder eingeschaltet.\n", + /* 24*/ "Nehmen Sie den Tr-Decoder vom Tisch, um zu beginnen.\n", + /* 25*/ "Setzen Sie den Decoder an der Konsole ein, um die Tr zu entriegeln.\n", + /* 26*/ "Sie mssen den Tr-Decoder bereithalten.\n", + /* 27*/ "Decoder wurde angebracht. Crack-Routine wurde initiiert...\n", + /* 28*/ "Decodierung abgeschlossen. Tr wurde entriegelt.\n", + /* 29*/ "Nehmen Sie den Tracker vom Tisch, um zu beginnen.\n", + /* 30*/ "Orten Sie den IR-Scanner mit Hilfe des Trackers.\n", + /* 31*/ "Der IR-Scanner wurde geortet.\n", + /* 32*/ "Nehmen Sie den IR-Scanner vom Tisch, um zu beginnen.\n", + /* 33*/ "Orten Sie die geheime Tr mit Hilfe des IR-Scanners.\n", + /* 34*/ "Die geheime Tr wurde erfolgreich geortet.\n", + /* 35*/ "Nehmen Sie den Rntgen-Scanner vom Tisch, um zu beginnen.\n", + /* 36*/ "Finden Sie die versteckten Schalter, um das Laser-Netz abzuschalten.\n", + /* 37*/ "Das gesamte Laser-Netz wurde abgeschaltet.\n", + /* 38*/ "Nehmen Sie die Verkleidung vom Tisch, um zu beginnen.\n", + /* 39*/ "T舫schen Sie jemanden, um an die Tarnkappe zu gelangen.\n", + /* 40*/ "Die Tarnkappe wurde erlangt.\n", + /* 41*/ "Laser-Netz 1 wurde deaktiviert.\n", + /* 42*/ "Laser-Netz 2 wurde deaktiviert.\n", + /* 43*/ "Ich bin hier, um die Ausrstung abzuholen.\n", + /* 44*/ "Ach, Joanna. So t舫schen Sie niemanden!\n", + /* 45*/ "Da, nehmen Sie das. Lassen Sie es nicht fallen!\n", + /* 46*/ "Die Tarnkappe wurde erfolgreich gesichert.\n", + /* 47*/ "Es war vorgesehen, dass Sie eine Verkleidung tragen.\n", + /* 48*/ "Sie mssen sich ein wenig mehr anstrengen, Joanna.\n", + /* 49*/ "Joanna, wo sind Sie denn rausgekrochen?\n", + /* 50*/ "Sie wurden von einer Kamera erfasst.\n", + /* 51*/ "Nehmen Sie die Tarnkappe vom Tisch, um zu beginnen.\n", + /* 52*/ "Setzen Sie die Tarnkappe ein und orten Sie Carrington.\n", + /* 53*/ "Ich kann ruhigen Gewissens behaupten,\ndass Ihr Training abgeschlossen ist!\n", + /* 54*/ "Mission abgeschlossen - Ger舩e-Training bestanden!\n", + /* 55*/ "Mission fehlgeschlagen - Sie wurden entdeckt.\n", + /* 56*/ "W臧len Sie den Uplink aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 57*/ "W臧len Sie den CamSpy aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 58*/ "W臧len Sie das Nachtsicht-Ger舩 aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie das Ger舩 und lassen Sie den A-Knopf los.\n", + /* 59*/ "W臧len Sie den Tr-Decoder aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tr-Decoder und lassen Sie den A-Knopf los.\n", + /* 60*/ "W臧len Sie den Rntgen-Scanner aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Scanner und lassen Sie den A-Knopf los.\n", + /* 61*/ "W臧len Sie die Verkleidung aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Verkleidung und lassen Sie den A-Knopf los.\n", + /* 62*/ "W臧len Sie den IR-Scanner aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den IR-Scanner und lassen Sie den A-Knopf los.\n", + /* 63*/ "W臧len Sie den Tracker aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tracker und lassen Sie den A-Knopf los.\n", + /* 64*/ "W臧len Sie die Tarnkappe aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Tarnkappe und lassen Sie den A-Knopf los.\n", + /* 65*/ "W臧len Sie die ECM-Mine aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die ECM-Mine und lassen Sie den A-Knopf los.\n", + /* 66*/ "Joanna, schn, Sie zu sehen.\n", + /* 67*/ "Kommen Sie mit, Joanna.\nIch fhre Sie herum.\n", + /* 68*/ "Das Informations-Center befindet sich hinter dieser Tr.\n", + /* 69*/ "Hier haben wir das Entwicklungs-Labor.\n", + /* 70*/ "Hier geht es zum Simulations-Raum.\n", + /* 71*/ "Das ist der Schie゚stand, Jo.\n", + /* 72*/ "Dieser Korridor fhrt zum Hangar.\n", + /* 73*/ "HOVERCRATE\nStellen Sie sich neben das Hovercrate und drcken Sie den B-Knopf.\n", + /* 74*/ "Lassen Sie den B-Knopf los, um das Hovercrate loszulassen.\n", + /* 75*/ "HOVERBIKE\nDrcken Sie den B-Knopf zweimal, um das Bike zu fliegen.\n", + /* 76*/ "Drcken Sie den B-Knopf zweimal, um wieder abzusteigen.\n", + /* 77*/ "ヨFFEN VON TワREN\nDrcken Sie den B-Knopf, um eine Tr zu ffnen.\n", + /* 78*/ "Mit Hilfe des B-Knopfs knnen auch andere Objekte aktiviert werden.\n", + /* 79*/ "AUFZワGE\nDrcken Sie den B-Knopf, um den Aufzug zu rufen.\n", + /* 80*/ "W臧rend des Trainings knnen Sie nicht hinausgehen.\n", + /* 81*/ "Code 1 wurde erlangt.\n", + /* 82*/ "Code 2 wurde erlangt.\n", + /* 83*/ "Code 3 wurde erlangt.\n", + /* 84*/ "Code 4 wurde erlangt.\n", + /* 85*/ "BLICK NACH OBEN\n- Drcken Sie den C-Knopf unten, um nach oben zu schauen.\n", + /* 86*/ "BLICK NACH UNTEN\n- Drcken Sie den C-Knopf oben, um nach unten zu schauen.\n", + /* 87*/ "Holoprogramm 2 wurde erfolgreich abgeschlossen.\n", + /* 88*/ "Holoprogramm 4 wurde erfolgreich abgeschlossen.\n", + /* 89*/ "Holoprogramm 5 wurde erfolgreich abgeschlossen.\n", + /* 90*/ "Die Wache wurde erfolgreich entwaffnet.\n", + /* 91*/ "Die Wache wurde erfolgreich KO geschlagen.\n", + /* 92*/ "Entwaffnen Sie diese Person.\n", + /* 93*/ "Schlagen Sie diese Person KO. Tarnung ist der Schlssel.\n", + /* 94*/ "Und die letzte Wache...\n", + /* 95*/ "DUCKEN\n- Halten Sie die R-Taste gedrckt, und drcken Sie den C-Knopf unten.\n", + /* 96*/ "HOCKEN\n- Ducken Sie sich, und halten Sie den C-Knopf unten gedrckt.\n", + /* 97*/ "Holoprogramm 3 wurde erfolgreich abgeschlossen.\n", + /* 98*/ "Bet舩igen Sie alle Schalter.\n", + /* 99*/ "Bet舩igen Sie alle Schalter an der Wand.\n- Sie mssen schnell sein, da sie rasch zurckspringen.\n", + /*100*/ "Erlangen Sie die Codes, indem Sie die Terminals untersuchen.\n- Wenden Sie die Codes an den Wand-Terminals an.\n", + /*101*/ "Code 1 wurde erlangt.\n", + /*102*/ "Code 2 wurde erlangt.\n", + /*103*/ "Code 3 wurde erlangt.\n", + /*104*/ "Code 4 wurde erlangt.\n", + /*105*/ "Aufgabe nicht erfllt - Sie mssen nach vorne schauen.\n", + /*106*/ "Holoprogramm 1 wurde erfolgreich abgeschlossen.\n", + /*107*/ "Unbewaffneter Kampf - Schlagen Sie das Ziel KO.\n- Drcken Sie den Z-Trigger in rascher Abfolge.\n", + /*108*/ "Versuchen Sie sich jetzt gegen ein bewegliches Ziel.\n", + /*109*/ "Und abschlie゚end ein Ziel, das sich auch wehrt.\n", + /*110*/ "Besiegen Sie alle Gegner, ohne selbst getroffen zu werden.\n", + /*111*/ "Aufgabe nicht erfllt - Sie wurden getroffen.\n", + /*112*/ "Holoprogramm 6 wurde erfolgreich abgeschlossen.\n", + /*113*/ "Holoprogramm 7 wurde erfolgreich abgeschlossen.\n", + /*114*/ "TERMINALS\n- Drcken Sie den B-Knopf, um ein Terminal zu aktivieren.\n", + /*115*/ "Aktiveren Sie die roten Terminals an den W舅den.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, Ich lasse Sie allein, damit Sie sich vorbereiten knnen.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Menschlich (weiblich)\n", + /*127*/ "23 Jahre 2 Monate\n", + /*128*/ "|CI File #027 -\n\nTrainings-Status: Komplettiert\nBewertung: A++\nAktiver Status: im Einsatz\n\n|Profil -\n\nBestens trainiert, aber unerfahren. Herausragende Reaktionen. Vertraut mit verschiedensten Waffen. Sehr kompetenter All-round-Agent. Durch die Erreichung der besten Trainingsergebnisse musste eine neue Bewertung erdacht werden. Die Verkrperung des idealen Agenten des Carrington Instituts, daher die Bezeichnung 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Menschlich (m舅nlich)\n", + /*131*/ "28 Jahre 5 Monate\n", + /*132*/ "|CI File #009 -\n\nTrainings-Status: Komplettiert\nBewertung: A+\nAktiver Status: Undercover\n\n|Profil -\n\nUnser erfahrenster Undercover-Agent. Hervorragend im Umgang mit der Waffe seiner Wahl (ein Magnum Revolver). Eignet sich perfekt fr Undercover- Missionen, weniger geeignet fr Kampfeins舩ze. Vor Joanna Dark hatte er die Ehre, das beste Trainingsergebnis erreicht zu haben.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Menschlich (m舅nlich)\n", + /*135*/ "62 Jahre 8 Monate\n", + /*136*/ "|CI File #000 -\n\nTrainings-Status: K/A\nBewertung: K/A\nAktiver Status: K/A\n\n|Profil -\n\nIntelligenter, patriarchischer Wissenschaftler/Unternehmer und Grnder des Carrington Instituts. Plant alle Missionen, in die seine Agenten entsandt werden, und betreut jede Operation selber von seinem Bro aus. Kleidet sich mitunter etwas eigenartig.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Menschlich (weiblich)\n", + /*139*/ "39 Jahre ? Monate\n", + /*140*/ "|Analytische Daten -\n\nDer Kopf von dataDyne. Schtig nach Macht; mchte niemandem untergeben sein. Sie hasst es, die Initiative zu verlieren. Ist in der Lage, 舫゚erst skrupellose Aktion durchzufhren, um die Konkurrenz hinter sich zu lassen. Hat vor allem gegenber Daniel Carrington keine Skrupel, den sie verabscheut.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Menschlich (m舅nlich)\n", + /*143*/ "46 Jahre ? Monate\n", + /*144*/ "|Analytische Daten -\n\nChef der Nationalen Sicherheit. Es besteht eine Verbindung zu CassandraDe Vries, obwohl es eher nach einer Interessensgemeinschaft aussieht.Er wird tun, was Cassandra ihm sagt, da selbst seine dominante Persnlichkeit durch die von De Vries in den Schatten gestellt wird. Die Graue Eminenz hinter einigen der subversiven Elemente innerhalb der NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Der Caroll-Sapient (AI)\n", + /*147*/ "6 Monate\n", + /*148*/ "|Profil -\n\n Eine von dataDyne entwickelte knstliche Intelligenz mit einer Vorliebe fr Fremdsprachen und Decodierung. Er war in der Lage, eigene Moral zu entwickeln, und konnte aufgrund seiner berragenden Intelligenz die Pl舅e von dataDyne erahnen. Seine Stimme ist 舫゚erst pr艘ise moduliert, und simuliert den Charakter eines Akademikers.\n", + /*149*/ "Elvis\n", + /*150*/ "Maianer (m舅nlich)\n", + /*151*/ "320 Jahre\n", + /*152*/ "|Profil -\n\nEin Alien aus der Rasse der Maianer. Er ist der 'Protektor' (Bodyguard) des Maianischen Botschafters, der auf die Bitte von Carrington zur Erde reist. Protektoren sind im Umgang mit verschiedenen Waffen trainiert. Elvis ist terraphil. Er findet die Erde und alles, was mit ihr in Zusammenhang steht, ausgesprochen faszinierend.\n", + /*153*/ "Mr. Blond\n", + /*154*/ "Menschlich (m舅nlich)\n", + /*155*/ "Endzwanziger\n", + /*156*/ "|Profil -\n\n Ein hellblonder, menschlicher Mann. Sehr gro゚, tr臠t wei゚e Kleidung, meistens einen Regenmantel. Scheint hinter der Verschwrung zu stecken, in die Cassandra und Trent verwickelt sind. Mehr ist nicht bekannt.\n", + /*157*/ "Mr. Blond\n", + /*158*/ "Skedar (verkleidet)\n", + /*159*/ "unbekannt\n", + /*160*/ "|Neuestes Profil -\n\nEs handelt sich um einen Skedar-Krieger, der durch eine holografische Projektion als hellblonder, junger Mann in den sp舩en Zwanzigern erscheint. Eine orale Modulationseinheit verleiht ihm eine pr艘ise, intelligente Stimme. Dieses Ger舩 ist brigens ein hervorragendes Manipulations-Werkzeug der Skedar.\n", + /*161*/ "Der US-Pr舖ident\n", + /*162*/ "Menschlich (m舅nlich)\n", + /*163*/ "50 Jahre\n", + /*164*/ "|Profil -\n\nEin gebildeter, scharfsinniger Afro-Amerikaner, der st舅dig versucht, die beste Entscheidung zu finden. Ist allerdings von Leuten wie Trent Easton umgeben, den er unter Kontrolle zu haben glaubt, nachdem er untersagt hat, die Pelagic II an dataDyne zu vergeben. Ihn als 'lenkbar' zu bezeichnen, wie es die Mehrheit der politischen Kommentatoren ist, w舐e allerdings nichts anderes als ein Akt der Unfairness.\n", + /*165*/ "Maianer\n", + /*166*/ "Die Maianer sind eine au゚erirdische Rasse, die auf der Erde unter dem Namen 'die Grauen' bekannt sind. Sie beobachten die Erde schon seit langer Zeit. Der Menschheit gegenber sind sie wohlgesonnen, und erkennen gro゚es Potential in der Erdbevlkerung. Ihre irdische Kontaktperson ist Daniel Carrington. Ein formeller politischer Kontakt muss aber erst eingeleitet werden.\n", + /*167*/ "Skedar-Krieger\n", + /*168*/ "Die Skedar sind eine kriegerische Rasse von Aliens, die schon seit Jahrhunderten gegen die Maianer k舂pfen. Erst krzlich haben sie einem Waffenstillstand zugestimmt. Da sie selbst sehr klein und schlangen臧nlich sind, benutzen sie zur Fortbewegung und im Kampf mechanische Armaturen. Sehr aggressiv! Sie haben Krieg zu einer Religion erhoben und sind extrem devot.\n", + /*169*/ "Hintergrund\n", + /*170*/ "Vor Millionen von Jahren wurde vom Volk der Cetaner ein gewaltiges au゚erirdisches Schlachtschiff auf dem Grunde des Pazifischen Ozeans versenkt. Auf dem Schiff befindet sich eine nicht erprobte Waffe, die theoretisch in der Lage ist, die nukleare Verbindung zwischen jeglichen Moleklen aufzuheben. Um etwaige Beobachter in dem Glauben zu lassen, dasSchiff w舐e zerstrt worden, wurde ein Satellit in das Heimatsystem derCetaner geschickt. Denn in Wirklichkeit handelt es sich bei dem Schiff um einen lebenden Organismus...\n\nEine andere Rasse, die Maianer, entdeckt im Jahr 2000 das Leben auf der Erde. Sie erkennen zwar ein gewisses Potential in der menschlichen Rasse, beschlie゚en aber, die fr sie primitiv wirkenden Menschen sich ohne ihre Einmischung entwickeln zu lassen.\nDie Maianer trafen im Jahr 1650 (Erdzeitrechnung) auf die Skedar. Es kommtzu einem Kampf, der sich zu einem langwierigen Krieg ausweitet. Nach Jahrhunderten des Kampfs entsteht ein unsicherer Frieden. Fanatische Skedar versuchen st舅dig, diesen Frieden durch terroristische Aktionen zu stren. Aber die Maianer lassen sich auf keine Kampfhandlungen ein.\n\nDie Maianer erkennen, dass aufgrund fortschreitender Technologien und gewissen '舫゚eren Einflssen' immer mehr Krisenherde auf der Erde entstehen. Sie befrchten, dass noch mehr Unruhe entstehen knnte, wenn sie ihre Existenz offenbaren wrden. Daher beschlie゚en sie, den Planeten weiter zu beobachten, bis die Menschen ein hheres Entwicklungsstadiumerreicht haben.\n\n1985 greift Daniel Carrington dem Plan der Maianer vor, indem er eines ihrer Schiffe kontaktiert, das die Erde vom Orbit aus beobachtet. Er hat einen Plan, der beiden Parteien von Nutzen sein knnte. Das Resultat w舐e eine schnellere Ann臧erung zwischen Menschen und Maianern. Die Maianer haben Vertrauen in Carrington und erlauben ihm, ihre Technologien auf der Erde einzufhren.\n\n2006 entdecken die fanatischen Skedar den Satelliten der Cetaner. Daraufhin suchen sie die Erde nach dem Schlachtschiff ab. Dabei setzen sie ihre wenig subtilen Methoden ein, zu denen auch die Entfhrung von Menschen und die Verstmmelung von Tieren gehren. Ihre Untersuchungs- ergebnisse weisen auf einen Ort im Pazifischen Ozean hin, wo sie das Schiff auch finden. Allerdings sind sie nicht in der Lage, es ohne Hilfe zu bergen.\n\nNun beginnen die Skedar selbst damit, die Erde zu erforschen. Sie erstellen eine Liste mit Firmen, die ber die ntigen Ressourcen verfgen, um ihnen bei der Bergung behilflich zu sein. An der Spitzedieser Liste steht der Name dataDyne. Cassandra De Vries, der Vorstandder Firma, wird von den Skedar kontaktiert. Ihr wird ein Deal vorgeschlagen, der sich zu gut anhrt, um wahr zu sein - und genauso istes auch. Als Dank fr die Bergungsarbeiten versprechen die Skedar, dasssie dataDyne mit gengend Technologien versorgen, um die Firma zum m臘htigsten Konzern des Planeten zu machen. Alles, was dataDyne tun muss,ist eine knstliche Intelligenz zu erschaffen. Sie sollte in der Lage sein, jeglichen Cetanischen Code knacken zu knnen. Keine leichte Aufgabe,aber durchaus im Bereich des Mglichen. Die Arbeiten beginnen.\n\nCassandra De Vries kontaktiert den Kopf der NSA, Trent Easton, undinformiert ihn ber alle Details. Er soll versuchen, ein Tiefsee-Forschungsschiff der Regierung zu leihen. Aber der Pr舖ident verweigertseine Zusage. Es gibt keine Mglichkeit das Schiff zu stehlen, ohne dassdie Aufmerksamkeit der US-Regierung auf dataDyne gelenkt wird. Daher wirdein Plan ausgeheckt, demzufolge der Pr舖ident durch einen Klon ersetzt werden soll. Auf diese Weise w舐e die Kontrolle in den H舅den von Easton und De Vries. Au゚erdem wrden dadurch noch einige Extra-Vergnstigungen fr die Verschwrer herausspringen, nachdem die Operation der Skedar erstdurchgefhrt worden ist.\n\nAllerdings h舩ten die beiden nicht viel Zeit, sich mit ihrem Triumpf zubrsten, denn die Skedar beabsichtigen, die Cetanische Waffe an der Erde zu testen, bevor sie damit gegen die Maianer vorgehen. Cassandra ist durchihre Machtgier zu sehr geblendet, als dass sie diese Taktik durchschauen knnte. Leider betrifft dieses Verhalten auch Trent Easton, der ebenso durch Visionen von Luxus und Macht hindurch die Tatsachen nicht mehr erkennen kann.\n\nAber dataDyne hat etwas produziert, das durchaus in der Lage ist, dieseGefahr zu erkennen: Der Sapient, die knstliche Intelligenz, die dafrvorgesehen war, die Zutrittscodes des Cetanischen Schiffs zu knacken. Als die Maschine wagt, ihre Bedenken zu 舫゚ern, veranlasst Cassandra De Vries,dass dem Sapienten seine Persnlichkeit entzogen werden soll. In einem Aktder Verzweiflung tritt die Maschinen mit dem Carrington Institut in Kontakt. Unter dem Namen Dr. Caroll dringt ein Hilferuf an Daniel Carringtons Ohr...\n", + /*171*/ "Die Geschichte\n", + /*172*/ "Joanna Dark, eine frischgebackene Agentin, wird damit beauftragt, einenWissenschaftler aus der Forschungsabteilung tief unter dem dataDyne-Geb舫de zu befreien. Ihr Erstaunen ist gro゚, als sie erkennt, dass es sichbei Dr. Caroll um eine KI handelt. Nichtsdestotrotz setzt sie ihre Missionfort, und bringt ihn/es in Sicherheit. W臧rend der Mission wird der Alarmausgelst, und Joanna muss sich bis ins oberste Stockwerk vork舂pfen, um dort von einem Fluchtschiff abgeholt zu werden.\n\ndataDyne erkennt in Daniel Carrington den Drahtzieher dieser Aktion. ZweiTage sp舩er wird er in seiner eigenen Villa als Geisel genommen. Verlangtwird die Aush舅digung der KI im Austausch fr Daniel Carringtons Leben.Was dataDyne nicht wei゚, ist die Tatsache, dass sich die KI bereits in derVilla befindet. Carrington wollte im Gespr臘h mit Dr. Caroll mehr ber dievon dataDyne geplanten Aktivit舩en erfahren. Joanna rettet Daniel, kann aber nicht verhindern, dass Dr. Caroll in die H舅de des Konzers f舁lt.Allerdings konnte Carrington genug Information in Erfahrung bringen, um ein Team Maianischer Spezialisten auf die Erde zu bestellen.\n\nJoanna wird nach Chicago geschickt, um bei einem Meeting der Verschwrerim G5-Building zu spionieren. Sie erf臧rt, dass Trent Easton, der Chef derNSA, ebenso in diese Konspiration verwickelt ist, wie ein seltsamerskandinavischer Mann, der offensichtlich der Kopf des ganzen Plots ist.Nachdem von Trent errtert worden ist, wie er gegen den Pr舖identen vor-gehen mchte, sendet Jo einen Hilferuf an das Institut. Allerdings erf臧rtsie, dass noch eine dringendere Aufgabe auf sie wartet.\n\nDas Spezialisten-Team wurde von den Verschwrern abgefangen. Die ワber-lebenden des Absturzes sowie die Trmmer der Maschine wurden in die Area 51 nach Nevada gebracht. Joanna wird dort abgesetzt, um mit einem anderenAgenten des Instituts Kontakt aufzunehmen. Zusammen sollen sie alle ワber-lebenden und deren Ausrstung in Sicherheit bringen. Nachdem es Joannagelingt, ins medizinische Labor einzudringen, lftet sie das gr゚te Geheimnis des Carrington Instituts: Bei den Verbndeten handelt es sich umMaianer. Aliens, die als Eie Grauen' bekannt sind. Der Au゚erirdische, densie retten kann, wird Elvis genannt. Er war ein Bodyguard des MaianischenBotschafters, der das Spezialistenteam anfhren sollte.\n\nNachdem es Joanna gelungen ist, den einzigen ワberlebenden der MaianischenDelegation zu retten, wendet sie sich wieder dem Pr舖identen und seinerBedrohung durch dataDyne zu. Sie gibt sich als Crew-Mitglied aus, um inBasis zu gelangen, wo die Air Force One stationiert ist. Es gelingt ihrauch, an Bord zu gelangen. W臧rend des Flugs treten Trent und der getarnteSkedar in Aktion. Aber wiederum gelingt es Joanna, beide aufzuhalten.W臧rend Trents Leute das Flugzeug nach dem Pr舖identen absuchen, wird dieser von Joanna zu einer Fluchtkapsel gebracht. Trents Plan w舐e gewesen, den glcklosen Politiker an Bord eines Skedar UFO zu bringen,das an der Air Force One angedockt hat. Jo gelingt es zwar, die Halterungzu besch臈igen, sie schafft es aber nicht, sie zu zerstren. Die Agentinverst舅digt Elvis, der einen Kamikaze-Angriff auf das UFO durchfhrt.Alle drei Vehikel strzen ber Alaska ab. Die Fluchtkapsel kann die AF1 aber noch verlassen.\n\nAls Jo erwacht und versucht, das Insitut zu erreichen, muss sie feststellen, dass ihre ワbertragung durch ein Strsignal der Skedar unter-brochen wird. Sie macht sich auf, um Elvis und den Pr舖identen zu finden.Dabei trifft sie auf getarnte Skedar-Trupps, die nach ihr suchen. Sie folgt einem dieser Trupps bis zu einem Skedar-Schiff, wo sie einen Klondes Pr舖identen findet. Joanna Dark zerstrt den Klon, deaktiviert dasStrsignal und ruft die Kavallerie. Einmal mehr wurden die dunklen Machen-schaften der Skedar vereitelt, der Pr舖ident wurde gerettet, und Trentwird von den Skedar fr seine Inkompetenz grausam bestraft.\n\ndataDyne und die Skedar geben nun nichts mehr auf verdeckte Operationen.Sie stehlen das Tiefsee-Forschungsschiff 'Pelagic II' und machen sich aufden Weg zur Absturzstelle des Cetanischen Raumschiffs. Joanna und Elvisunterbrechen die Aktion und finden heraus, worum es ihren Gegnerneigentlich geht. Anschlie゚end gelangen sie mit einem Tauchboot zum Grunddes Meeres und sehen zum ersten Mal das au゚erirdische Schlachtschiff. DasTeam betritt das Schiff durch den Eingang, der von den Skedar erschaffenwurde und treffen auf einen leblosen Skedar. Offenbar scheint au゚er ihnennoch jemand an Bord zu sein. Nach zahllosen K舂pfen gegen Skedar und Cetaner, erreichen Joanna und Elvis das Herz des Schiffs. Dort angekommendie KI, die einst Dr. Caroll war. Nachdem seine Persnlichkeit wieder hergestellt wurde, dr舅gt er Joanna und Elvis, das Schiff zu verlassen, daer es endgltig zerstren mchte.\n\nZurck im Carrington Institut bereitet sich Joanna fr einen Empfang imWei゚en Haus vor, als sich die Ereignisse pltzlich berstrzen. Die berlebenden Skedar richten ihren Zorn nun gegen jene Personen, die siefr das Scheitern ihrer Mission verantwortlich machen. Joanna durchk舂mtdas Institut, um so viele Angestellte wie mglich zu retten. W臧renddessenattackieren die Skedar alle Teile des Geb舫des. Der Mehrheit der anwesen-Personen gelingt die Flucht. Joanna jedoch wird bewusstlos geschlagen, bevor sie sich in Sicherheit bringen kann.\n\nAls sie das Bewusstsein wiedererlangt, befindet sich Joanna in einer Zellean Bord eines Skedar-Schlachtschiffs. Auch Cassandra De Vries hat das Schicksal ereilt. Allerdings stirbt der Kopf von dataDyne bei dem Versuch,ein Ablenkungsmanver zu starten, um Joanna die Flucht zu ermglichen. Jogelingt es, die Schutzschilde zu deaktivieren. Elvis erscheint mit einigenFreunden, und eine fulminante 1arty' beginnt.\n\nDas gekaperte Schiff gelangt in den Orbit ber dem Kriegsschrein der Skedar. Elvis kann seinen Augen nicht trauen, da es den Maianern niemalsgelungen ist, diesen heiligen Ort der Skedar zu finden. Wird der Schreinzerstrt, w舐e dies auch ein harter Schlage gegen die Moral der Skedar.Auf diese Weise knnte ein anhaltender Frieden, anstatt eines unsicherenWaffenstillstands erzielt werden. Jo macht sich auf die Suche nach demAnfhrer der Skedar, w臧rend Elvis die Maianische Flotte zu Hilfe ruft.\n\nLetztendlich liegt der Schrein in Trmmern. Elvis bittet um eine Unterbrechung des Bombardements, um nach Joanna zu suchen, Glcklicher-weise ist sie am Leben, begraben unter Schutt und Asche. Allerdings h舁t noch ein Skedar ihren Fu゚ umklammert. Elvis gibt ihr eine Waffe, umdieses letzte Hindernis zu beseitigen. Der Schrein wurde zerstrt, die Verschwrung wurde gestoppt, und bei knnen ruhigen Gewissens in den Orbit zurckkehren.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "Die monolithische Firma, zu der dataDyne geworden ist, begann als Systemprogrammierer fr knstliche Intelligenzen. Als klar wurde, dass die Firma ihr Haupteinkommen durch die Zusammenarbeit mit dem Milit舐 bezieht, begann eine junge, aufstrebende Managerin namens Cassandra De Vries Gesch臟te mit Waffenherstellern abzuwickeln. Angebote von Daniel Carrington bezglich einer Zusammenarbeit mit dem Institut im Bereich der Quantentechnik, lehnte sie stets ab. Nach der Fusion mehrerer Firmen schossen die Profite in astronomische Hhen. Nach einem Monat stand ein Vertrag mit der Regierung zur Entwicklung von Waffen. Ein hoher Prozentsatz des Ertrags wurde der Entwicklung von KI-Systemen zugefhrt. Wie sich zeigt, mit hervorragenden Resultaten.\n", + /*175*/ "Carrington Institut\n", + /*176*/ "Als Pfuscher verschrien, schaffte es Daniel Carrington, die erste Anti-Grav-Technologie zu entwickeln. Die dadurch erhaltenen Einknfte trugen dazu bei, das Carrington Institut aufzubauen, eine hochtechnisierte Denkfabrik mitten in den USA. Das Institut ist auch die Ausbildungsst舩te fr Agenten, die in alle L舅der der Welt entsandt werden, um die Fortschritte verschiedener Technologien zu verfolgen. Diese ワberwachungsfunktion hat, schon mehrfach Missbrauch verhindert.\n", + /*177*/ "Beschreibung\n- Eine kleine, ferngesteuerte Kamera fr verdeckte Untersuchungen. Ausgerstet fr spektroskopische Holografie. ヨffnet Tren durch Projektion von Krperw舐me.\n\nTraining\n- Holgrafieren Sie das Terminal des Hackers im Raum nebenan.\n\nBedienung\n- Drcken Sie den Z-Trigger um zu holografieren. Durch Drcken des B-Knopfs werden Tren geffnet. Drcken Sie die R-Taste, um sich umzusehen.\n", + /*178*/ "Beschreibung\n- Verst舐kt Licht, um die Umgebung besser wahrnehmen zu knnen. Lebensformen werden hervorgehoben. Unter normaler Beleuchtung ist die Wahrnehmung berlastet.\n\nTraining\n- Finden Sie den Lichtschalter im Dunkeln und bet舩igen Sie ihn.\n\nBedienung\n- W臧len Sie das Nachtsichtger舩 aus Ihrem Inventar. W臧len Sie es nochmals, um es zu deaktivieren.\n", + /*179*/ "Beschreibung\n\n- Vorrichtung um Codes zu knacken. Wird an den jeweiligen Kontrollen angebracht, und geht alle Varianten durch, bis das Schloss geffnet wird.\n\nTraining\n- Setzen Sie den Decoder an der Konsole neben der Tr ein, um sie zu ffnen.\n\nBedienung\n- Stellen Sie sich neben die Konsole und drcken Sie den B-Knopf, nachdem Sie den Decoder ausgew臧lt haben.\n", + /*180*/ "Beschreibung\n\n- Dient dazu, durch feste Objekte zu sehen. Macht Dinge sichtbar, die das Nachtsichtger舩 und die IR-Brillen nicht erfassen knnen.\n\nTraining\n- Suchen Sie mit dem Rntgen-Scanner die zwei versteckten Schalter, und schalten Sie mit ihnen die Laser ab.\n\nBedienung\n- W臧len Sie den Scanner aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*181*/ "Beschreibung\n\n- Verkleiden Sie sich, um nicht erkannt zu werden. Achten Sie aber darauf, nicht von einem scharfsinnigen Gegner demaskiert zu werden.\n\nTraining\n- Grimshaw hat eine Tarnkappe, die mal zum 'Service' msste. Gehen Sie zu ihm und 'erlangen' Sie sie.\n\nBedienung\n- Um die Verkleidung zu tragen, w臧len Sie sie aus Ihrem Inventar.\n", + /*182*/ "Beschreibung\n\n- Verwandelt thermische Daten in sichtbare Bilder. Kann auch in der Dunkelheit benutzt werden. Zeigt auch Anomalien, wie versteckte Tren und brchige W舅de.\n\nTraining\n- Aktivieren Sie den Scanner, finden Sie die Tr und ffnen Sie sie.\n\nBedienung\n- W臧len Sie den Scanner aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*183*/ "Beschreibung\n- Ortet ein bestimmtes Objekt auf einer Radar-Karte. Zeigt auch die relative Lage und Entfernung.\n\nTraining\n- Aktivieren Sie den Tracker und folgen Sie der Signatur, um den Gegenstand zu finden.\n\nBedienung\n- W臧len Sie den Tracker aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*184*/ "Beschreibung\n- Unterbricht das sichtbare Lichtspektrum rund um den Tr臠er. Erschafft einen cham舁eon臧nlichen Effekt. Das Feld bricht zusammen, wenn der Tr臠er eine Waffe abfeuert.\n\nTraining\n- Aktivieren Sie die Tarnkappe und gehen Sie zu Carrington, um ihn zu berraschen!\n\nBedienung\n- W臧len Sie die Tarnkappe aus Ihrem Inventar. W臧len Sie sie nochmals, um sie zu deaktivieren.\n", + /*185*/ "Beschreibung\n- Sendet ein st舅dig wechselndes Signal, um jegliche elektronische Kommunikation zu stren. Muss direkt am Objekt platziert werden.\n\nTraining\n- Werfen Sie die ECM-Mine an den Schaltblock hinter der versteckten Tr.\n\nBedienung\n- Drcken Sie den Z-Trigger, um die Mine zu werfen. Halten Sie den R-Knopf gedrckt und zielen Sie mit dem analogen 3D-Stick.\n", + /*186*/ "Beschreibung\n- Stellt eine Verbindung zwischen dem Agenten und den Hackern des Instituts her, die dann Daten kopieren oder elektronisch gesicherte Schlsser knacken knnen.\n\nTraining\n- Hacken Sie sich mit dem Data Uplink in das Terminal in der Ecke, um eine geheime Tr zu ffnen.\n\nBedienung\n- Stellen Sie sich neben das Terminal und drcken Sie den B-Knopf, nachdem Sie den Uplink ausgew臧lt haben.\n", + /*187*/ "SCHIESSEN\n Drcken Sie den Z-Trigger, um eine Waffe abzufeuern.\n", + /*188*/ "AUTO RELOAD\n Lassen Sie den Z-Trigger los, wenn Sie keine Munition mehr haben.\n", + /*189*/ "MANUELLER RELOAD\n Drcken Sie den B-Knopf, um manuell nachzuladen.\n", + /*190*/ "Zielen: Halten Sie die R-Taste gedrckt, um den Ziel-Modus zu aktivieren.\n", + /*191*/ "Justieren Sie Ihr Visier, indem Sie den analogen 3D-Stick bewegen.\n", + /*192*/ "AUTO FEUER\n Halten Sie den Z-Trigger gedrckt, um automatisch zu feuern.\n", + /*193*/ "ZIELHヨHE\n Drcken Sie die C-Knpfe oben oder unten, um die Sicht anzupassen.\n", + /*194*/ "ZOOM\n Halten sie die R-Taste gedrckt, um den Zoom-Modus zu aktivieren.\n", + /*195*/ "SCHNELLFEUER\n Drcken Sie den Z-Knopf in rascher Abfolge, um schneller zu feuern.\n", + /*196*/ "Carrington Institut\0|Basis der Operationen\n", + /*197*/ "Lucerne Tower\0|Globales Hauptquartier\n", + /*198*/ "Laboratorgeschoss\0|Unterirdisches Forschungslabor\n", + /*199*/ "Carrington Villa\0|Private Residenz\n", + /*200*/ "Chicago\0|Die dunklen Gassen der Stadt\n", + /*201*/ "G5-Building\0|Deckmantel der dataDyne Corporation\n", + /*202*/ "Area 51\0|Nahe dem Groom Dry Lake, Nevada\n", + /*203*/ "Sttzpunkt Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Das Flugzeug des Pr舖identen\n", + /*205*/ "Absturzstelle\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Spezialisiertes Tiefsee-Forschungsschiff\n", + /*207*/ "Cetanisches Schiff\0|Die gr゚te au゚erirdische Struktur auf der Erde\n", + /*208*/ "Skedar-Schiff\0|Raumfschiff fr Truppentransporte\n", + /*209*/ "Heimat der Skedar\0|Der Planet des Kriegs-Schreins\n", + /*210*/ "Jumpship\0|Agiler Truppentransporter\n", + /*211*/ "HoverCrate\0|Antigraviations-Vorrichtung\n", + /*212*/ "HoverBike\0|Niedrigfliegendes Vehikel\n", + /*213*/ "Reinigungs-Roboter\0|Dein hilfreicher kleiner Freund\n", + /*214*/ "Hovercopter\0|Urbanes Gunship\n", + /*215*/ "G5-Roboter\0|Urbaner Kampf-Droid\n", + /*216*/ "A51 Interceptor\0|Robotische Abfang-Einheit\n", + /*217*/ "Maianisches Schiff\0|Sp臧- und Patrouillen-Schiff\n", + /*218*/ "Skedar-Shuttle\0|Truppen-Landungsschiff\n", + /*219*/ "Das Instituts-Geb舫de beinhaltet viele verschiedene Bereiche: Bros und Laboratorien, Workshops und Hangars. Da es von der Au゚enwelt relativ isoliert ist, knnen die Operationen leichter verdeckt werden.\n", + /*220*/ "Mitten im Gesch臟tsviertel hebt sich der dataDyne-Wolkenkratzer durch seine enorme Gr゚e von der Umgebung ab.\n", + /*221*/ "Die schwer bewachten, gut versteckten Labors beinhalten den Schlssel zu dataDynes Zukunft. In ihnen arbeiten Techniker an streng geheimen Projekten, die dataDyne noch weiter nach oben bringen sollen.\n", + /*222*/ "Daniel Carringtons Residenz ist quasi sein Fluchtort vor dem Stress innerhalb des Instituts. Neben einem Observatorium verfgt die Villa einen Windkraft-Generator und einen gut ausgestatteten Weinkeller.\n", + /*223*/ "Ein schmutziger, verkommener Stadtteil Chicagos, abgeschnitten vom Bodenverkehr. Hier hat die G5-Corporation ihr Hauptquartier.\n", + /*224*/ "Im G5-Building befindet sich ein Meetingraum, der durch Anti-Aufnahme-Ger舩e geschtzt wird. Dies ist fr dataDyne der sicherste Ort, um vertrauliche Pl舅e zu besprechen.\n", + /*225*/ "Diese Sektion des als Area 51 bekannten Luftwaffensttzpunktes befindet sich nahe des Groom Dry Lake. Helipads und Kommunikationstrme lassen Rckschlsse auf die Gr゚e des unterirdischen Komplexes zu.\n", + /*226*/ "Eine von mehreren Luftbasen, die als Etappenziele der Air Force One dienen. Typischerweise befindet sich die Basis in einer sehr unwirtlichen Umgebung, geschtzt vor nicht autorisierten Augen.\n", + /*227*/ "Diese spezielle Air Force One wurde fr kalte Klimata optimiert. Sehr ntzlich, wenn sie in Nord-Alaska eingesetzt wird. Die Destination ist Oslo, Norwegen.\n", + /*228*/ "Das abgeschossene Flugzeug kam in einem felsigen, eisbedeckten Landstrich im Arktischen Kreis zu einem abrupten Stillstand.\n", + /*229*/ "Die Pelagic II befindet sich im Besitz der US-Regierung. Das Schiff ist in der Lage, Tiefsee-Operationen unter allen meteorologischen Bedingungen durchzufhren. Dies ist das einzige Schiff seiner Art.\n", + /*230*/ "Ein riesenhaftes Schiff extraterrestrischer Herkunft, das schon seit Millionen von Jahren auf dem Meeresgrund liegt.\n", + /*231*/ "Ein interplanetares Schiff, das Skedar-Krieger zu ihrem Einsatzort bringt. Teil der stark reduzierten Skedar-Kampfflotte.\n", + /*232*/ "Ein sehr trockener, von Erdbeben, Sandstrmen und Hurricanes zerfurchter Planet. Teil eines komplexen Sonnensystems, in dessen Zentrum sich drei Sonnen befinden.\n", + /*233*/ "Ein kleines, schnelles und gut manvrierbares Flugger舩. Geeignet, um Agenten in urbanen Gebieten abzusetzen. Kann sowohl computergesteuert, als auch ferngesteuert werden. Bietet Platz fr bis zu vier Agenten.\n", + /*234*/ "Ein Antigravitations-System zur Untersttzung bei Verladearbeiten. Wird an der Seite einer Kiste angebracht. Ein AG-Feld hebt die Kiste an, und hebt ein wenig der Tr臠heit auf.\n", + /*235*/ "Eine niedrigfliegende Patrouillen-Einheit. Setzt ein kleines AG-Ger舩 ein, um zu schweben. Der Antrieb erfolgt ber zwei starke Turbinen.\n", + /*236*/ "H舁t alles rein und sauber. Hat Zugang zu allen Bereichen eines Geb舫des. Es wird geraten, diese Roboter nicht zu besch臈igen, da sie teilweise fr einen alternativen Zugang zu stark bewachten R舫men ermglichen.\n", + /*237*/ "Ein urbanes Patrouillen-Vehikel. Die Besatzung besteht aus zwei Mann, bewaffnet mit einer Vulcan-Kanone und zwei Raketenwerfern. Kann durchaus durch MG-Feuer oder einer gut gezielten Rakete abgeschossen werden.\n", + /*238*/ "Ein Kampfroboter fr urbane Eins舩ze. Setzt AG-Technik ein, um zu schweben. Schwer bewaffnet und gepanzert. Wird meist eingesetzt, um unwillkommene G舖te fernzuhalten. Frei nach dem Motto: Zuerst schie゚en, dann fragen.\n", + /*239*/ "Eine robotische Variante des Hoverbike, verfgt ber st舐kere AG-Technik und Turbinen. Erreicht alle Geschwindigkeiten von Schrittgeschwindigkeit bis Mach 2. Obwohl gut bewaffnet, liegt sein Vorteil in der Manvrierbarkeit.\n", + /*240*/ "Designed fr einen Maianischen Piloten. Ein Passagier wrde sich sehr eingeengt fhlen - ein menschlicher Passagier noch mehr!\n", + /*241*/ "Kann bis zu zehn voll bewaffnete und ausgerstete Skedar transportieren. Unsichtbar fr konventionelles Radar. Sendet starke Strsignale ber eine weite Entfernung aus, um Kommunikation und Erfassung unmglich zu machen.\n", + /*242*/ "Beschreibung\n- Ein guter Agent bemerkt alles um ihn herum.\n\nTraining\n- Untersuchen Sie alle Objekte, indem Sie sie betrachten.\n\nBedienung\n-nach oben schauen - Drcken Sie den C-Knopf unten\n-nach unten schauen - Drcken Sie den C-Knopf oben.\n-Individuelle Sicht - Halten Sie die R-Taste gedrckt und ver舅dern sie die Sicht mit dem analogen 3D-Stick.\n", + /*243*/ "Beschreibung\n- Sidesteps und Strafing knnen Ihnen aus der Patsche helfen.\n\nTraining\n- Bet舩igen Sie alle Schalter. Sie mssen schnell sein, da sich die Schalter rasch zurcksetzen.\n\nBedienung\n- Sidestep links - Drcken Sie den C-Knopf links.\n- Sidestep rechts - Drcken Sie den C-Knopf rechts.\n\n", + /*244*/ "Beschreibung\n- Durch Ducken und Hocken knnen Sie neue Bereiche finden.\n\nTraining\n- Arbeiten Sie sich an den Hindernissen vorbei, und bet舩igen Sie die Schalter.\n\nBedienung\n- Ducken - Halten Sie die R-Taste gedrckt und drcken Sie den C-Knopf unten.\n- Hocken - Halten Sie beim Ducken den C-Knopf unten gedrckt.\n- Aufstehen - R-Taste drcken.\n\n", + /*245*/ "Beschreibung\n- Ein unbewaffneter Kampf gegen mehrere Gegner kann mitunter sehr schwierig sein.\n\nTraining\n- Schlagen Sie alle Gegner KO, ohne selbst getroffen zu werden.\n\nBedienung\n- Schlag - Drcken Sie den Z-Trigger in schneller Abfolge, um dem Gegner mehrere Schl臠e zu verpassen.\n\n", + /*246*/ "Beschreibung\n- Wenn Sie einen Gegner entwaffnen, bringt Ihnen das vielleicht eine neue Waffe.\n\nTraining\n- Entwaffen Sie alle Gegner, ohne selbst getroffen zu werden.\n\nBedienung\n- Entwaffnen - Halten sie den B-Knopf gedrckt und drcken Sie den Z-Trigger, um einen Gegner zu entwaffnen.\n- KO-Schlag - Schlagen Sie einen unachtsamen Gegner von hinten nieder.\n", + /*247*/ "Beschreibung\n- Unbewaffneter Kampf gegen mehrere Gegner.\n\nTraining\n- Besiegen Sie alle unbewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*248*/ "Beschreibung\n- Unbewaffneter Kampf gegen bewaffnete und unbewaffnete Gegner.\n\nTraining\n- Besiegen Sie alle bewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*249*/ "Nutzen Sie den Zielmodus, um gr゚ere Pr艘ision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*250*/ "ワberlegen Sie sich, wohin Sie gehen wollen, bevor sie loslegen. Stellen Sie sich so auf, dass Sie ein Minimum an Bewegung aufbringen mssen, wenn Sie sich zwischen den Zielen bewegen.\n", + /*251*/ "Wenn Sie sich ducken, erreichen Sie Orte, die fr Sie ansonsten unzug舅glich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen knnen. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*252*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie mssen. Halten Sie sich fr einen raschen Rckzug bereit, wenn der Gegner seinerseits zum Angriff bergeht.\n", + /*253*/ "Bleiben Sie nur solange in der N臧e des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschlie゚end au゚er Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*254*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen knnen, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*255*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschlie゚end ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*256*/ "Nutzen Sie den Zielmodus, um gr゚ere Pr艘ision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*257*/ "Sidesteps und Strafing knnen Ihnen aus der Patsche helfen.\n", + /*258*/ "Wenn Sie sich ducken, erreichen Sie Orte, die fr Sie ansonsten unzug舅glich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen knnen. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*259*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie mssen. Halten Sie sich fr einen raschen Rckzug bereit, wenn der Gegner seinerseits zum Angriff bergeht.\n", + /*260*/ "Bleiben Sie nur solange in der N臧e des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschlie゚end au゚er Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*261*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen knnen, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*262*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschlie゚end ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*263*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Ger舩 anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*264*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie mglich. Adjustieren Sie Ihr Ziel mit den C-Knpfen oder gehen Sie in den Ziel-Modus.\n", + /*265*/ "Der CamSpy kann schwierig zu steuern sein. Lassen Sie sich Zeit.\n", + /*266*/ "Ntzlich im Kampf, aber achten Sie auf ワberladung.\n", + /*267*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich n臧er ans Zielobjekt.\n", + /*268*/ "Der Tracker gibt nur die Richtung und relative Hhe an. Er verfgt ber keine Kartenfunktion, die Sie direkt zum Ziel fhrt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*269*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen fhren kann. Sch舩zen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*270*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschr舅kt, setzen Sie daher dieses Ger舩 nur im Bedarfsfall ein.\n", + /*271*/ "Eine berzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Tr臠ers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*272*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier 舫゚erst wichtig.\n", + /*273*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Ger舩 anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*274*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie mglich. Adjustieren Sie Ihr Ziel mit den C-Knpfen oder gehen Sie in den Ziel-Modus.\n", + /*275*/ "Der CamSpy ist nicht unsichtbar. Er knnte entdeckt werden, also Vorsicht, wenn Sie in belebtem Gebiet operieren. Vergessen Sie nicht, das der CamSpy an dem Ort bleibt, an dem Sie ihn abgelegt haben.\n", + /*276*/ "Ntzlich im Kampf, aber achten Sie auf ワberladung. Versuchen Sie, die Situation abzusch舩zen, und reagieren Sie, bevor es der Gegner tut.\n", + /*277*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich n臧er ans Zielobjekt.\n", + /*278*/ "Der Tracker gibt nur die Richtung und relative Hhe an. Er verfgt ber keine Kartenfunktion, die Sie direkt zum Ziel fhrt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*279*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen fhren kann. Sch舩zen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*280*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschr舅kt, daher setzen Sie dieses Ger舩 nur im Bedarfsfall ein.\n", + /*281*/ "Eine berzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Tr臠ers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*282*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier 舫゚erst wichtig. Vermeiden Sie es, eine Waffe abzufeuern, bevor Sie sich nicht 100 %%ig sicher sind, einen Treffer zu landen.\n", + /*283*/ "Die Falcon 2 ist eine sehr genaue Handfeuerwaffe. Jeden Fehlschuss verantworten Sie daher selbst. Die Sekund舐-Funktion ist ein Knaufhieb und somit am Schie゚stand nutzlos.\n", + /*284*/ "Zur Erhhung der Genauigkeit wurde ein Zielfernrohr an der Waffe montiert. Ebenso wie bei der nicht modifizierten Version, ist die Sekund舐-Funktion am Schie゚stand leider nutzlos.\n", + /*285*/ "Die schallged舂pfte Version der Falcon 2 eignet sich hervorragend dazu, gegenber Ihren Gegnern den ワberraschungsmoment zu nutzen. Testen Sie Ihre Genauigkeit, um sicherzugehen, keine Chance zu verpassen.\n", + /*286*/ "Die Magsec 4 stellt Feuerkraft in den Vordergrund. Dies zeigt sich speziell im Dreifach-Schu゚ Sekund舐-Modus. Der einzige Nachteil ist das kleine Magazin.\n", + /*287*/ "Eine typische Skedar-Waffe, brutal und kraftvoll. Wenn Sie bereit sind, ein wenig mehr Munition zu opfern, knnen Sie den Schu゚ um ein Vielfaches verst舐ken.\n", + /*288*/ "Diese vielseitige Pistole hat zwei verschiedene Feuer-Modi. Ein Standard-Schuss, oder ein Explosiv-Geschoss. Die Maianischen Ingenieure haben es geschafft, diese Funktion nicht auf Kosten der Munition, sondern der Feuerrate zu integrieren.\n", + /*289*/ "Der Schlssel zur DY357 ist das Wissen, wann nachzuladen ist. Ein sechs Schuss umfassendes Magazin erfordert Ihre Aufmerksamkeit. Das Gewicht der Waffe kann sich als ntzlich erweisen, wenn Sie jemanden damit niederschlagen.\n", + /*290*/ "Trent Easton sucht immer nach dem gewissen Etwas, und diese Waffe ist keine Ausnahme. Das gleiche gilt fr die Kugeln. Sind sie ins Ziel eingedrungen, zerbersten sie in tausend Stcke.\n", + /*291*/ "Ein verl舖sliches und effektives Maschinengewehr. Es steht wohl fest, warum diese Waffe der dataDyne-Bestseller der letzten zwei Jahre ist. Dabei ist die Sekund舐- Funktion noch gar nicht mit in Betracht gezogen. Das Zielauswahl-System ist ein exzellentes Feature, dass Ihnen viel トrger ersparen kann.\n", + /*292*/ "Das Cyclone-Maschinengewehr wurde speziell dafr designed, NICHT genau zu sein. Sie sollten trotzdem ausgiebig damit trainieren. Die weite Streuung der Kugeln eignet sich hervorragend, Feuerschutz zu geben.\n", + /*293*/ "Dieses Maschinengewehr entsprang Maianischer Flexibilit舩 und verfgt ber eine interessante Sekund舐-Funktion: ein Hochgeschwindigkeits-Schuss, der feste Objekte leicht durchdringt. In diesem Modus wird die Feuerrate natrlich reduziert, um den Mechanismus zu schonen.\n", + /*294*/ "Die RC-P120 verwendet spezielle Mineral-Kugeln, gepaart mit hoher Feuerrate und einem gro゚en Magazin. Die perfekte Waffe im Einsatz gegen die Skedar. Die Kugeln knnen auch als Energielieferant fr die integrierte Tarnfuktion eingesetzt werden. Das Training wurde diesem Umstand angepasst.\n", + /*295*/ "Die Waffe kann nicht nur als Laptop getarnt werden, als Sekund舐-Funktion kann sie auch als Selbstschussanlage an der entsprechenden Postion installiert werden.\n", + /*296*/ "Dieses Modell wurde von dataDyne erfolgreich im US-Milit舐 eingefhrt. In ワberein-stimmung mit dataDynes Tendenz, den Leuten bse ワberraschungen zu bereiten, wurde dem Basismodell eine Ann臧erungs-Mine eingebaut. Wird der Sekund舐-Modus aktiviert, bedeutet das, dass die Waffe fortgeworfen werden muss.\n", + /*297*/ "So weit wir es beurteilen knnen, verfgt die Waffe als Sekund舐-Funktion ber einen Sensor, der mgliche Gefahrenquellen ortet und anzeigt. Obwohl die Waffe sehr stark ist, verfgt das Magazin ber ein nur kleines Fassungsvermgen. \n", + /*298*/ "Der erste Versuch des Instituts, eine untersttzende Zweitwaffe zu kreieren, resultierte in diesem Modell. Der Sekund舐-Modus ist ein permanenter Zoom.\n", + /*299*/ "Die schwerere Variante des Dragon. Die Ann臧erungsmine wurde durch einen kleinen Granatwerfer ersetzt. Im US-Milit舐 hat diese Waffe klarerweise gro゚en Anklang gefunden. Gewhnen Sie sich im Training an die Flugbahn der Granaten.\n", + /*300*/ "Subtilit舩 z臧lt hier nicht. Zwei Modi stehen zur Verfgung: einfacher Schuss und Doppelschuss. Das Magazin ist relativ gro゚, die Ladezeiten jedoch eher lang.\n", + /*301*/ "Ein gut verarbeitetes, schallged舂pftes Sniper-Gewehr mit hervorragendem Zoom. Das Einzige, was die Genauigkeit mindern knnte, ist der Schtze. Gehen Sie in die Hocke, um Ihr Ziel besser fixieren zu knnen.\n", + /*302*/ "Obwohl die Technologie schon etwas berholt ist, sch舩zen wir noch immer die F臧igkeiten des Fernsicht-Gewehrs. Der Schuss ist nahezu unaufhaltbar, die Zielerfassung geht bis zu einem gewissen Grad sogar durch W舅de.\n", + /*303*/ "Die Prim舐-Funktion feuert einen vergifteten Bolzen ab, der allerdings nicht viel Schaden anrichtet. Sehrwohl aber der Sekund舐-Schuss. Es handelt sich um eine Tarn-Waffe mit langer Ladezeit. Daher eher unpraktisch im Feuergefecht.\n", + /*304*/ "Das Bet舫bungsgewehr findet in seinen Grundzgen in vielen medizinischen Labors und Krankenh舫sern Verwendung. Die Dosis des Bet舫bungsmittels kann, bei kurzen Distanzen, erhht werden, um die Wirkung zu vervielfachen.\n", + /*305*/ "Versuchen Sie, diese Waffe unter Kontrolle zu halten. Sie wurde definitiv nicht fr einen menschlichen Schtzen konzipiert. Wenn Sie in die Knie gehen, knnen Sie Ihr Ziel leichter erfassen. Es ist stark zu bezweifeln, dass auch nur ein Feind an den Feuerst゚en vorbeikommt.\n", + /*306*/ "Ein neueres dataDyne-Produkt mit einer sehr interessanten Technologie. Die Sekund舐-Funktion legt ein magnetisches Feld um die Bombe, wodurch eine Haftung an W舅den er-mglicht wird. Nach einiger Zeit f舁lt die Bombe zu Boden und detoniert.\n", + /*307*/ "Ein kompakter, wiederverwendbarer Raketenwerfer. L臈t nach jedem Schuss selbst nach. Die Sekund舐-Funktion ermglicht die Aufschaltung auf ein Ziel. Die Rakete bewegt sich in diesem Modus langsamer. Planen Sie dies beim Timing Ihrer Schsse ein.\n", + /*308*/ "Der handliche Skedar-Raketenwerfer feuert entweder eine normale Rakete, oder eine ferngelenkte Rakete ab. Vermutlich verschafft diese Funktion den Skedar eine perverse Befriedigung, da sie das flchtende Ziel durch eine Kamera beobachten knnen. Ein Agent des Carrington Instituts findet dafr natrlich keine Verwendung. Die Detonation erfolgt bei Zielkontakt oder via Auslser.\n", + /*309*/ "Ein gut ausgewogenes Kampfmesser, das sich auch als Wurfmesser eignet. ワbung ist unumg舅glich, wenn Sie diese Waffe meistern wollen.\n", + /*310*/ "Die Experimentalwaffen-Abteilung hat einen kleinen, aber sehr effektiven Laser entwickelt. Zwei Feuermodi sind verfgbar. Einerseits kann ein Langstrecken-Laser abgefeuert werden, andererseits ist auch ein wesentlich st舐kerer Kurzstrecken-Laser verfgbar.\n", + /*311*/ "Diese Splitter-Granate detoniert vier Sekunden nach Aktivierung. Zu Ihrer Unterhaltung haben wir eine zweite Funktion integriert: Ann臧erungs-Pinball! Die Granate wird umherspringen, bis der Timer abgelaufen ist, oder der Sensor eine Bewegung erfasst und die Granate zur Detonation bringt.\n", + /*312*/ "Diese Maianische Granate vergreift sich an den Neuronen denkender Kreaturen. Sollten Sie sich im Detonationsradius befinden, verschwimmt Ihre Sicht und Sie lassen alles fallen, was sich in Ihren H舅den befindet. Die Detonation erfolgt bei Kontakt oder bei Ann臧erung.\n", + /*313*/ "Um Zeitznder-Minen effektiv einzusetzen, ist gutes Timing Voraussetzung. Andernfalls knnte das Ziel einfach an der Mine vorbeilaufen. Verbessern Sie Ihre F臧igkeiten im Training, bevor Sie im Einsatz einen kritischen Fehler begehen. Bei der Sekund舐-Funktion handelt es sich um den allseits beliebten Gefahren-Anzeiger.\n", + /*314*/ "Der Schlssel zur erfolgreichen Platzierung von Ann臧erungs-Minen ist, sie dort zu platzieren, wo sie der Gegner nicht erwartet. Sollten Sie selbst in so ein Minenfeld geraten, nutzen Sie den Sekund舐-Modus, der einen Gefahren-Anzeiger beinhaltet. Etwas zeitaufwendig, aber mitunter berlebensnotwendig.\n", + /*315*/ "Wiederum eine neue Variante ferngezndeter Minen, die aber auf dem blichen Prinzip aufbaut. Die Prim舐-Funktion platziert die Mine, die Sekund舐-Funktion l舖st sie detonieren. Knnen Sie die Mine nicht sehen, mssen Sie sich auf Ihr Gefhl verlassen. \n", + /*316*/ "Holo 1 - Umschauen\n", + /*317*/ "Holo 2 - Bewegung 1\n", + /*318*/ "Holo 3 - Bewegung 2\n", + /*319*/ "Holo 4 - Unbewaffnet 1\n", + /*320*/ "Holo 5 - Unbewaffnet 2\n", + /*321*/ "Holo 6 - Live-Kampf 1\n", + /*322*/ "Holo 7 - Live-Kampf 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_i.c b/src/files/lang/pal-beta/dish_str_i.c new file mode 100644 index 000000000..91487fb0b --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_i.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Innanzitutto prendi la Vista Notturna dal tavolo.\n", + /* 9*/ "Attiva la Vista Notturna.\nTrova interruttore.\nRiaccendi le luci.\n", + /* 10*/ "Prendi il Connettore Dati dal tavolo.\n", + /* 11*/ "Avvicinati al terminale e usa il Connettore Dati.\n", + /* 12*/ "Devi tenere in mano il Connettore Dati.\n", + /* 13*/ "Stabilito collegamento...\n", + /* 14*/ "Il codice del terminale stato decifrato.\n", + /* 15*/ "Collegamento interrotto: sei troppo lontano dal PC.\n", + /* 16*/ "Prendi la mina ECM dal tavolo.\n", + /* 17*/ "Trova la centralina e piazzale sopra una mina ECM.\n", + /* 18*/ "Mina ECM piazzata correttamente.\n", + /* 19*/ "Mina ECM in posizione errata.\n", + /* 20*/ "Prendi la TeleSpia dal tavolo.\n", + /* 21*/ "Trova il PC sala informazioni per l'olografia.\n", + /* 22*/ "Olografia riuscita.\n", + /* 23*/ "Riattivate le luci.\n", + /* 24*/ "Prendi il decodificatore porta dal tavolo.\n", + /* 25*/ "Usa il decodificatore per sbloccare la porta.\n", + /* 26*/ "Devi tenere in mano il decodificatore porta.\n", + /* 27*/ "Applicato decodificatore. Decodifica in corso...\n", + /* 28*/ "Decodifica completata. La porta stata sbloccata.\n", + /* 29*/ "Prendi il puntatore dal tavolo.\n", + /* 30*/ "Trova lo scanner a infrarossi con il puntatore.\n", + /* 31*/ "Trovato lo scanner a infrarossi.\n", + /* 32*/ "Prendi lo scanner a infrarossi dal tavolo.\n", + /* 33*/ "Trova la porta segreta con lo scanner a infrarossi.\n", + /* 34*/ "Trovata la porta segreta.\n", + /* 35*/ "Prendi lo scanner a raggi X dal tavolo.\n", + /* 36*/ "Trova gli interruttori e disattiva le griglie laser.\n", + /* 37*/ "Disattivate tutte le griglie laser.\n", + /* 38*/ "Prendi il travestimento dal tavolo.\n", + /* 39*/ "Convinci qualcuno a darti il dispositivo mimetico.\n", + /* 40*/ "Trovato il dispositivo mimetico.\n", + /* 41*/ "Disattivata la griglia laser 1.\n", + /* 42*/ "Disattivata la griglia laser 2.\n", + /* 43*/ "Sono qui per prendere l'attrezzatura.\n", + /* 44*/ "Vattene, Joanna. Non mi far fregare da te!\n", + /* 45*/ "Ecco a te! E adesso non perderlo!\n", + /* 46*/ "Ricevuto il dispositivo mimetico.\n", + /* 47*/ "Devi usare il travestimento, ricordi?\n", + /* 48*/ "Puoi fare di meglio, Joanna.\n", + /* 49*/ "Joanna, da dove te ne sei sbucata?\n", + /* 50*/ "Sei stata scoperta dalle telecamere!\n", + /* 51*/ "Prendi il dispositivo mimetico dal tavolo.\n", + /* 52*/ "Usa il dispositivo mimetico e trova Carrington.\n", + /* 53*/ "Credo proprio che il tuo addestramento\nsia completo!\n", + /* 54*/ "Missione compiuta - Addestramento superato!\n", + /* 55*/ "Missione fallita - Sei stata scoperta!\n", + /* 56*/ "Seleziona il Connettore Dati.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il Connettore Dati e rilascia A.\n", + /* 57*/ "Seleziona la TeleSpia.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la TeleSpia e rilascia A.\n", + /* 58*/ "Seleziona la Vista Notturna.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la Vista Notturna e rilascia A.\n", + /* 59*/ "Seleziona il decodificatore porta.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il decodificatore porta e rilascia A.\n", + /* 60*/ "Seleziona lo scanner a raggi X.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli lo scanner a raggi X e rilascia A.\n", + /* 61*/ "Seleziona il travestimento.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il travestimento e rilascia A.\n", + /* 62*/ "Seleziona lo scanner a infrarossi.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli scanner a infrarossi e rilascia A.\n", + /* 63*/ "Seleziona il puntatore.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il puntatore e rilascia A.\n", + /* 64*/ "Seleziona il dispositivo mimetico.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il dispositivo mimetico e rilascia A.\n", + /* 65*/ "Seleziona la mina ECM.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la mina ECM e rilascia A.\n", + /* 66*/ "Joanna, vedo che stai bene!\n", + /* 67*/ "Seguimi!\nTi condurr al reparto addestramento.\n", + /* 68*/ "Il centro informazioni oltre questa porta.\n", + /* 69*/ "Qui abbiamo il laboratorio strumentazioni.\n", + /* 70*/ "Questo porta al reparto addestramento replicanti.\n", + /* 71*/ "Questo il poligono di tiro.\n", + /* 72*/ "Questo corridoio porta all'hangar.\n", + /* 73*/ "ANTIGRAVITタ\nPremi B vicino all'Antigravit per prenderlo...\n", + /* 74*/ "Premi B di nuovo per lasciarlo.\n", + /* 75*/ "AEROMOTO\nPremi B due volte vicino all'Aeromoto per salire...\n", + /* 76*/ "Premi B due volte per scendere dall'aeromoto.\n", + /* 77*/ "PORTE\nPremi B vicino ad una porta per aprirla.\n", + /* 78*/ "Il pulsante B attiver anche qualsiasi strumento l vicino.\n", + /* 79*/ "ASCENSORI\nPremi B vicino all'ascensore per chiamarlo.\n", + /* 80*/ "Impossibile uscire durante l'addestramento.\n", + /* 81*/ "Ottenuto codice di accesso 1.\n", + /* 82*/ "Ottenuto codice di accesso 2.\n", + /* 83*/ "Ottenuto codice di accesso 3.\n", + /* 84*/ "Ottenuto codice di accesso 4.\n", + /* 85*/ "GUARDA IN SU\n- Premi C verso il basso per guardare in alto.\n", + /* 86*/ "GUARDA IN GIル\n- Premi C verso l'alto per guardare in basso.\n", + /* 87*/ "Completato l'oloprogramma 2.\n", + /* 88*/ "Completato l'oloprogramma 4.\n", + /* 89*/ "Completato l'oloprogramma 5.\n", + /* 90*/ "La guardia stata disarmata.\n", + /* 91*/ "La guardia stata messa KO.\n", + /* 92*/ "Disarma quest'avversario in movimento se ci riesci.\n", + /* 93*/ "Metti KO quest'avversario... ci vuole agilit!\n", + /* 94*/ "Ecco l'ultima guardia...\n", + /* 95*/ "SCHIVA\n- Tieni premuto R, poi premi C verso il basso.\n", + /* 96*/ "ACCUCCIATI\n- Tieni premuto R, poi premi e tieni premuto C verso il basso.\n", + /* 97*/ "Completato l'oloprogramma 3.\n", + /* 98*/ "Attiva tutti gli interruttori.\n", + /* 99*/ "Attiva tutti gli interruttori a parete.\n Fai presto o saranno resettati.\n", + /*100*/ "Scopri i codici d'accesso esaminando i terminali.\n Usa i codici per i terminali a parete.\n", + /*101*/ "Scoperto codice 1.\n", + /*102*/ "Scoperto codice 2.\n", + /*103*/ "Scoperto codice 3.\n", + /*104*/ "Scoperto codice 4.\n", + /*105*/ "Addestramento fallito - Devi guardare avanti.\n", + /*106*/ "Completato l'oloprogramma 1.\n", + /*107*/ "Combattimento corpo a corpo: stendi l'avversario.\n Premi Z ripetutamente per sferrare i colpi.\n", + /*108*/ "Ora prova contro un avversario in movimento...\n", + /*109*/ "E infine contro un avversario che contrattacca.\n", + /*110*/ "Sconfiggi tutti i nemici senza essere colpita.\n", + /*111*/ "Addestramento fallito: sei stata colpita!\n", + /*112*/ "Completato l'oloprogramma 6.\n", + /*113*/ "Completato l'oloprogramma 7.\n", + /*114*/ "TERMINALI\n- Premi B vicino al terminale per usarlo.\n", + /*115*/ "Ora attiva il terminale rosso alla parete.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bene, Jo, ora preparati per la missione!\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Umano (femmina)\n", + /*127*/ "23 anni 2 mesi\n", + /*128*/ "|File CI nー027 -\n\nStadio addestramento: Completo\nGrado addestramento: A++\nStato attivo: Assegnato\n\n|Profilo -\n\nAddestramento avanzato ma inesperta. Reazione eccellente. Abilissima con svariate armi. Agente molto competente e versatile. Massimo punteggio di addestramento registrato nella creazione di un nuovo grado di formazione. Incarna l'agente ideale del Carrington Institute, da cui il nome 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Umano (maschio)\n", + /*131*/ "28 anni 5 mesi\n", + /*132*/ "|File CI nー009 -\n\nStadio addestramento: Completo\nGrado addestramento: A+\nStato attivo: Segreto\n\n|Profilo -\n\nIl nostro agente segreto pi capace. Molto preciso con la sua arma preferita (Magnum Revolver). Perfetto per le missioni in incognito. Meno adatto alla lotta aperta. Prima di Joanna Dark, deteneva il punteggio pi alto nell'addestramento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Umano (maschio)\n", + /*135*/ "62 anni 8 mesi\n", + /*136*/ "|File CI nー000 -\n\nStadio addestramento: N/D\nGrado addestramento: N/D\nStato attivo: N/D\n\n|Profilo -\n\nIntelligente scienziato/imprenditore e fondatore del Carrington Institute. Pianifica tutte le missioni che affida ai suoi agenti e esegue ogni operazione dal computer del suo ufficio. Strano gusto in fatto di abbigliamento.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Umano (femmina)\n", + /*139*/ "39 anni ? mesi\n", + /*140*/ "|Scheda psicanalitica -\n\nLa mente della dataDyne Corp. Assetata di potere, detesta non essere il capo. Odia perdere il comando. ネ senza scrupoli e pronta a tutto pur di vincere la sua battaglia contro Daniel Carrington, che disprezza con tutte le sue forze.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Umano (maschio)\n", + /*143*/ "46 anni ? mesi\n", + /*144*/ "|Scheda psicanalitica -\n\nCapo del National Security Agency, legato a Cassandra De Vries da una strana amicizia, che sembra pi che altro un'alleanza d'interesse. Tende a fare tutto ci che dice Cassandra, forse perch, pur avendo una forte personalit, non basta a sovrastarla. Riferimento per molte teste calde dell'NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Il Sapiente Caroll (AI)\n", + /*147*/ "6 mesi\n", + /*148*/ "|Profilo -\n\nUn'intelligenza artificiale creata dalla dataDyne Corp. con spiccate abilit linguistiche e di lettura codici. Fortunatamente ha principi morali e, grazie al suo formidabile livello di intelligenza, ha fiutato alcuni piani futuri della dataDyne. Dispone di propriet di linguaggio e di stile, tanto da sembrare un docente universitario.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (maschio)\n", + /*151*/ "320 anni\n", + /*152*/ "|Profilo -\n\nUn alieno della razza Maian. ネ il 'difensore' (guardia del corpo) dell'ambasciatore Maian invitato sulla Terra da Daniel Carrington. I difensori sono addestrati per l'uso preciso di una vasta gamma di armi. Elvis un terrafilo: per lui il mondo terrestre incredibilmente affascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Umano (maschio)\n", + /*155*/ "Va per i 30\n", + /*156*/ "|Profilo -\n\nUn umano maschio con capelli biondissimi. Molto alto, sempre vestito di bianco, porta spesso un impermeabile. Sembra che orchestri il complotto in cui sono coinvolti Cassandra e Trent. Di lui non si sa altro.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (in incognito)\n", + /*159*/ "Sconosciuta\n", + /*160*/ "|Profilo Aggiornato -\n\nSi tratta di un guerriero Skedar che si aggira entro la proiezione olografica di un uomo biondissimo sui 30 anni. Il dispositivo di modulazione orale gli conferisce un tono di voce chiaro, piacevole e convincente. ネ un subdolo mezzo di propaganda per gli Skedar.\n", + /*161*/ "Il Presidente degli USA\n", + /*162*/ "Umano (maschio)\n", + /*163*/ "50 anni\n", + /*164*/ "|Profilo -\n\nUn afro-americano istruito e astuto che cerca di fare la cosa giusta ma attorniato da gente come Trent Easton. Dopo aver respinto la richiesta di prestito del Pelagic II avanzata dalla dataDyne, crede di avere Trent sotto controllo. La maggioranza dei commentatori politici lo ritiene facilmente influenzabile, giudizio forse azzardato.\n", + /*165*/ "I Maian\n", + /*166*/ " I Maian sono la razza di alieni noti sulla Terra come i 'Grigi'. Hanno studiato la Terra molto a lungo, per svariati secoli, e sono bendisposti verso gli umani, comprendendone il grande potenziale. Il loro contatto sulla Terra Daniel Carrington, per manca ancora un contatto politico formale.\n", + /*167*/ "Guerriero Skedar\n", + /*168*/ "Gli Skedar sono una razza aliena bellicosa, da sempre in lotta contro i Maian. Solo di recente hanno firmato un armistizio. Lottano e si muovono in enormi armature meccanizzate, poich non sono altro che piccole creature simili ai rettili. Sono molto aggressivi: hanno fatto della guerra la loro religione... e sono molto devoti.\n", + /*169*/ "Situazione\n", + /*170*/ "Milioni di anni fa un'enorme e potente nave aliena si inabiss nell' Oceano Pacifico. Era dotata di un'arma molto pericolosa, ma ancora sconosciuta, in grado di rompere i legami nucleari che tengono assieme le molecole. Affinch possibili occhi indiscreti credessero che la nave fosse andata distrutta, fu diffuso nella galassia da cui era partita un apposito messaggio e vari componenti del sistema di propulsione furono distrutti proprio nel sistema solare che era stato scelto come nascondiglio. In realt questa astronave era un Cetan, una creatura possente, vigile e aliena.\n\nUn'altra razza extraterrestre, i Maian, scoprirono la vita sulla terra nel 2000 a.C. Ne videro un enorme potenziale, ma decisero di lasciare che la primitiva razza umana si sviluppasse senza la loro intrusione.\n\nI Maian incontrarono gli Skedar vicino al Delta Eridano nel 1650 d.C. (data terrestre) e le schermaglie iniziali si trasformarono presto in una guerra sanguinosa. Solo dopo centinaia di anni di lotta si arriv ad una pace molto delicata che frange di Skedar continuavano a ledere con attacchi terroristici, a cui i Maian non capitolarono mai.\n\nMa anche l'umanit continuava ad essere una preoccupazione per i Maian che guardavano delusi come la Terra subisse continue crisi causate dall' avvento della tecnologia e da 'agenti estranei'. Temevano che annunciare la loro presenza potesse solo scatenare altre guerre sul pianeta e cos decisero di continuare pazientemente le loro osservazioni finch gli umani non si fossero dimostrati pi 'maturi'.\n\nDaniel Carrington fu sicuramente 'precoce' e nel 1985 d.C. contatt una nave Maian in orbita sopra la terra, proponendo un piano vantaggioso per tutti che avrebbe accelerato i contatti tra gli umani e i Maian. Ritenendo Carrington un uomo onesto, i Maian approvarono il suo piano e acconsentirono a che egli diffondesse la loro tecnologia tramite il suo rinomato Istituto di Ricerca e Sviluppo.\n\nMa nel 2006 d.C. alcuni estremisti Skedar rintracciarono l'antico messaggio Cetan. Cominciarono subito a perlustrare la Terra con minuzia e con ogni mezzo, rapendo persone e mutilando animali per arrivare a scoprire il luogo in cui era dispersa la nave da guerra. Col tempo riuscirono inevitabilmente a scovare il punto esatto in cui l'incrociatore riposava sul fondo del Pacifico, ma per raggiungerlo avrebbero avuto bisogno dell'aiuto degli umani.\n\nConducendo i loro studi sulla Terra, gli Skedar compilarono una lista di aziende con le risorse necessarie per il recupero della nave. Capolista era la dataDyne Corporation. Ne contattarono il presidente, Cassandra De Vries e le proposero un accordo troppo bello per essere vero, ed ovviamente non lo era. In cambio dell'aiuto per recuperare la 'loro' nave dal fondo dell'Oceano, gli Skedar promisero di cedere alla dataDyne tutta la tecnologia aliena necessaria per diventare la pi grande azienda sul pianeta. La dataDyne doveva solo costruire un automa con abilit linguistiche e di decodifica... compito sospetto, ma di sicuro alla loro altezza. I lavori cominciarono immediatamente.\n\nCassandra De Vries rifer i dettagli del piano a Trent Easton, direttore dell'NSA, che cerc invano di ottenere l'approvazione del Presidente al prestito di un sottomarino per ricerche sul fondo oceanico. N gli Skedar n la dataDyne avrebbero potuto rubare il sommergibile senza scatenare la furia del governo USA, quindi elaborarono un piano ben pi sinistro per la sostituzione del Presidente con un clone che solo loro potessero controllare. Una volta consegnata alla storia l'operazione Skedar, Trent e Cassandra sarebbero stati ovviamente ricompensati di tanto rischio.\n\nMa non avrebbero avuto molto tempo per esultare. Il piano finale degli estremisti Skedar era di sperimentare il separatore molecolare sulla Terra prima di eliminare i Maian, e n Cassandra n Trent si accorsero della trappola, accecati com'erano dalla brama di potere e successo.\n\nMa la dataDyne aveva creato inconsapevolmente qualcosa che poteva ben capire il pericolo di questa intricata cospirazione: l'automa Sapiente costruito per infrangere il codice di accesso alla nave Cetan. Quando questo rivel le sue preoccupazioni sulla missione per cui era progettato, Cassandra ordin di manipolargli il cervello togliendogli cos la personalit. Pensava decisamente troppo... Disperato, il Sapiente decise di reagire ai complotti della dataDyne e degli Skedar, e con una mossa coraggiosa adott lo pseudomino di Dr. Caroll e contatt il Carrington Institute chiedendo aiuto...\n", + /*171*/ "La storia\n", + /*172*/ "L'inesperta agente Joanna Dark incaricata di una missione consistente nel prelevare uno scienziato dall'area ad alta sicurezza nei sotterranei della dataDyne. Quando trova il Dr. Caroll rimane sorpresa nello scoprire che si tratta di un automa creato dalla dataDyne, tuttavia resta fedele al suo incarico di portarlo al sicuro. Durante l'operazione scatta l'allarme e Joanna deve farsi strada per raggiungere sul tetto l'eliporto e la navetta di salvataggio, le uniche vie di scampo.\n\nIn risposta a questa incursione, due giorni dopo la dataDyne prende in ostaggio Daniel Carrington nella sua villa; in cambio della sua vita vogliono la restituzione dell'automa di loro 'propriet'. A loro insaputa l'automa si trova gi nella villa dove Carrington lo stava interrogando sui piani futuri della dataDyne. Joanna riesce a salvare il capo dell' istituto, ma non pu impedire che la dataDyne si riprenda il Dr. Caroll. Tuttavia, Carrington ha scoperto abbastanza da decidere di richiedere l'intervento di una squadra di specialisti Maian sulla Terra.\n\nJoanna inviata a Chicago per spiare una riunione di cospiratori nell' edificio G5, una copertura della dataDyne Corporation. Qui scopre che anche Trent Easton, direttore dell'NSA, coinvolto nella faccenda, assieme ad alcuni Scandinavi che sembrano avere il controllo della losca situazione. Quando Trent rivela il piano per il rapimento del Presidente, Joanna comunica la notizia alla base, ma scopre che un altro compito pi urgente richiede il suo intervento, prima dell'affare Trent.\n\nGli specialisti Maian sono stati intercettati e abbattuti dai cospiratori, che hanno trasportato rottami e sopravvissuti presso l'Area 51 in Nevada. Dopo essere stata istruita su come recuperare i superstiti e le loro attrezzature, a Joanna viene affiancato un altro agente del Carrington Institute. Quando irrompe nel laboratorio, Joanna riesce a scoprire il segreto dell'istituto: i loro alleati sono i Maian, la razza aliena nota come i Grigi. Il Maian che riesce a salvare si chiama Elvis, era la guardia del corpo dell'ambasciatore Maian che era stato inviato sulla Terra come capo della squadra di specialisti.\n\nDopo aver aiutato i superstiti della delegazione Maian, Joanna pu tornare a occuparsi del Presidente e dei piani della dataDyne contro di lui. Fingendo di essere un membro dell'entourage del Presidente, riesce ad accedere alla base aerea dove staziona l'Air Force One e addirittura ad imbarcarsi. Dopo il decollo, Trent e uno Skedar in incognito entrano in azione, ma Joanna l per fermarli. Porta il Presidente su una capsula di sicurezza, mentre una squadra degli uomini di Trent saccheggia l'aereo e trasborda i politici sull'UFO Skedar che si era agganciato all'Air Force One tramite un cordone ombelicale. Joanna danneggia il cordone ma non riesce a romperlo, allora Elvis fa un ultimo tentativo per distruggerlo lanciadovisi contro ad alta velocit. I tre velivoli precipitano in una regione sperduta dell'Alaska e dall'Air Force One viene lanciata la capsula di salvataggio.\n\nIn seguito Joanna cerca di ristabilire i contatti con l'istituto, ma gli Skedar riescono ad impedire le comunicazioni. Cos si incammina tra la neve alla ricerca del Presidente e di Elvis, e incontra squadre di Skedar in incognito in cerca di lei, di Elvis e del Presidente. Decide di seguire un gruppo di Skedar fino alla navicella Skedar affondata e qui scopre il clone del Presidente: riesce a distruggerlo velocemente e a disattivare il dispositivo di disturbo delle comunicazioni, infine chiama i rinforzi. Il Presidente salvo, gli Skedar hanno fallito e ora Trent dovr pagare cara la sua incompetenza.\n\nMa non finita. Ignorando qualsiasi cautela, la dataDyne e gli Skedar rubano il 'Pelagic II', il sottomarino di ricerca del Governo, e si dirigono nel punto in cui affond la nave Cetan. Joanna e Elvis devono intralciare l'attivit a bordo e cos scoprono il vero senso del piano Skedar. Dopo aver paralizzato le operazioni di immersione e fatto rientrare i sommergibili, raggiungono il fondo dell'oceano dove scoprono l'incrociatore Cetan affondato. Un varco realizzato dagli Skedar li fa entrare nella nave dove inciampano nel cadavere di un guerriero Skedar... la squadra d'assalto non deve averla passata liscia. Eliminando gli aggressivi Skedar superstiti e sfuggendo ai Cetan, Joanna e Elvis arrivano al centro della nave, dove trovano l'automa una volta noto come Dr. Caroll. Dopo che sono riusciti a ristabilire la sua personalit, l'automa li convince ad abbandonare la nave in modo che lui possa distruggerla una volta per tutte.\n\nRientrati al Carrington Institute, Joanna si appresta ad andare alla Casa Bianca per il ricevimento presidenziale quando scoppia l'inferno. I superstiti dello squadrone d'assalto Skedar si vogliono vendicare dando la caccia ai responsabili del loro fallimento nel recupero della nave Cetan. Joanna aiuta i dipendenti dell'istituto a mettersi in salvo negli hangar, mentre gli Skedar sferrano attacchi in vari punti dell' istituto: la maggioranza dei dipendenti riesce a salvarsi, ma alla fine Joanna viene stordita e fatta prigioniera.\n\nSi ritrova in una cella a bordo della nave Skedar assieme a Cassandra De Vries. In un momento drammatico, il presidente della dataDyne offre volontariamente la sua vita per creare lo scompiglio che sar necessario a Joanna per fuggire. Facendosi strada nella nave, Joanna riesce a trovare e disattivare gli scudi anti-attracco consentendo a Elvis di portare alcuni amici per la tanto attesa sparatoria.\n\nLa nave d'assalto catturata entra nell'orbita sopra il Tempio di Guerra Skedar, con grande sorpresa di Elvis poich i Maian non sono mai riusciti a trovare questo 'luogo sacro' in tutti gli anni di guerra interraziale. Distruggere il Tempio significherebbe infliggere un duro colpo agli Skedar e la pace duratura sostituirebbe l'instabile tregua. Cos Joanna si concentra sul leader Skedar, il sacerdote a capo del Tempio, mentre Elvis torna alla nave d'assalto per organizzare le flotte Maian.\n\nDopo la furiosa battaglia, del Tempio non rimane che una rovina e Elvis interrompe il bombardamento per cercare Joanna. ネ viva ma tenuta in trappola sotto le macerie dagli ultimi tenaci Skedar comparsi all'ultimo momento, proprio mentre stava scappando. Elvis le passa un'arma per convincere gli Skedar a lasciarla andare e, a lavoro completato, con il Tempio Skedar raso al suolo, i due eroi possono finalmente rientrare in orbita. La razza Skedar giunta al capolinea: il morale sotto i piedi e il complotto mandato in fumo per sempre.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "L'azienda monolitica che oggi la dataDyne era stata originariamente creata come impresa di programmazione di sistemi di intelligenza artificiale. Tuttavia, quando emerse che la maggior parte dei profitti scaturiva dalla sua opera di difesa per conto della macchina militare statunitense, un manager giovane e intraprendente di nome Cassandra De Vries inizi a stringere accordi con produttori di armi, ignorando le offerte di collaborazione di Daniel Carrington e del suo istituto per condurre una ricerca congiunta relativa al computo dei quanti e all'intelligenza artificiale. Dopo la fusione con la terza azienda produttrice di armi, i profitti del gruppo andarono alle stelle. Nel giro di un mese la dataDyne ottenne un appalto governativo per lo sviluppo di nuove armi sotto la guida di Cassandra De Vries. Una buona parte dei profitti del gruppo furono reinvestiti nella ricerca relativa all'intelligenza artificiale con risultati sorprendenti.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Deriso e considerato un inventore bizzarro, Daniel Carrington fu il primo a divulgare le tecnologia antigravitazionale. Con i proventi ottenuti da questa invenzione e altri sviluppi fond il Carrington Institute, una fucina tecnologica situata in una sperduta localit degli USA. L'istituto anche il campo di addestramento per la formazione di agenti la cui missione girare il mondo per tenere sotto controllo lo sviluppo tecnologico, per ragioni ben note a Daniel Carrington.\n", + /*177*/ "Description\n- Una minuscola telecamera per esplorazioni clandestine e l'olografia spettroscopica. Apre le porte emettendo impulsi di calore.\n\nIstruzioni di addestramento\n- Olografa il terminale hacker nella sala informatica a fianco.\n\nFunzionamento\n- Premi Z per l'olografia. Premi B per aprire le porte. Tieni premuto R per guardarti intorno.\n", + /*178*/ "Descrizione\n- Migliora la qualit~a della luce presente per visualizzare l'area circostante. Rileva le fonti di vita. Sovraccarica in condizioni di luce normale, 'annebbiando' il display.\n\nIstruzioni di addestramento\n- - Procedi al buio, trova l'interruttore e attivalo per riaccendere la luce.\n\nFunzionamento\n- Seleziona Vista Notturna dall'inventario per attivarla. Riselezionala per disattivarla.\n", + /*179*/ "Descrizione\n\n- Sistema indipendente di decodifica. Si applica al quadro comandi e esegue tutte le combinazioni finch non trova quella esatta.\n\nIstruzioni di addestramento\n- Trova la porta chiusa e usa il decodificatore per aprirla.\n\nFunzionamento\n- Stai vicino alla porta e premi B mentre tieni il decodificatore.\n", + /*180*/ "Descrizione\n\n- Usato per guardare attraverso le pareti e gli oggetti. ネ pi potente della Vista Notturna e dello scanner a infrarossi.\n\nIstruzioni di addestramento\n- Con lo scanner a raggi X cerca i due interruttori nascosti e attivali per disattivare le griglie laser.\n\nFunzionamento\n- Seleziona lo scanner a raggi X dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*181*/ "Descrizione\n\n- Il travestimento serve per non destare sospetti, ma fa comunque attenzione a non farti scoprire da qualche nemico perspicace.\n\nIstruzioni di addestramento\n- Grimshaw ha un dispositivo mimetico pronto per essere usato. Vai alla porta accanto e 'compralo' da lui.\n\nFunzionamento\n- Per indossare il travestimento, selezionalo dall'inventario.\n", + /*182*/ "Descrizione\n\n- Trasforma i dati termici in immagini visibili. Pu essere usato al buio e rileva anomalie come porte nascoste e pareti sottili.\n\nIstruzioni di addestramento\n- Accendi lo scanner a infrarossi, trova la porta nascosta e aprila.\n\nFunzionamento\n- Seleziona lo scanner a infrarossi dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*183*/ "Descrizione\n- Localizza un oggetto specifico su una mappa radar HUD, mostrandone le dimensioni e la distanza.\n\nIstruzioni di addestramento\n- Attiva il Puntatore e segui il segno del radar per trovare l'oggetto.\n\nFunzionamento\n- Seleziona il Puntatore dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*184*/ "Descrizione\n- Distorce lo spettro visibile della luce attorno a chi lo indossa, creando un effetto camaleontico. Il campo si infrange quando chi lo indossa spara.\n\nIstruzioni di addestramento\n- Attiva il dispositivo mimetico e entra nell'ufficio di Carrington per sorprenderlo!\n\nFunzionamento\n- Seleziona il dispositivo mimetico dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*185*/ "Descrizione\n- Emette un segnale in continuo movimento studiato per mandare in tilt i dispositivi elettronici di comunicazione. Funziona solo se posto sull'oggetto.\n\nIstruzioni di addestramento\n- Lancia la mina ECM sulla centralina luce dalla porta segreta.\n\nFunzionamento\n- Premi Z per lanciare la mina. Tieni premuto R e muovi il Control Stick per mirare bene prima del lancio.\n", + /*186*/ "Descrizione\n- Crea un collegamento tra l'agente in missione e gli hacker dell'Istituto in sede, che possono cos scaricare i dati o decodificare codici elettronici a distanza.\n\nIstruzioni di addestramento\n- Usa il Connettore Dati per accedere al terminale nell'angolo e aprire una porta segreta.\n\nFunzionamento\n- Vai vicino al terminale e premi B tenendo il Connettore Dati.\n", + /*187*/ "SPARO\n Premi Z per far fuoco.\n", + /*188*/ "AUTORICARICA\n Rilascia Z quando non hai pi munizioni.\n", + /*189*/ "RICARICA MANUALE\n Premi B per ricaricare prima di rimanere a secco.\n", + /*190*/ "MIRA: Tieni premuto R per accedere alla modalit Mira.\n", + /*191*/ "Usa il Control Stick per spostare la visuale di mira.\n", + /*192*/ "AUTOFUOCO\n Premi Z per fuoco continuo automatico.\n", + /*193*/ "CAMBIA MIRA\n Premi C in alto o in basso per spostare la visuale in alto o in basso.\n", + /*194*/ "ZOOM\n Tieni premuto R per avviare la modalit Zoom.\n", + /*195*/ "FUOCO RAPIDO\n Premi Z velocemente per spari rapidi.\n", + /*196*/ "Carrington Institute\0|Base operativa\n", + /*197*/ "Lucerne Tower\0|Quartier Generale Globale\n", + /*198*/ "Laboratorio sotterraneo\0|Centri di ricerca sotterranei\n", + /*199*/ "Villa Carrington\0|Residenza privata sulla costa\n", + /*200*/ "Chicago\0|Sobborghi delle citt濬n", + /*201*/ "Edificio G5\0|Sede della dataDyne\n", + /*202*/ "Area 51\0|Vicino al Groom Dry Lake, Nevada\n", + /*203*/ "Base aerea in Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'aereo presidenziale\n", + /*205*/ "Luogo del disastro\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Sottomarino per ricerca sul fondo oceanico\n", + /*207*/ "Astronave Cetan\0|Segno della presenza aliena sulla Terra\n", + /*208*/ "Nave d'assalto Skedar\0|Astronave per trasporto truppe\n", + /*209*/ "Patria Skedar\0|Il pianeta del Tempio di Guerra\n", + /*210*/ "Navetta\0|Agile navicella per il trasporto truppe\n", + /*211*/ "Antigravit濬0|Dispositivo antigravit濬n", + /*212*/ "Aeromoto\0|Veicolo per spostamenti a bassa quota\n", + /*213*/ "PuliRobot\0|Il tuo fedele amico\n", + /*214*/ "Cannoniera\0|Cannoniera urbana AG\n", + /*215*/ "Robot G5 Robot\0|Droide da combattimento urbano\n", + /*216*/ "Intercettatore A51\0|Robot intercettatore aereo\n", + /*217*/ "Vascello Maian\0|Vascello di esplorazione e perlustrazione\n", + /*218*/ "Navetta Skedar\0|Navicella aliena per trasporto truppe\n", + /*219*/ "L'edificio dell'istituto comprende svariate aree: uffici e laboratori, aule e hangar. ネ piuttosto isolato dall'ambiente esterno per garantire il massimo della segretezza.\n", + /*220*/ "Nel bel mezzo del quartiere finanziario si erge il cupo grattacielo della dataDyne Corporation.\n", + /*221*/ "Questi laboratori ben protetti e nascosti conservano la chiave del futuro della dataDyne. Qui dentro alcuni ingegneri lavorano a progetti segreti mirati a garantire la supremazia della dataDyne.\n", + /*222*/ "Di propriet dell'istituto, questa residenza appartata usata da Daniel Carrington per sfuggire dallo stress del lavoro. Oltre ad un osserva- torio dispone di generatore elettrico e di una cantina ben fornita.\n", + /*223*/ "Un quartiere piuttosto fatiscente di Chicago, immerso nel traffico. Qui si trova la sede della G5 Corporation.\n", + /*224*/ "L'edificio G5 dispone di una sala riunioni segreta protetta contro registrazioni illecite. Questo il luogo ideale per le cospirazioni e i piani segreti della dataDyne.\n", + /*225*/ "Questa parte del grande complesso noto come Area 51 si trova ai piedi dei colli attorno al lago Groom Dry. Eliscali e torri di comunicazione esterni danno un'idea dell'estensione del complesso sottoterra.\n", + /*226*/ "Una delle tante basi aeree disponibili per lo stazionamento dell'Air Force One. Solitamente la base aerea si trova sperduta in una regione inospitale, al sicuro da sguardi indiscreti.\n", + /*227*/ "Quest'Air Force One particolarmente adatto ai climi freddi, come quelli dell'Alaska del Nord. La destinazione di volo Oslo, Norvegia.\n", + /*228*/ "I rottami dell'aereo colpito sono finiti nel paesaggio roccioso innevato del Circolo Polare Artico.\n", + /*229*/ "Di propriet del governo USA, il Pelagic II pu condurre operazioni subacquee in alto mare in ogni condizione climatica. ネ l'unico sommergibile al mondo per la ricerca sul fondo oceanico.\n", + /*230*/ "Un'enorme nave di costruzione aliena che riposa da milioni di anni sul fondo oceanico.\n", + /*231*/ "Una nave d'assalto interplanetaria che trasporta guerrieri Skedar verso le zone di guerra. Fa parte dell'ormai ridotta flotta Skedar.\n", + /*232*/ "Un pianeta molto arido, sconvolto da terremoti, tempeste di sabbia e uragani. Fa parte di un sistema solare complesso comprendente tre soli.\n", + /*233*/ "Una navetta da trasporto piccola, veloce e facile da manovrare, progettata per l'uso in aree urbane. Pu essere comandata dal computer o pilotata a distanza. Pu trasportare tre o quattro agenti con l'attrezzatura.\n", + /*234*/ "Un dispositivo antigravit usato dai magazzinieri. ネ applicato al lato della cassa da imballaggio. Quando attivo, il campo AG innalza la cassa ed elimina parte dell'inerzia.\n", + /*235*/ "Una moto da perlustrazione a bassa quota. Si libra grazie alla piccola unit antigrevit, ma ha un potente motore per gli spostamenti rapidi direzionali.\n", + /*236*/ "Mette in ordine e pulisce. Ha accesso a tutte le aree di un edificio: gli agenti possono avvalersi dell'aiuto di questi robot perch possono facilitare involontariamente l'ingresso a zone riservate.\n", + /*237*/ "Un veicolo di soppressione e perlustrazione urbana: con equipaggio di due persone, armato di cannone sulla punta e di due missili sulle ali. Pu essere eliminato con raffiche di spari o un missile ben mirato.\n", + /*238*/ "Un robot da combattimento urbano. Utilizza un'unit antigravit per librarsi; ben armato e schermato. Spesso usato per tenere alla larga i curiosi grazie alla programmazione 'zitto e spara'.\n", + /*239*/ "Versione motorizzata dell'Aeromoto, con dispositivi AG e turbina pi potenti; pu facilmente raggiungere Mach 2 e ha un'autonomia di molte ore se procede a velocit ridotta. Anche se ben armato il suo punto forte la manovrablit.\n", + /*240*/ "Progettato per il trasporto del solo pilota Maian. Un passeggero ci starebbe stretto, soprattutto se fosse umano.\n", + /*241*/ "Pu portare al campo di battaglia dieci guerrieri Skedar armati fino ai denti. Sfugge ai radar tradizionali. Pu trasmettere potenti onde di disturbo su una vasta area mandando in tilt comunicazioni e apparecchi radar.\n", + /*242*/ "Descrizione\n- Un buon agente nota tutto ci che lo circonda.\n\nIstruzioni di addestramento\n- Esamina tutti gli oggetti guardandoli direttamente.\n\nFunzionamento\n- Guardare su: pulsante C in basso\n- Guardare gi: pulsante C in alto\n- Guardare attorno: pulsante R per attivare la mira e Control Stick.\n", + /*243*/ "Descrizione\n- Schivando e mitragliando a bassa quota potrai tirarti fuori dai guai.\n\nIstruzioni di addestramento\n- Attiva tutti gli interruttori anteriori ma fai presto perch si disattivano a tempo.\n\nFunzionamento\n- Passo a sinistra: pulsante C a sinistra\n- Passo a destra: pulsante C a destra\n\n", + /*244*/ "Descrizione\n- Accucciandoti e strisciando potrai rilevare nuove aree da esplorare.\n\nInformazione di addestramento\n- Fatti strada tra gli ostacoli usando le mosse disponibili. Attiva gli interruttori.\n\nFunzionamento\n- Accucciarsi: pulsante R e poi pulsante C verso il basso.\n- Strisciare: quando sei accucciato, pulsante R e poi C verso il basso.\n- Alzarsi: pulsante R.\n\n", + /*245*/ "Descrizione\n- Lottare corpo a corpo contro pi avversari pu essere difficile.\n\nIstruzioni di addestramento\n- Metti KO tutti i nemici senza farti colpire.\n\nFunzionamento\n- Pugno: premi Z pi volte da disarmato per lanciare una scarica di pugni.\n\n", + /*246*/ "Descrizione\n- Disarmando un nemico potrai impossessarti della sua arma.\n\nIstruzioni di addestramento\n- Metti KO/disarma tutti i nemici senza essere colpito.\n\nFunzionamento\n- Disarmare: tieni premuto B e poi premi Z per disarmare il nemico.\nPugno KO: colpisci il nemico alle spalle.\n", + /*247*/ "Descrizione\n- Lottare corpo a corpo contro pi nemici.\n\nIstruzioni di addestramento\n- Batti tutti i nemici disarmati senza essere colpito.\n\n", + /*248*/ "Descrizione\n- Lottare contro pi nemici, sia armati che disarmati.\n\nIstruzioni di addestramento\n- Batti tutti i nemici armati senza essere colpito.\n\n", + /*249*/ "Per una maggiore precisione e libert quando ti guardi attorno, usa la modalit Mira.\n", + /*250*/ "Pensa a dove vuoi andare prima di effettuare la prova. Poniti in un punto dove dovrai spostarti il meno possibile tra gli obiettivi.\n", + /*251*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai pi veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando necessario.\n", + /*252*/ "Attaccare gli avversari alle spalle pu essere scorretto, ma cos sar pi facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*253*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*254*/ "Non stare l a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*255*/ "Quando sei sicuro delle tue abilit di lotta corpo a corpo, va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*256*/ "Per una maggiore precisione e libert quando ti guardi attorno, usa la modalit Mira.\n", + /*257*/ " Schivando e mitragliando a bassa quota potrai tirarti fuori dai guai.\n", + /*258*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai pi veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando necessario.\n", + /*259*/ " Attaccare gli avversari alle spalle pu essere scorretto, ma cos sar pi facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*260*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*261*/ "Non stare l a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*262*/ " Quando sei sicuro delle tue abilit di lotta corpo a corpo va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*263*/ "Tieni sempre d'occhio l'obiettivo quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*264*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il pi possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalit Mira.\n", + /*265*/ "La TeleSpia pu essere difficile da controllare, abbi pazienza.\n", + /*266*/ "Utile nel combattimento, ma pu causare problemi per sovraccarico.\n", + /*267*/ "Se hai problemi ad attaccare il decodificatore, prova a stare pi vicino all'obiettivo.\n", + /*268*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ci che ti circonda e preparati ad esplorare.\n", + /*269*/ "La visiera riduce il campo visivo e ci pu essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*270*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perch pu impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*271*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*272*/ "Usa i dispositivi mimetici quando non c' nessuno che possa vederti.\n", + /*273*/ "Tieni sempre d'occhio il target quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*274*/ " Assicurati che la mina atterri nel punto giusto avvicinandoti il pi possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalit Mira.\n", + /*275*/ "La TeleSpia non invisibile, i nemici potrebbero scoprirla: attento quando entri in un'area abitata. Ricorda che la TeleSpia rimarr nel punto dove l'hai lasciata a meno che tu la riprenda.\n", + /*276*/ "Utile nel combattiemto, ma pu causare problemi per sovraccarico. Evita questo inconveniente e reagisci prima del nemico.\n", + /*277*/ "Se hai problemi ad attaccare il decodificatore, prova a stare pi vicino all'obiettivo.\n", + /*278*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ci che ti circonda e preparati ad esplorare.\n", + /*279*/ "La visiera riduce il campo visivo e ci pu essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*280*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perch pu impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*281*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*282*/ " Usa i dispositivi mimetici quando non c' nessuno che possa vederti. Evita di sparare se non strettamente necessario finch non sei sicuro della riuscita del tuo attacco.\n", + /*283*/ " La Falcon 2 una pistola molto precisa: qualsiasi errori dipende da te. La modalit secondaria la botta col calcio, inutile nel poligono.\n", + /*284*/ "Per sfruttare al meglio la precisione della Falcon 2, essa dotata di un cannocchiale. Come per la Falcon 2 non modificata, la modalit secondaria inutile durante la prova al poligono.\n", + /*285*/ "La versione della Falcon 2 con silenziatore eccezionale per azioni in incognito e per cogliere l'avversario di sorpresa. Assicurati della tua precisione per non rischiare di sprecare l'occasione.\n", + /*286*/ "La Magsec 4 dotata di un'eccezionale potenza di sparo ma non troppo precisa, soprattuto se usata nella modalit secondaria a tre esplosioni. Il vero svantaggio dell'arma il caricatore ridotto.\n", + /*287*/ "ネ una tipica arma Skedar, potente e brutale. Sacrificando parte del caricatore, il colpo pu essere caricato in modo da essere devastante. La carica di munizioni superiore un bonus.\n", + /*288*/ "Questa versatile pistola ha due sistemi di sparo: uno standard e uno esplosivo. Gli ingegneri Maian sono riusciti a realizzarla contenendo il consumo di energia dell'arma, sebbene la gittata sia ridotta.\n", + /*289*/ "Con la DY357 bisogna sapere quando ricaricare: un caricatore a sei colpi ti fa stare sempre all'erta quando fai fuoco. Il peso della pistola pu essere un vantaggio se si deve stendere qualcuno.\n", + /*290*/ "Trent Easton cerca sempre quel qualcosa in pi e questa pistola non fa eccezione. Persino le pallottole sono speciali; sono progettate per frammentarsi nell'avversario ed eliminarlo velocemente.\n", + /*291*/ " Un fucile mitragliatore affidabile e efficace: facile capire perch sia il modello pi venduto della dataDyne, anche se non prevista la modalit secondaria. Il sistema di designazione e puntamento eccellente e vale la pena di imparare il funzionamento completo dell'arma.\n", + /*292*/ "Il fucile mitragliatore Ciclone non stato progettato come arma di precisione, anche se vale la pena fare pratica. Pu sparare molte pallottole in poco tempo ed quindi un'eccellente arma di soppressione.\n", + /*293*/ "La flessibilit Maian nel design ha prodotto questo fucile mitragliatore con un'interessante modalit secondaria: una pallottola superveloce ad alta penetrazione. Come per la Phoenix, la velocit di fuoco ridotta nella modalit secondaria, per evitare danni al meccanismo di sparo e alla canna.\n", + /*294*/ "La RC-P120 spara una speciale pallottola minerale che, assieme all'alta velocit e al notevole caricatore, ne fa uno strumento perfetto da usare contro gli Skedar, se necessario. Le pallottole possono essere usate per alimentare un prototipo di dispositivo mimetico: l'addestramento stato adeguarsi a tale caratteristica.\n", + /*295*/ "La pistola si chiude in modo da sembrare un laptop e pu essere usata come sentinella in modalit secondaria per coprire una via d'uscita o proteggere un luogo.\n", + /*296*/ "Questo il modello che la dataDyne ha fornito all'esercito USA, anche se non ancora stato adottato ufficialmente. Poich la dataDyne riserva sempre brutte sorprese, il fucile d'assalto di base dispone di una mina di prossimit sotto la canna. Usare la modalit secondaria significa dover poi buttar via l'arma.\n", + /*297*/ "Per quanto se ne sa, la modalit secondaria dell'arma sembra essere un rilevatore di minacce, mine guidate, esplosivi nascosti (tipo la Dragon nella modalit secondaria)e pistole automatiche. Anche se potente, il caricatore del fucile d'assalto ~e troppo piccolo. \n", + /*298*/ " Il primo tentativo dell'istituto di creare un'arma di supporto l'AR34, un semplice fucile d'assalto. La modalit secondaria uno zoom costante. Richiede un addestramento preciso.\n", + /*299*/ "La versione pi pesante della Dragon, con un piccolo lanciagranate al posto della mina di prossimit. Adottato dall'esercito USA come arma pesante di supporto e a ragione! Esercitati con la traiettoria delle granate.\n", + /*300*/ "La precisione ~e d'uopo! Ci sono due modalit: esplosione singola o doppia. Il caricatore piuttosto capiente per una pistola a rotazione, ma si devono considerare i lunghi tempi di ricarica.\n", + /*301*/ "Un fucile cecchino sofisticato, con silenziatore e zoom. L'unico elemento funzionale che riduce la precisione il cecchino. Usa la modalit secondaria per accucciarti e prendere la mira.\n", + /*302*/ "Pur essendo tecnologicamente molto avanzato le caratteristiche del fucile TeleVista sono lampanti. Il colpo inarrestabile e penetra nelle pareti in grande profondit, puntando e seguendo gli obiettivi se necessario.\n", + /*303*/ "La prima funzione della balestra un colpo narcotico non letale, mentre la seconda annienta all'istante. ネ un'arma per missioni in incognito e il caricamento richiede molto tempo, quindi non adatta in caso di fuoco serrato.\n", + /*304*/ "La pistola sedativo ~e la stessa usata in molti ospedali e laboratori. Pu essere caricata sia con piccole quantit di sedativo sia con dosaggi letali. Il contenuto nel serbatoio cala a seconda del dosaggio.\n", + /*305*/ "Cerca di controllare quest'arma al meglio. ネ pensata per esseri pi forti degli umani, questo chiaro. Inginocchiarsi aiuta a prendere la mira, ma non ad aggiustarla. Se l'avversario si trova nella linea del fuoco, le canne possono essere usate come un macinatore.\n", + /*306*/ "Un prodotto recente della dataDyne dall'interessante tecnologia. La modalit secondaria attiva un campo magnetico attorno alla bomba, conferendo aderenza per un breve periodo, dopo di che il campo svanisce e la bomba cade dal punto d'impatto esplodendo.\n", + /*307*/ "Un lanciamissili compatto riutilizzabile, si ricarica dopo ogni lancio. La modalit secondaria usa una variante del sistema di puntamento del fucile mitragliatore CMP150,con un solo bersaglio designato. Il missile viaggia a velocit ridotta mentre segue l'obiettivo: calcola bene i tempi!\n", + /*308*/ "Questo lanciamissili Skedar pu lanciare un missile non guidato o uno telecomandato. Forse gli Skedar hanno la loro soddisfazione quando la telecamera zooma sul bersaglio, ma un agente del Carrington Institute superiore a certe cose. Il missile guidato accelera automaticamente, ma pu essere rallentato per manovrarlo meglio. L'esplosione avviene a contatto o a comando.\n", + /*309*/ "Un pugnale da lotta temprato, bilanciato anche per il lancio. ネ necessario fare molta pratica per ottenere una traiettoria precisa della lama lanciata.\n", + /*310*/ "Il reparto sperimentazione armi ha realizzato questo laser da polso, a due raggi, piccolo ma efficace. La modalit primaria ha una gittata considerevole, la secondaria spara un raggio continuo, finch il grilletto premuto.\n", + /*311*/ "La granata antiuomo a frammentazione esplode dopo quattro secondi dall'attivazione. Per perfezionare l'ordigno stata aggiunta una modalit secondaria ping-pong. La granata salta da una parte all'altra fino ad esaurimento della carica o attivazione del rilevatore di prossimit.\n", + /*312*/ "Questa granata Maian crea il caos nei neuroni delle creature coscienti. Trovandoti nel raggio di esplosione ti si annebbier la vista e gli oggetti ti cadranno di mano. Pu essere fatta esplodere a impatto o per prossimit. Lanciala abbastanza lontano da te.\n", + /*313*/ "Ci vuole prudenza nell'uso di mine a orologeria, altrimenti il bersaglio pu sfuggire dal raggio di esplosione e inseguirti. Fai molta pratica prima di rischiare di compiere gravi errori sul campo. La modalit secondaria un rilevatore di minaccia come quello del fucile d'assalto K7 Vendetta.\n", + /*314*/ "Il segreto per un buon piazzamento della mina di prossimit metterla dove l'avversario non se l'aspetta. Se ti trovi all'estremit di destinazione della mina di prossimit, usa il rilevatore di minaccia della modalit secondaria per proteggerti. Pu sembrare una perdita di tempo, ma pu salvarti la vita.\n", + /*315*/ "L'ultimo modello delle mine a esplosione a distanza, sostanzialmente come le precedenti. La modalit primaria piazza la mina, mentre la secondaria d il comando di esplosione. Se non vedi la mina, dovrai cercare di calcolare a mente il tempo. \n", + /*316*/ "Olog. 1 - Guardati attorno\n", + /*317*/ "Olog. 2 - Movimento 1\n", + /*318*/ "Olog. 3 - Movimento 2\n", + /*319*/ "Olog. 4 - Corpo a corpo 1\n", + /*320*/ "Olog. 5 - Corpo a corpo 2\n", + /*321*/ "Olog. 6 - Lotta aperta 1\n", + /*322*/ "Olog. 7 - Lotta aperta 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_s.c b/src/files/lang/pal-beta/dish_str_s.c new file mode 100644 index 000000000..46321f47c --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_s.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Recoge la Visin Nocturna de la mesa para empezar.\n", + /* 9*/ "Activa la Visin Nocturna.\nLocaliza el interruptor de la luz.\nEnciende las luces.\n", + /* 10*/ "Recoge el Conector de Datos de la mesa para empezar.\n", + /* 11*/ "Sitate cerca de la terminal y usa el Conector.\n", + /* 12*/ "Necesitas sostener el Conector de Datos.\n", + /* 13*/ "Conexin establecida...\n", + /* 14*/ "La Terminal ha sido intervenida con 騙ito.\n", + /* 15*/ "Conexin perdida: demasiado lejos del PC.\n", + /* 16*/ "Recoge la Mina ECM de la mesa para empezar.\n", + /* 17*/ "Localiza el Puerto y con馗tale una Mina ECM.\n", + /* 18*/ "La Mina ECM ha sido colocada incorrectamente.\n", + /* 19*/ "La Mina ECM ha sido colocada correctamente.\n", + /* 20*/ "Recoge la C疥ara Espa de la mesa para empezar.\n", + /* 21*/ "Localiza la Sala del PC de Informacin y holografala.\n", + /* 22*/ "Sala del PC de Informacin holografada correctamente.\n", + /* 23*/ "Las luces han sido reactivadas.\n", + /* 24*/ "Recoge el Decodificador de Puertas de la mesa para empezar.\n", + /* 25*/ "Usa el Decodificador en la puerta para desbloquearla.\n", + /* 26*/ "Necesitas estar sujetando el Decodificador de Puertas.\n", + /* 27*/ "Decodificador colocado. Iniciando rutinas de 'crackeo'...\n", + /* 28*/ "Decodificacin completada. La puerta ha sido desbloqueada.\n", + /* 29*/ "Recoge el Rastreador de la mesa para empezar.\n", + /* 30*/ "Localiza el Esc疣er de Infrarrojos con el Rastreador.\n", + /* 31*/ "El Esc疣er de Infrarrojos ha sido localizado con 騙ito.\n", + /* 32*/ "Recoge el Esc疣er de Infrarrojos de la mesa para empezar.\n", + /* 33*/ "Localiza la puerta secreta usando el Esc疣er de Infrarrojos.\n", + /* 34*/ "La puerta secreta ha sido localizada con 騙ito.\n", + /* 35*/ "Recoge el Esc疣er de Rayos-X de la mesa para empezar.\n", + /* 36*/ "Encuentra los interruptores ocultos para apagar la rejilla l疽er.\n", + /* 37*/ "Todas las rejillas l疽er han sido desactivadas.\n", + /* 38*/ "Recoge el Disfraz de la mesa para empezar.\n", + /* 39*/ "Engaa a alguien para que te d el Dispositivo de Ocultacin.\n", + /* 40*/ "Dispositivo de Ocultacin recuperado con 騙ito.\n", + /* 41*/ "Rejilla L疽er 1 desactivada.\n", + /* 42*/ "Rejilla L疽er 2 desactivada.\n", + /* 43*/ "Estoy aqu para recoger el equipo.\n", + /* 44*/ "Vete, Joanna. 。No engaas a nadie!\n", + /* 45*/ "Aqu lo tienes. No lo dejes caer.\n", + /* 46*/ "El Dispositivo de Ocultacin ha sido asegurado con 騙ito.\n", + /* 47*/ "Se supone que debes usar el Disfraz, ソrecuerdas?\n", + /* 48*/ "Lo tienes que hacer bastante mejor, Joanna.\n", + /* 49*/ "Joanna, ソde dnde has salido?\n", + /* 50*/ "Has sido detectado por la c疥ara.\n", + /* 51*/ "Recoge el Dispositivo de Ocultacin de la mesa para empezar.\n", + /* 52*/ "Usa el Dispositivo de Ocultacin y localiza a Carrington.\n", + /* 53*/ "。Creo que podemos asegurar que tu entrenamiento\nha sido completado!\n", + /* 54*/ "Misin completada - 。Entrenamiento de Dispositivos pasado!\n", + /* 55*/ "Misin fallada: Has sido detectada.\n", + /* 56*/ "Elegir el Conector.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Conector de Datos y suelta el Botn A.\n", + /* 57*/ "Elegir la C疥ara Espa.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la C疥ara Espa y suelta el Botn A.\n", + /* 58*/ "Elegir la Visin Nocturna.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Visin Nocturna y suelta el Botn A.\n", + /* 59*/ "Elegir el Decodificador de Puertas.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Decodificador y suelta el Botn A.\n", + /* 60*/ "Elegir el Esc疣er de Rayos-X.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Esc疣er de Rayos-X y suelta el Botn A.\n", + /* 61*/ "Elegir el Disfraz.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Disfraz y suelta el Botn A.\n", + /* 62*/ "Elegir el Esc疣er de Infrarrojos.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Esc疣er de IR y suelta el Botn A.\n", + /* 63*/ "Elegir el Rastreador.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Rastreador y suelta el Botn A.\n", + /* 64*/ "Elegir el Dispositivo de Ocultacin.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Dispositivo y suelta el Botn A.\n", + /* 65*/ "Elegir la Mina ECM.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Mina ECM y suelta el Botn A.\n", + /* 66*/ "Joanna, por fin te encuentro.\n", + /* 67*/ "Ven conmigo.\nTe conducir a las salas de entrenamiento.\n", + /* 68*/ "El centro de informacin est tras esta puerta.\n", + /* 69*/ "Aqu tenemos el laboratorio de dispositivos.\n", + /* 70*/ "Esto conduce a la sala de entrenamiento de simulantes.\n", + /* 71*/ "ノste es el campo de tiro, Joanna.\n", + /* 72*/ "Este corredor conduce al hangar.\n", + /* 73*/ "ANTIGRAV\nPulsa el Botn B cerca del Antigrav para cogerlo...\n", + /* 74*/ "Cogiendo la caja, pulsa el Botn B para soltarla.\n", + /* 75*/ "AEROMOTO\nPulsa dos veces B cerca de una Aeromoto para subir.\n", + /* 76*/ "Pulsa dos veces B en la Aeromoto para bajar.\n", + /* 77*/ "ABRIENDO PUERTAS\nPulsa el Botn B cerca de una puerta para abrirla.\n", + /* 78*/ "El Botn B tambi駭 activar cualquier objeto cercano.\n", + /* 79*/ "ASCENSORES\nPulsa el Botn B cerca de la puerta\npara llamar al ascensor.\n", + /* 80*/ "No se puede salir cuando el entrenamiento est en marcha.\n", + /* 81*/ "Has obtenido el Cdigo Interruptor 1.\n", + /* 82*/ "Has obtenido el Cdigo Interruptor 2.\n", + /* 83*/ "Has obtenido el Cdigo Interruptor 3.\n", + /* 84*/ "Has obtenido el Cdigo Interruptor 4.\n", + /* 85*/ "MIRAR ARRIBA\n- Pulsa el Botn C Abajo para mirar hacia arriba.\n", + /* 86*/ "MIRAR ABAJO\n- Pulsa el Botn C Arriba para mirar hacia abajo.\n", + /* 87*/ "El Holoprograma 2 ha sido completado con 騙ito.\n", + /* 88*/ "El Holoprograma 4 ha sido completado con 騙ito.\n", + /* 89*/ "El Holoprograma 5 ha sido completado con 騙ito.\n", + /* 90*/ "El guarda ha sido desarmado con 騙ito.\n", + /* 91*/ "El guarda ha sido derribado con 騙ito.\n", + /* 92*/ "Desarma a este objetivo vivo si puedes.\n", + /* 93*/ "Derriba a este objetivo: ocultarse es la clave.\n", + /* 94*/ "Y el guarda final...\n", + /* 95*/ "AGACHARSE\n- Mant駭 el Botn R, entonces pulsa el Botn C Abajo para agacharte.\n", + /* 96*/ "ARRASTRARSE\n- Una vez agachado, mant駭 el Botn R, entonces pulsa el Botn C abajo para arrastrarte.\n", + /* 97*/ "El Holoprograma 3 ha sido completado con 騙ito.\n", + /* 98*/ "Activa todos los interruptores.\n", + /* 99*/ "Activa todos los interruptores del muro.\n- Date prisa, ya que se reinician r疳idamente.\n", + /*100*/ "Obt駭 los cdigos de acceso examinando los terminales. \n- Usa los cdigos en los terminales del muro.\n", + /*101*/ "El Cdigo 1 ha sido obtenido.\n", + /*102*/ "El Cdigo 2 ha sido obtenido.\n", + /*103*/ "El Cdigo 3 ha sido obtenido.\n", + /*104*/ "El Cdigo 4 ha sido obtenido.\n", + /*105*/ "Entrenamiento fallado: debes mirar al frente.\n", + /*106*/ "El Holoprograma 1 ha sido completado con 騙ito.\n", + /*107*/ "Combate sin armas: derriba al objetivo.\n- Pulsa el Botn Z repetidamente para golpear.\n", + /*108*/ "Ahora int駭talo contra un objetivo en movimiento...\n", + /*109*/ "Y por ltimo contra un objetivo que contraataca.\n", + /*110*/ "Derrota a todos los enemigos sin ser alcanzado.\n", + /*111*/ "Entrenamiento fallado: te han acertado.\n", + /*112*/ "El Holoprograma 6 ha sido completado con 騙ito.\n", + /*113*/ "El Holoprograma 7 ha sido completado con 騙ito.\n", + /*114*/ "TERMINALES\n- Pulsa el Botn B cerca de la terminal\npara usarla.\n", + /*115*/ "Ahora activa las terminales rojas del muro.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bien, Joanna, te dejo. Prep疵ate para la misin.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humano (Mujer)\n", + /*127*/ "23 aos 2 meses\n", + /*128*/ "|Fichero IC #027 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A++\nEstatus Actual: Asignado\n\n|Perfil -\n\nAltamente entrenada pero sin experiencia. Reaccin excelente. Experta en gran variedad de armas. Agente muy competente en todo momento. La m疽 alta puntuacin en entrenamiento, lo que llev a la creacin de un nuevo nivel. Es la encarnacin del agente ideal del Instituto Carrington, de ah su nombre clave: 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Humano (Hombre)\n", + /*131*/ "28 aos 5 meses\n", + /*132*/ "|Fichero IC #009 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A+\nEstatus Actual: Secreto\n\n|Perfil -\n\nNuestro agente secreto con mayor experiencia. Muy preciso con su arma favorita (un Revlver Magnum). Perfectamente preparado para misiones secretas. Menos preparado en combate normal. Tras Joanna Dark, tiene el honor de tener la puntuacin m疽 alta en entrenamiento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humano (Hombre)\n", + /*135*/ "62 aos 8 meses\n", + /*136*/ "|Fichero IC #000 -\n\nEstatus Entrenamiento: N/D\nGrado de Entrenamiento: N/D\nEstatus Actual: N/D\n\n|Perfil -\n\nInteligente y patriarcal cientfico/empresario, fundador del Instituto Carrington. Planifica todas las misiones de sus agentes y controla cada operacin desde su oficina. Con un gusto un tanto personal en la ropa.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humano (Mujer)\n", + /*139*/ "39 aos ? meses\n", + /*140*/ "|An疝isis -\n\nDirectora de la Corporacin dataDyne. Adicta al poder; detesta ser subordinada de nadie. Odia perder la iniciativa. No muestra ninguna clase de escrpulos si con ello consigue superarse en su competicin con Daniel Carrington, al cual aborrece.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humano (Hombre)\n", + /*143*/ "46 aos ? meses\n", + /*144*/ "|An疝isis -\n\nDirector de la Agencia Nacional de Seguridad. Tiene una cierta amistad con Cassandra De Vries, aunque parece m疽 una unin de inter駸. Tiende a hacer lo que dice Cassandra, ya que aunque tiene una personalidad dominante, no lo es tanto como la de ella. Cabeza visible de los elementos m疽 granujas de la ANS.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "La Inteligencia Caroll (IA)\n", + /*147*/ "6 meses\n", + /*148*/ "|Perfil -\n\nInteligencia artificial creada por la Corporacin dataDyne con habilidades de lenguaje y apertura de cdigos. Afortunadamente, tiene moral, y debido a su formidable nivel de inteligencia, ha adivinado algunos de los planes futuros de dataDyne. Su voz es muy precisa y educada y simula la personalidad de un acad駑ico.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Macho)\n", + /*151*/ "320 aos\n", + /*152*/ "|Perfil -\n\nAliengena de la raza Maian. Es un 'Protector' (guardaespaldas) del embajador Maian que viaja a la Tierra a peticin de Daniel Carrington. Los Protectores est疣 entrenados para dominar una gran variedad de armamento. Elvis es un terrfilo, es decir, est fascinado por el planeta Tierra y todo lo que contiene.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humano (Hombre)\n", + /*155*/ "Unos 30 aos\n", + /*156*/ "|Perfil -\n\nEs un sorprendente hombre rubio. Muy alto, viste ropa blanca, habitualmente una gabardina. Parece ser la cabeza pensante de la conspiracin en la que Cassandra y Trent est疣 involucrados. Poco m疽 se sabe.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disfrazado)\n", + /*159*/ "desconocida\n", + /*160*/ "|Perfil Actualizado -\n\nSe trata de un guerrero Skedar disfrazado con la proyeccin hologr畴ica de un impresionante humano rubio de unos 30 aos. Su unidad de modulacin oral da al Skedar una precisa, persuasiva, e inteligente voz. Es un instrumento de propaganda y manipulacin de los Skedar, inusualmente sutil.\n", + /*161*/ "Presidente de EE.UU.\n", + /*162*/ "Humano (Hombre)\n", + /*163*/ "50 aos\n", + /*164*/ "|Perfil -\n\nAltamente educado, es un perspicaz afroamericano que intenta hacer lo correcto, pero que est rodeado de gente como Trent Easton. Cree que tiene a Trent bajo control tras rechazar la peticin de pr駸tamo del Pelagic II a la Corporacin dataDyne. La mayora de comentaristas polticos piensa que es f當il de controlar, lo cual quiz疽 sea injusto.\n", + /*165*/ "Maian\n", + /*166*/ "Los Maian son la raza de aliengenas conocida en la Tierra como los 'Grises'. Han vigilado la Tierra durante largo tiempo, bastantes siglos, y han sido benevolentes con la humanidad, siendo conscientes del potencial de la raza humana. Su contacto en la Tierra es Daniel Carrington. Todava debe hacerse un contacto poltico formal.\n", + /*167*/ "Guerreros Skedar\n", + /*168*/ "Los Skedar son una raza aliengena guerrera que luch con los Maian durante siglos y slo ahora han aceptado un alto el fuego. Suelen usar armaduras para caminar y luchar, ya que son criaturas bastante pequeas y con forma de serpiente. Son muy agresivos y extremadamente devotos; han hecho de la Guerra una religin.\n", + /*169*/ "Antecedentes\n", + /*170*/ "Hace millones de aos, una gigantesca nave aliengena de inmenso poder, creada por una raza aliengena llamada Cetan, se hundi en el Oc饌no Pacfico. Estaba equipada con una nueva arma devastadoramente peligrosa: la 'fuerza nuclear de acople d饕il', que en teora puede causar que las cadenas que unen las mol馗ulas fallen. Aunque algunos hubieran credo en la innegable destruccin de la nave, un mensaje-c疳sula fue enviado a casa, y partes vitales de los sistemas de navegacin fueron destruidas en el sistema estelar que eligieron como escondite.\n\n Esta nave era un Cetan, una gigantesca, criatura aliengena centinela.\n\nOtra raza extraterrestre, los Maian, encontr vida en la Tierra en el 2000 AC. Detectaron un gran potencial, pero decidieron dejar a la primitiva raza humana desarrollarse sin intromisiones.\n\nLos Maian encontraron a los Skedar cerca de Delta Eridanus en el 1650 DC (fecha terr痃uea), y la escaramuza resultante pronto floreci en una guerra total. Slo tras cientos de aos de lucha se logr un tratado de paz, aunque los fan疸icos Skedar se saltaban continuamente los acuerdos de esta paz con actividades terroristas. Afortunadamente, los Maian rehusaron abandonar.\n\nLa humanidad, tambi駭, continu siendo una causa que concerna a los Maian, los cuales vean con decepcin cmo la Tierra sufra m疽 y m疽 crisis debido al crecimiento de la tecnologa y a 'situaciones fuera de contexto'. Sintieron que anunciar su presencia slo precipitara guerras futuras en el planeta, y tranquilamente decidieron continuar en observacin hasta que la raza madurara m疽.\n\nDaniel Carrington se adelant a todos en el 1985 DC al contactar con una nave Maian en rbita sobre la Tierra. Propuso un plan que poda ayudar a ambas partes, resultando as un contacto acelerado entre Humanos y Maian. Viendo que su plan era sensato, y que se trataba de una persona ntegra, los Maian permitieron a Carrington lanzar su tecnologa al dominio pblico a trav駸 de sus grandes empresas de Investigacin y Desarrollo.\n\nEntonces, en el 2006 DC, los fan疸icos Skedar dieron con la c疳sula-mensaje Cetan. Inmediatamente comenzaron a rastrear la Tierra de un modo particularmente duro, abduciendo gente y mutilando animales en un intento de determinar la localizacin del crucero de batalla perdido. Con el tiempo, sus pruebas les condujeron inevitablemente al lecho marino del Oc饌no Pacfico; de todos modos, para alcanzarla, necesitaran ayuda de los nativos.\n\nLlevando a cabo su propio estudio de la Tierra, los Skedar confeccionaron una corta lista de compaas que posean los recursos para ayudarles a recuperar la nave hundida. En lo m疽 alto de esa lista estaba la Corporacin dataDyne. Contactaron con su directora, Cassandra De Vries, y se presentaron con un trato que sonaba demasiado bien para ser cierto: el cual, por cierto, lo era. A cambio de su ayuda para levantar 'su' nave del lecho marino, los Skedar prometieron dotar a dataDyne con suficiente tecnologa aliengena para convertirse en la mayor corporacin sobre la faz del planeta. Todo lo que dataDyne tena que hacer era construir una unidad de IA con habilidades de lenguaje y 'rotura' de cdigos, que era justo lo que necesitaban. Se comenz a trabajar en el proyecto inmediatamente.\n\nCassandra De Vries le mostr al director de la ANS, Trent Easton, los detalles del plan, pero sus intentos de conseguir la aprobacin Presidencial para el pr駸tamo de una nave de investigacin a profundidad, fueron repetidamente rechazados. No exista la posibilidad de que los Skedar o dataDyne pudieran robar la nave sin desatar la ira del Gobierno de los EE.UU., as que decidieron trazar un plan bastante m疽 siniestro para reemplazar al Presidente con un clon que ellos pudieran controlar. Por supuesto, esto prometa recompensas extra para Trent y Cassandra cuando la operacin Skedar pasara a la historia.\n\nDe todas formas, no tuvieron mucho tiempo para regodearse. El plan ltimo de los fan疸icos Skedar era probar la 'fuerza nuclear de acople-d饕il' en la Tierra antes de eliminar a los Maian, y tanto Cassandra como Trent permanecieron ciegos ante la posibilidad de ser traicionados, as que enamorados de las visiones de poder y lujo, continuaron adelante.\n\nPero dataDyne haba creado inconscientemente algo que poda ver demasiado claro el peligro que implicaba una conspiracin de tal magnitud: la sabia IA construida para abrir los cdigos de acceso de la nave Cetan. Cuando se mostr disconforme con la misin para la que haba sido diseada, la respuesta de Cassandra fue ordenar que su personalidad fuera eliminada. Claramente, pensaba demasiado. En su desesperacin, y en un movimiento que podra sellar o romper un mejor trato que el 'pacto' entre dataDyne y los Skedar, la IA adopt el seudnimo de Dr. Caroll y contact con el Instituto Carrington con una splica de ayuda...\n", + /*171*/ "La Historia\n", + /*172*/ "A la inexperta agente Joanna Dark se le asign una misin relacionada con la 'extraccin' de un cientfico de un 疵ea de desarrollo de alta seguridad sita bajo el rascacielos de dataDyne. Despu駸 del encuentro, se sorprende al descubrir que el 'Dr. Caroll' es una IA creada por la propia dataDyne, pero ella continua con su tarea de escoltarle/lo a un lugar seguro. Cuando salta la alarma, Joanna tiene que abrirse camino hacia lo alto del edificio para alcanzar el helipuerto y la lanzadera que supone su nica va de escape.\n\nEn respuesta a esta incursin, dataDyne marca a Daniel Carrington como un objetivo personal y lo toma como reh駭 dos das despu駸 en su villa privada. Demandan la devolucin de la IA, su 'propiedad', a cambio de su vida. No lo saben, pero la IA ya est en la villa, donde fue interrogada por Carrington sobre los planes de futuro de dataDyne. Finalmente, Joanna rescata al director del Instituto pero es incapaz de evitar que dataDyne se apodere de nuevo del Dr. Caroll. De todas formas, Carrington conoce lo suficiente como para dar el paso dr疽tico de reclamar en la Tierra un equipo de especialistas Maian.\n\nJoanna es enviada para espiar la reunin de los conspiradores en el Edificio G5, una tapadera de la Corporacin dataDyne. Es aqu donde averigua que Trent Easton, director de la ANS, y aquellos hombres nrdicos, que parecen tener el control del mortal plan, est疣 involucrados. Cuando Trent revela el plan de usurpar la posicin Presidencial, Joanna comunica por radio las novedades a la base, slo para descubrir que otra tarea todava m疽 urgente requiere de ella, antes incluso de llevar a cabo cualquier accin contra Trent.\n\nLos especialistas Maian han sido interceptados y derribados por los conspiradores, y los supervivientes y los restos del accidente son transportados al チrea 51, en Nevada. Con la misin de rescatar supervivientes y recuperar sus equipos, Joanna es 'introducida' para enlazar con otro agente del Instituto Carrington. Cuando irrumpe en el laboratorio m馘ico, Joanna descubre finalmente el secreto del Instituto, sus aliados son los Maian, la raza aliengena comnmente conocida como los 'Grises'. El Maian en particular que ella rescata responde al nombre de Elvis. Fue un guardaespaldas del Embajador que viajaba a la cabeza del equipo de especialistas.\n\nHabiendo asistido al resto de la delegacin Maian, Joanna puede volver al asunto del Presidente y a los planes de dataDyne en su contra. Se hace pasar por miembro del s駲uito Presidencial para acceder a la base a駻ea donde el Air Force One est ubicado, y consigue colarse con 騙ito en el avin. Nada m疽 despegar, Trent y el Skedar disfrazado mueven pieza, pero Joanna est all para detenerles. Apresura al Presidente a la c疳sula de escape mientras un equipo de hombres de Trent registran detenidamente el avin, en un intento de arrastrar al desgraciado poltico a bordo del OVNI Skedar, unido al AF1 por un tubo. Joanna debilita el tubo pero es incapaz de romperlo, y en ltima instancia Elvis intenta romper el tubo estrell疣dose contra 駘 a gran velocidad. Las tres naves caen en picado sobre la 'inexplorada' Alaska, y la c疳sula de escape del AF1 se eyecta.\n\nUna vez consciente, Joanna intenta informar por radio pero las comunicaciones est疣 bloqueadas debido a interferencias provenientes de la nave Skedar. Vagando por la nieve en busca del Presidente y de Elvis, se encuentra con grupos de Skedar ocultos que la buscan a ella, al Presidente, a Elvis y las pertenencias del Presidente. Localiza un grupo de vuelta a la nave Skedar derribada, donde descubre un clon del Presidente: r疳idamente lo destruye, apaga el origen de las interferencias y pide ayuda a la 'caballera'. Los planes Skedar han vuelto a ser frustrados, el Presidente est seguro y la incompetencia de Trent le ha llevado a un sucio destino a manos de sus 'aliados'.\n\nPero aqu no acaba la cosa. Descuidando toda precaucin, dataDyne y los Skedar roban el navo de investigacin del Gobierno, el 'Pelagic II', y se ponen en marcha hacia el lugar del siniestro en el Pacfico. Joanna y Elvis acuden para desbaratar la actividad a bordo y averiguar qu se esconde tras el gran plan Skedar. Despu駸 de paralizar las operaciones de inmersin del navo y replegar el sumergible, bajan al fondo oce疣ico, donde hacen el primer avistamiento del crucero de batalla Cetan derribado. Un portal hecho por los Skedar les permite el acceso a la nave, donde se encuentran con el cad疱er de un guerrero Skedar... Parece que el equipo de asalto no las tena todas consigo. Venciendo a los restantes vengativos Skedar y evitando a los Cetan, Joanna y Elvis se abren camino hasta el corazn de la nave, donde encuentran la IA que una vez fue Dr. Caroll. Se las apaan para restaurarle la personalidad, despu駸 de lo cual les ayuda a abandonar la nave para poder destruirla por el bien de todos.\n\nM疽 tarde, de vuelta en el Instituto Carrington, Joanna est a punto de salir hacia una recepcin Presidencial en la Casa Blanca cuando se arma un gran revuelo. Los supervivientes del equipo de asalto Skedar est疣 descargando su ira en aquellos en los que piensan recae la responsabilidad de su error al perder la nave Cetan. Joanna corre por el Instituto, ayudando a los empleados del IC a alcanzar la seguridad de los hangares, mientras los Skedar lanzan ataques en varias partes del edificio: la mayora de los empleados pudieron ponerse a salvo mientras Joanna mantena la resistencia, pero finalmente es golpeada e inconsciente es tomada como prisionera.\n\nJoanna despierta en una celda a bordo de la nave de asalto Skedar, con Cassandra De Vries como nica compaa. Por sorpresa, la directora de dataDyne, de buena gana da su vida para crear la distraccin necesaria para que Joanna escape. Luchando a trav駸 de la nave, logra localizar y desactivar los escudos de la baha de carga, permitiendo a Elvis llevar a unos cuantos amigos a la tan esperada 'fiesta' de la nave.\n\nLa ya capturada nave de asalto entra en rbita sobre el Templo de Batalla Skedar, lo que sorprende a Elvis ya que los Maian nunca antes haban encontrado 'el m疽 sagrado' lugar Skedar en todos los aos de Guerra interracial. Si el Templo es destruido, la moral Skedar ser abatida, y se lograr una paz verdadera en vez de un intil 'alto el fuego'. Joanna busca al lder Skedar, el m疽 alto sacerdote del Templo de Batalla, mientras Elvis regresa a la nave de asalto para traer a la flota Maian.\n\nAl despertar de tan culminante batalla, el templo est devastado. Elvis pide que se pare el bombardeo para encontrar a Joanna. Est viva pero retenida bajo una pila de escombros donde un tenaz Skedar la atrapa durante los ltimos segundos de su intento de escapar. Elvis le entrega r疳idamente un arma para convencer al Skedar de que la deje irse, y con el trabajo ya hecho, el Templo y la moral Skedar en ruinas y la conspiracin desbaratada, los dos parten a la rbita m疽 cercana.\n", + /*173*/ "Corporacin dataDyne\n", + /*174*/ "La monoltica corporacin que dataDyne ha llegado a ser comenz su negocio como programadora de sistemas de IA. Cuando de verdad comenz a crecer, fue cuando consigui trabajos como contratista de los militares norteamericanos, y su joven y din疥ica gerente Cassandra De Vries empez a cerrar tratos con fabricantes de armas, mientras ignoraba las ofertas de Daniel Carrington y el Instituto para colaborar en el desarrollo de ordenadores cu疣ticos e IAs. Cuando la tercera compaa armamentstica fue comprada por dataDyne, los beneficos se tornaron astronmicos. Tras recibir un contrato del gobierno para el desarrollo de armas, Cassandra De Vries fue promocionada a Directora. Una significativa parte de los beneficios de la corporacin fueron redirigidos a desarrollo de IAs, con resultados excelentes.\n", + /*175*/ "Instituto Carrington\n", + /*176*/ "Brevemente considerado como inventor chiflado, Daniel Carrington fue el primero en crear la tecnologa anti-gravedad. Las ganancias obtenidas, as como su desarrollo, le permitieron crear el Instituto Carrington, un remanso de creadores de tecnologa situado en un remoto lugar de los EE.UU. De hecho, el Instituto es un campo de entrenamiento para agentes que son enviados por todo el planeta para seguir el desarrollo tecnolgico actual, por razones que slo conoce el propio Daniel Carrington.\n", + /*177*/ "Descripcin\n- Una pequea c疥ara remota para exploracin sigilosa. Realiza holografas espectroscpicas. Abre puertas proyectando un impulso de calor del tamao de un humano.\n\nInstrucciones de Entrenamiento\n- Crea un holograma del terminal hacker de al lado de la Sala de Informacin.\n\nOperativa\n- El Botn Z toma una holografa. El Botn B abrir cualquier puerta en el camino. Mant駭 el Botn R para mirar.\n", + /*178*/ "Descripcin\n- Mejora la luz visible para producir una imagen del 疵ea circundante. Tambi駭 refleja formas de vida. En niveles normales de luz se produce una sobrecarga que 'blanquea' el visor.\n\nInstrucciones de Entrenamiento\n- Busca el interruptor de la luz en la oscuridad y actvalo.\n\nOperativa\n- Selecciona la Visin Nocturna de tu inventario para activarla. Hazlo de nuevo para desactivarla.\n", + /*179*/ "Descripcin\n- Dispositivo para apertura de cdigos. Se aplica sobre el panel de control y busca la combinacin hasta que la puerta se abra.\n\nInstrucciones de Entrenamiento\n- Encuentra el panel de la puerta cerrada y usa el Descodificador de Puertas en 駘 hasta que la abras.\n\nOperativa\n- Sitate cerca del panel de la puerta y pulsa el Botn B mientras sujetas el Descodificador para usarlo.\n", + /*180*/ "Descripcin\n- Se usa para ver a trav駸 de muros slidos y objetos. Puede ver cosas que la Visin Nocturna y el Esc疣er de Infrarrojos no pueden.\n\nInstrucciones de Entrenamiento\n- Con el Esc疣er de Rayos-X, busca los dos interruptores ocultos y actvalos para apagar la cuadrcula l疽er.\n\nOperativa\n- Elige el Esc疣er de Rayos-X de tu inventario para activarlo. Seleccinalo otra vez para desactivarlo.\n", + /*181*/ "Descripcin\n- Evita problemas al usar un disfraz. Pero, siempre debes estar alerta ante la posibilidad de ser desenmascarado por un enemigo espabilado.\n\nInstrucciones de Entrenamiento\n- Grimshaw tiene un Dispositivo de Ocultacin esper疣dote. Ve a la puerta de al lado para 'hacerte' con uno.\n\nOperativa\n- Para llevar el disfraz, simplemente elgelo en tu inventario.\n", + /*182*/ "Descripcin\n- Traslada datos termales en im疊enes visibles. Puede ser usado en la oscuridad y tambi駭 revela anomalas como puertas ocultas o muros debilitados.\n\nInstrucciones de Entrenamiento\n- Enciende el Esc疣er de Infrarrojos, encuentra la puerta oculta y 畸rela.\n\nOperativa\n- Elige el Esc疣er de Infrarrojos en tu inventario para activarlo. Reelgelo para desactivarlo.\n", + /*183*/ "Descripcin\n- Localiza un objeto en el mapa radar del visor. Muestra la posicin relativa y la distancia.\n\nInstrucciones de Entrenamiento\n- Activa el Rastreador y sigue la seal de radar hasta obtener el objeto.\n\nOperativa\n- Selecciona el Rastreador en tu inventario para activarlo. Reelgelo para desactivarlo.\n", + /*184*/ "Descripcin\n- Trastorna el espectro visible de luz alrededor del portador, creando un efecto camalenico. Este campo desaparece cuando el portador dispara.\n\nInstrucciones de Entrenamiento\n- Activa el Dispositivo de Ocultacin y dirgete a la oficina de Carrington para sorprenderle.\n\nOperativa\n- Selecciona el Dispositivo de Ocultacin para activarlo. Reelgelo para desactivarlo.\n", + /*185*/ "Descripcin\n- Emite una seal constante que sirve para bloquear cualquier dispositivo de comunicacin electrnica. Debe ser colocado en el objeto para ser efectivo.\n\nInstrucciones de Entrenamiento\n- Lanza la Mina ECM en el Puerto tras la puerta secreta.\n\nOperativa\n- Pulsa el Botn Z para lanzar la mina. Mant駭 el Botn R y mueve el Stick de Control para afinar tu puntera antes de lanzar.\n", + /*186*/ "Descripcin\n- Comunica al agente de campo con los hackers del Instituto sitos en el CG, quienes pueden romper cerraduras electrnicas a distancia.\n\nInstrucciones de Entrenamiento\n- Usa el Conector de Datos para 'hackear' la terminal de la esquina, abriendo as una puerta secreta.\n\nOperativa\n- Sitate en la terminal y pulsa el Botn B mientras sujetas el Conector de Datos.\n", + /*187*/ "DISPARAR\n Pulsa el Botn Z para disparar el arma.\n", + /*188*/ "RECARGA AUTOMチTICA\n Suelta el Botn Z cuando no tengas municin.\n", + /*189*/ "RECARGA MANUAL\n Pulsa el Botn B para recargar en cualquier momento.\n", + /*190*/ "Apuntar: Mant駭 el Botn R para entrar en el modo Apuntar.\n", + /*191*/ "Usa el Stick de Control para mover la mirilla.\n", + /*192*/ "AUTODISPARO\n Mant駭 el Botn Z para disparar autom疸icamente.\n", + /*193*/ "ALTERAR VISTA\n Pulsa el Botn C Arriba o el Botn C Abajo para mover la vista arriba/abajo.\n", + /*194*/ "ZOOM\n Mant駭 el Botn R para entrar en el modo Zoom.\n", + /*195*/ "FUEGO RチPIDO\n Pulsa el Botn Z r疳ido para disparar m疽 velozmente.\n", + /*196*/ "Instituto Carrington\0|Base de operaciones\n", + /*197*/ "Edificio Lucerne\0|Cuartel General Global\n", + /*198*/ "Stano Laboratorio\0|Laboratotios subterr疣eos\n", + /*199*/ "Villa Carrington\0|Propiedad privada en la costa\n", + /*200*/ "Chicago\0|Barrios Bajos de la ciudad\n", + /*201*/ "Edificio G5\0|Edificio de la Corporacin dataDyne\n", + /*202*/ "チrea 51\0|Cerca del Lago Seco, Nevada\n", + /*203*/ "Base A駻ea Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Avin del Presidente\n", + /*205*/ "Lugar del Impacto\0|Isla Victoria 71コN 118コO\n", + /*206*/ "Pelagic II\0|Navo especializado de profundidad\n", + /*207*/ "Nave Cetan\0|Nave aliengena en la Tierra\n", + /*208*/ "Nave de Asalto Skedar\0|Nave espacial de transporte\n", + /*209*/ "Mundo Skedar\0|El planeta del Templo de Batalla\n", + /*210*/ "Lanzadera\0|チgil transporte de tropas\n", + /*211*/ "AntiGrav\0|Dispositivo de Antigravedad\n", + /*212*/ "Aeromoto\0|Vehculo a駻eo de baja altitud\n", + /*213*/ "Bot de Limpieza\0|Tu ayudante especial\n", + /*214*/ "Hovercptero\0|Nave de asalto urbana\n", + /*215*/ "Robot G5\0|Droide urbano de combate\n", + /*216*/ "Interceptor A51\0|Interceptor a駻eo robtico\n", + /*217*/ "Nave Maian\0|Nave de reconocimiento y patrulla\n", + /*218*/ "Lanzadera Skedar\0|Nave aliengena de tropas\n", + /*219*/ "El edificio del Instituto comprende diferentes 疵eas: oficinas y laboratorios, talleres y hangares. Est bastante aislado del mundo exterior, lo que ayuda a mantener las operaciones en secreto.\n", + /*220*/ "En el centro del distrito financiero, el austero rascacielos de la Corporacin dataDyne destaca sobre sus vecinos.\n", + /*221*/ "Fuertemente guardados, estos bien escondidos laboratorios son la clave del futuro de dataDyne. En ellos, los t馗nicos trabajan secretamente para situar a dataDyne en lo m疽 alto.\n", + /*222*/ "Pertenceciente al Instituto, esta apartada residencia es utilizada por Daniel Carrington como retiro de su trabajo en el Instituto. Tambi駭 tiene un observatorio, su propio generador el馗trico y una ampla bodega.\n", + /*223*/ "Es una srdida y mugrienta parte de Chicago, ahora cerrada al tr畴ico. Es aqu donde la Corporacin G5 tiene su cuartel general.\n", + /*224*/ "Dentro del Edificio G5 hay una sala de reuniones protegida por sistemas antigrabacin. Para dataDyne es el lugar m疽 seguro para formular sus planes confidenciales.\n", + /*225*/ "Esta seccin de la gigantesca instalacin conocida como チrea 51 est situada al pie de las colinas del Lago Seco. Helipuertos exteriores y torres de comunicacin indican el posible tamao del complejo subterr疣eo.\n", + /*226*/ "Una de las muchas bases a駻eas reforzadas para acoger al Air Force One cuando reposta. Normalmente, estas bases a駻eas est疣 en lugares remotos en regiones inhspitas, lejos de ojos entrometidos.\n", + /*227*/ "Este Air Force One en particular est optimizado para climas fros, siendo muy til cuando se usa en el norte de Alaska. El destino del vuelo es Oslo, Noruega.\n", + /*228*/ "En este rocoso paisaje cubierto de nieve en pleno Crculo チrtico, descansan los restos de un avin destrozado.\n", + /*229*/ "Propiedad del gobierno norteamericano, el Pelagic II es capaz de consumar operaciones a muy baja profundidad en cualquier condicin. Es el nico navo de desarrollo a baja profundidad del mundo.\n", + /*230*/ "Se trata de una nave gigantesca de construccin aliengena que reposa en el fondo oce疣ico desde hace millones de aos.\n", + /*231*/ "Es una nave de asalto interplanetaria que transporta guerreros Skedar a zonas de guerra. Pertenece a la muy reducida flota de batalla Skedar.\n", + /*232*/ "Se trata de un planeta extremadamente 疵ido, asolado por terremotos, tormentas de arena y huracanes. Es parte de un complejo sistema solar que incluye tres soles.\n", + /*233*/ "Este pequeo, r疳ido, y altamente manejable transporte de agentes ha sido diseado para uso en 疵eas urbanas. Puede ser controlado por ordenador o remotamente. Tiene espacio suficiente en su interior para tres o cuatro agentes, m疽 su equipamiento.\n", + /*234*/ "Este dispositivo anti-gravedad fue diseado para ayudar en los almacenes. Se aplica en el lateral de una caja. Cuando se activa, el campo antigravitatorio levanta el cajn y le quita algo de inercia.\n", + /*235*/ "Es una moto de patrulla de baja altitud. Usa una pequea unidad antigravedad para elevarse, y una poderosa turbina para moverse y proveer de control direccional.\n", + /*236*/ "Mantiene el lugar limpio y ordenado. Suele tener acceso a todas las 疵eas de un edificio. Los agentes han sido adiestrados en mantener estos robots intactos, ya que pueden conseguir acceso a zonas sensibles.\n", + /*237*/ "Vehculo de patrulla urbana y eliminacin, con tripulacin de dos hombres, y armado con un can en el morro, y dos sistemas de misiles en las alas. Puede ser eliminado con fuego sostenido, o preferentemente, un cohete bien dirigido.\n", + /*238*/ "Es un robot de combate diseado para guerrilla urbana. Usa una unidad anti-gravedad. Est fuertemente armado. Se suele usar para mantener lejos a visitantes no deseados, gracias a su programacin de '1ー dispara, despu駸 pregunta'.\n", + /*239*/ "Variacin robtica de la Aeromoto, con mayor poder gravitatorio y de turbina; puede alcanzar velocidad Mach 2 f當ilmente y avanzar durante horas a velocidad de crucero. Aunque bien armada, se basa en su manejabilidad m疽 que en el escudo.\n", + /*240*/ "Est diseada para llevar a un nico piloto Maian. Un pasajero se puede sentir atorado: si 駸te es humano, puede ser an peor.\n", + /*241*/ "Es capaz de llevar a la batalla a diez guerreros Skedar completamente armados. Es indetectable por el radar convencional. Puede emitir seales de bloqueo sobre 疵eas considerables: 駸tas interrumpen las comunicaciones as como los equipos de deteccin.\n", + /*242*/ "Descripcin\n- Un buen agente siempre observa lo que hay a su alrededor.\n\nInstrucciones de Entrenamiento\n- Examina todos los objetos mir疣dolos directamente.\n\nOperativa\n-Mirar arriba: Pulsa el Botn C Abajo\n-Mirar abajo: Pulsa el Botn C Arriba\n-Vista Libre: Mant駭 pulsado el Botn R para entrar en el modo Apuntar, y usa el Stick de Control para mirar.\n", + /*243*/ "Descripcin\n- Esquivar y eludir te puede sacar de muchos problemas.\n\nInstrucciones de Entrenamiento\n- Activa todos los interruptores. S r疳ida, ya que cada botn se reiniciar en un tiempo lmite.\n\nOperativa\n- Esquivar Izquierda: Botn C Izquierda\n- Esquivar Derecha: Botn C Derecha\n\n", + /*244*/ "Descripcin\n- Agacharse puede abrir nuevas 疵eas de exploracin.\n\nInstrucciones de Entrenamiento\n- Avanza evitando los obst當ulos utilizando los movimientos disponibles. Activa los interruptores.\n\nOperativa\n- Agacharse: Mant駭 el Botn R, y pulsa el Botn C Abajo.\n- Arrastrarse: Una vez agachado, mant駭 el Botn R, y pulsa el Botn C Abajo.\n- Levantarse: Presiona el Botn R.\n\n", + /*245*/ "Descripcin\n- Luchar contra mltiples oponentes en combates mano a mano puede ser difcil.\n\nInstrucciones de Entrenamiento\n- Derriba a todos los enemigos sin ser golpeado.\n\nOperativa\n- Puetazo: Pulsa el Botn Z repetidamente cuando est駸 desarmado para lanzar una r畴aga de puetazos.\n\n", + /*246*/ "Descripcin\n- Desarmar a un enemigo te puede proporcionar una nueva arma.\n\nInstrucciones de Entrenamiento\n- Derriba/desarma a todos los enemigos sin ser golpeado.\n\nOperativa\n- Desarmar: Mant駭 el Botn B, entonces pulsa el Botn Z para desarmar al enemigo.\n- Puetazo KO: Golpea a un enemigo desprevenido por detr疽.\n", + /*247*/ "Descripcin\n- Lucha contra mltiples oponentes en combate mano a mano.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*248*/ "Descripcin\n- Lucha contra mltiples oponentes, unos armados y otros no.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*249*/ "Para mayor precisin y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*250*/ "Piensa dnde quieres ir antes de intentar la prueba. Establece tu posicin en un lugar que requiera la menor cantidad de movimiento posible entre objetivos.\n", + /*251*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves m疽 r疳ido cuando est疽 en pie. Para avanzar lo m疽 r疳ido posible, intenta agacharte slo cuando lo necesites.\n", + /*252*/ "Atacar a los enemigos por detr疽 no es muy honorable, pero har bastante m疽 f當il derribarlos. Slo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*253*/ "Slo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nueva arma.\n", + /*254*/ "No esperes a ser alcanzada, 。mu騅ete! No te centres en un solo oponente; intenta situar dnde se encuentran todos. Si no puedes ver a todos, mu騅ete hasta que sea posible.\n", + /*255*/ "Ve a por los oponentes armados slo si est疽 segura de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*256*/ "Para mayor precisin y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*257*/ "Esquivar y eludir te puede sacar de muchos problemas.\n", + /*258*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves m疽 r疳ido cuando est疽 en pie. Para avanzar lo m疽 r疳ido posible, intenta agacharte slo cuando lo necesites.\n", + /*259*/ "Atacar a los enemigos por detr疽 no es muy honorable, pero har bastante m疽 f當il derribarlos. Slo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*260*/ "Slo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nuevo arma.\n", + /*261*/ "No esperes a ser alcanzada; 。mu騅ete! No te centres en un solo oponente; intenta situar dnde se encuentran todos. Si no puedes ver a todos, mu騅ete hasta que sea posible.\n", + /*262*/ "Ve a por los oponentes armados slo si est疽 seguro de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*263*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexin.\n", + /*264*/ "Asegrate de que la mina aterriza en el sitio correcto acerc疣dote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botn R.\n", + /*265*/ "La C疥ara Espa puede ser difcil de controlar, as que tmate tu tiempo.\n", + /*266*/ "Es til en combate, pero puede causar problemas cuando se sobrecarga.\n", + /*267*/ "Si tienes problemas para usar el Decodificador, intenta acercarte m疽 al objetivo poni駭dote cara a cara.\n", + /*268*/ "El Rastreador slo indica la direccin y altura relativa; no muestra un mapa que te gue al blanco. Presta atencin a tus alrededores, y prep疵ate a explorar.\n", + /*269*/ "El visor estrecha tu visin perif駻ica, lo cual puede causar problemas en combate. Asegrate de tu situacin antes de usarlo.\n", + /*270*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podr疽 ver nada a cierta distancia. レsalo con moderacin.\n", + /*271*/ "Un disfraz no es slo la ropa, es la manera en que una persona lo lleva. No actes de manera diferente a la de la persona que est疽 intentando ser.\n", + /*272*/ "Preserva tu Dispositivo de Ocultacin cuando no hay nadie alrededor que pueda observarte.\n", + /*273*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexin.\n", + /*274*/ "Asegrate de que la mina aterriza en el sitio correcto acerc疣dote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botn R.\n", + /*275*/ "La C疥ara Espa no es invisible: los enemigos la pueden descubrir, as que ten cuidado cuando entres en un 疵ea habitada. Recuerda que la C疥ara Espa se quedar donde la dejes hasta que la recojas.\n", + /*276*/ "Es til en combate, pero puede causar problemas cuando se sobrecarga. Intenta anticiparte a las situaciones y reacciona antes que el enemigo.\n", + /*277*/ "Si tienes problemas para usar el Decodificador, intenta acercarte m疽 al objetivo poni駭dote cara a cara.\n", + /*278*/ "El Rastreador slo indica la direccin y altura relativa; no muestra un mapa que te gue al objetivo. Presta atencin a tus alrededores, y prep疵ate a explorar.\n", + /*279*/ "El visor estrecha tu visin perif駻ica, lo cual puede causar problemas en combate. Asegrate de tu situacin antes de usarlo.\n", + /*280*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podr疽 ver nada a cierta distancia. レsalo con moderacin.\n", + /*281*/ "Un disfraz no es slo la ropa, es la manera en que una persona lo lleva. No actes de manera diferente a la de la persona que est疽 intentando ser.\n", + /*282*/ "Preserva tu Dispositivo de Ocultacin cuando no hay nadie alrededor que pueda observarte. Evita disparar a menos que sea absolutamente necesario, y slo si est疽 seguro del 騙ito de tu ataque.\n", + /*283*/ "La Falcon 2 es una pistola muy precisa, as que cualquier error ser tuyo. El modo secundario es golpear con su culata y es, por lo tanto, intil en una prueba de tiro.\n", + /*284*/ "Para hacer un mejor uso de la precision de la Falcon 2, una mira ha sido puesta en la pistola. Como en la Falcon 2 sin modificar, el modo secundario de golpear con la culata es intil durante la prueba de tiro.\n", + /*285*/ "La version con silenciador de la Falcon 2 es una excelente arma, diseada para darte la ventaja de la sorpresa sobre tus oponentes. Prueba tu precision para asegurarte que nunca derrochar疽 tus oportunidades.\n", + /*286*/ "La Magsec 4 tiene un excelente poder de disparo a costa de la precisin, especialmente cuando se usa el modo secundario de r畴aga de 3 tiros. La nica desventaja seria es el tamao limitado de su cargador.\n", + /*287*/ "Esta tpica arma Skedar es brutal y poderosa. Sacrificando algo del cartucho, el disparo puede ser cargado para crear una explosin devastadora. Su capacidad de recarga es alta.\n", + /*288*/ "Esta vers疸il pistola ofrece dos diferentes sistemas de disparo para su municin: un disparo est疣dar o una descarga explosiva. Los ingenieros Maian lo han conseguido sin comprometer el uso de energa del arma, aunque el ritmo de disparo es reducido.\n", + /*289*/ "La clave del uso del DY357 es saber cu疣do recargar. Un cartucho de seis balas implica estar siempre alerta en un tiroteo. El peso del arma puede ser muy til si tienes que golpear a alguien con ella.\n", + /*290*/ "Trent Easton siempre busca facilidades extra, y este arma no es una excepcin. Las balas son tan especiales como el resto del arma; han sido diseadas para hacerse aicos en el interior del oponente y as tumbarle r疳idamente.\n", + /*291*/ "Esta fiable y efectiva metralleta no es difcil de encontrar ya que es el arma m疽 vendida de dataDyne en los ltimos dos aos, incluso si su modo secundario no se tiene en cuenta. Su sistema de adquisicin de objetivos es excelente, y deber疽 familiarizarte con todas las posibilidades de este arma.\n", + /*292*/ "La metralleta Cicln fue diseada especficamente para NO ser precisa, aunque vale la pena practicar. Puede disparar una gran cantidad de balas en poco tiempo, por ello, es una excelente arma de supresin.\n", + /*293*/ "La flexibilidad Maian respecto al diseo ha creado esta metralleta con un interesante modo secundario: una bala de alta velocidad que puede atravesar objetos f當ilmente. El ritmo de disparo, como en la Phoenix, se reduce durante el modo secundario; esto se debe a que se intenta prevenir dao en el mecanismo de disparo y en el can.\n", + /*294*/ "La RC-P120 dispara una bala mineral especial que, acompaada de un ritmo de disparo r疳ido y un amplio cargador, hace de este arma una herramienta perfecta para ser usada contra los Skedar. Las balas pueden ser usadas para recargar un prototipo de Dispositivo de Ocultacin: el entrenamiento ha sido alterado para reflejar esta caracterstica en particular.\n", + /*295*/ "Este arma no slo se parece a un ordenador PC port疸il, sino que puede ser utilizada como arma centinela en el modo secundario para cubrir una ruta de escape o proteger un lugar.\n", + /*296*/ "ノste es el modelo que dataDyne present con 騙ito a los militares de EE.UU., aunque todava tiene que ser aprobado. Siguiendo la tendencia de dataDyne de dar a la gente desagradables sorpresas, el modelo b疽ico del rifle de asalto lleva una mina de proximidad debajo del can. Usar el modo secundario obviamente implica que debes lanzar tu arma.\n", + /*297*/ "Tan lejos como podemos establecer, el modo secundario del arma parece ser que identifica trampas, minas dirigidas, dispositivos explosivos ocultos (como el Dragn en modo secundario), y armas autom疸icas. Aunque poderoso, el cartucho de este rifle de asalto es pequeo. \n", + /*298*/ "Como primera arma con apoyo del Instituto, el AR34 es un rifle de asalto bastante b疽ico. El modo secundario es un zoom permamente. Probar a sujetarlo vale como entrenamiento de precisin.\n", + /*299*/ "Se trata de la variante pesada del Dragn sin mina de proximidad, la cual ha sido reemplazada por un lanzagranadas. Adoptada por los militares norteamericanos como arma de apoyo de brigada pesada: se nota el porqu... Practica para hacerte con la trayectoria de las granadas.\n", + /*300*/ "La delicadeza no es una opcin aqu. Hay dos modos, explosin simple o doble. El cartucho es amplio para una escopeta, pero ten cuidado con el largo tiempo de recarga, y planea tus movimientos en consonancia.\n", + /*301*/ "Esta fina pieza de ingeniera es un rifle de francotirador con silenciador con un zoom de alta tecnologa. Lo nico que puede interferir en la precisin de este arma es el zoom de francotirador. Asegrate de agacharte y mantener tu mirilla en el modo secundario.\n", + /*302*/ "Aunque las t馗nicas actuales de ingeniera nos superan, todava podemos apreciar los efectos del rifle FarSight. Su disparo es imparable, y puede penetrar muros a bastante profundidad, alcanzando objetivos si se necesita.\n", + /*303*/ "La funcin primaria de la ballesta es un disparo de sedante no letal, mientras que el secundario es la muerte instant疣ea. Es un arma principalmente sigilosa, pero su largo tiempo de recarga puede ser un inconveniente durante un tiroteo.\n", + /*304*/ "La pistola tranquilizante es muy comn, pudiendo ser encontrada en laboratorios m馘icos y hospitales de todo el mundo. Puede ser usada con perdigones tranquilizantes, o con dosis letales, que usan bastante m疽 cantidad de la reserva de sedantes.\n", + /*305*/ "Intenta controlar este arma lo mejor que puedas. Fue diseada para usuarios bastante m疽 fuertes que los humanos. Arrodillarse puede ayudar a apuntar el arma, pero no a perfeccionar el tiro. Si algn oponente logra esquivar la lluvia de balas, sus caones pueden usarse como trituradoras para infringir dao.\n", + /*306*/ "Este reciente producto de dataDyne, cuenta con tecnologa muy interesante en su interior. El modo secundario activa un campo magn騁ico alrededor de la bomba, lo que le permite adherirse durante un limitado periodo de tiempo. Cuando ese tiempo pasa, la bomba cae, impacta y explota.\n", + /*307*/ "Es un compacto lanzamisiles reutilizable: recarga tras cada tiro. El modo secundario usa una variante del sistema de blancos de la metralleta CMP150. El misil viaja lentamente lo que le permite seguir al objetivo, as que tenlo en cuenta y planea tus disparos cuidadosamente.\n", + /*308*/ "Este lanzador port疸il de msiles Skedar puede disparar tanto cohetes sin gua, como por control remoto. A los Skedar les produce una perversa satisfaccin cuando la c疥ara se acerca al objetivo, pero un agente del IC est m疽 all de esas cosas. Los cohetes guiados aceleran autom疸icamente, pero pueden ser decelerados para m疽 maniobrabilidad. La detonacin ocurre por contacto o cuando se aprieta el gatillo.\n", + /*309*/ "Este cuchillo finamente pulido, est equilibrado para ser lanzado. La pr當tica es esencial para acostumbrarse al alcance y trayectoria de la hoja lanzada.\n", + /*310*/ "El departamento de armas experimentales ha creado este pequeo pero efectivo l疽er de mueca con dos diferentes rayos. El modo primario genera una explosin a gran distancia, mientras que el secundario provee de un rayo continuo hasta que el gatillo es soltado.\n", + /*311*/ "Cuatro segundos pasan desde la activacin a la detonacin de la granada de fragmentacin antipersonal en el modo b疽ico. Para tu deleite y entretenimiento, se ha incluido un modo secundario: pinball de proximidad. La granada rebotar hasta que la carga explote cuando su detector de proximidad se active.\n", + /*312*/ "Esta granada Maian hace estragos con las neuronas de las criaturas. Si caes en su radio de explosin, tu visin se volver borrosa y no podr疽 agarrar lo que lleves. La granada puede ser activada por lanzamiento o por proximidad. Asegrate de lanzarla cuando est駸 lo suficientemente lejos.\n", + /*313*/ "Se necesita bastante criterio para un uso efectivo de las minas de tiempo, de otro modo, la explosin no afectar al objetivo, y 駸te ir detr疽 tuyo. Mejorar tu habilidad en las pruebas evitar errores crticos. La funcin secundaria es un detector de trampas id駭tico al encontrado en el rifle de asalto Vengador K7.\n", + /*314*/ "La clave de la colocacin correcta de las minas de proximidad es situarlas donde tus oponentes no se esperen encontrarlas. Si t mismo no quieres tener problemas, usa el modo secundario de deteccin de trampas para asegurar tus alrededores. Puede que te haga perder el tiempo, pero si no es as, podr salvar tu vida.\n", + /*315*/ "La ltima variedad de minas remotas detonables, es esencialmente igual a las que ya tenas. El modo primario es poner las minas, mientras que el secundario es dar las rdenes de explosin. Si no puedes ver la mina, deber疽 confiar en el viejo m騁odo de prueba y error. \n", + /*316*/ "Holo 1 - Mirar alrededor\n", + /*317*/ "Holo 2 - Movimiento 1\n", + /*318*/ "Holo 3 - Movimiento 2\n", + /*319*/ "Holo 4 - Comb. sin armas 1\n", + /*320*/ "Holo 5 - Comb. sin armas 2\n", + /*321*/ "Holo 6 - Comb. Directo 1\n", + /*322*/ "Holo 7 - Comb. Directo 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/earE.c b/src/files/lang/pal-beta/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-beta/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/earJ.c b/src/files/lang/pal-beta/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/pal-beta/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/earP.c b/src/files/lang/pal-beta/earP.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-beta/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_f.c b/src/files/lang/pal-beta/ear_str_f.c new file mode 100644 index 000000000..fc75d226f --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - D駻outer cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les syst鑪es de s馗urit. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux ct駸 du robot pour ne pas subir de d馮穰s.\n\n|Objectif 3: - Arr黎er les exp駻iences\n\nLes exp駻iences des laboratoires du secteur 2 provoquent des interf駻ences avec nos communications, emp鹹hant nos pirates de briser le code de s馗urit. Forcez les scientifiques pr駸ents les interrompre. Vous pouvez vous risquer cette manoeuvre mais l'alarme se d馗lenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Obtenir 馗hantillons tech.\n\nDr. Caroll nous informe que trois autres projets majeurs sont sur le point d'黎re achev駸 dans les laboratoires voisins du sien. R馗up駻ez les prototypes des trois exp駻iences et rapportez-les l'Institut Carrington pour une 騁ude.\n\n|Objectif 5: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 1*/ "LABORATOIRE SOUTERRAIN\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - D駻outer cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les syst鑪es de s馗urit. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux ct駸 du robot pour ne pas subir de d馮穰s.\n\n|Objectif 3: - Arr黎er les exp駻iences\n\nLes exp駻iences des laboratoires du secteur 2 provoquent des interf駻ences avec nos communications, emp鹹hant nos pirates de briser le code de s馗urit. Forcez les scientifiques pr駸ents les interrompre. Vous pouvez vous risquer cette manoeuvre mais l'alarme se d馗lenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Trouver le Dr. Caroll\n", + /* 10*/ "Arr黎er les exp駻iences\n", + /* 11*/ "D駻outer cycle maintenance\n", + /* 12*/ "Obtenir 馗hantillons tech.\n", + /* 13*/ "Holographier l'isotope radioactif\n", + /* 14*/ "Effets sons m馗anisme.\n", + /* 15*/ "Robots de maintenance activ駸.\n", + /* 16*/ "Robots de maintenance reprogramm駸.\n", + /* 17*/ "Portes s馗urit d騅errouill馥s.\n", + /* 18*/ "Cycle de maintenance activ.\n", + /* 19*/ "Cycle nettoyage activ.\n", + /* 20*/ "Op駻ation refus馥 - robots occup駸.\n", + /* 21*/ "Robots de maintenance d駸activ駸.\n", + /* 22*/ "Objet crucial d騁ruit.\n", + /* 23*/ "Syst鑪e robots maintenance d駸activ.\n", + /* 24*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 25*/ "Qui 黎es-vous?\n", + /* 26*/ "Pertes inacceptables de scientifiques.\n", + /* 27*/ "Terminal inactif.\n", + /* 28*/ "Coupure des syst鑪es actifs.\n", + /* 29*/ "Exp駻ience interrompue.\n", + /* 30*/ "Alarme activ馥.\n", + /* 31*/ "Alarme d駸activ馥.\n", + /* 32*/ "Ne me tuez pas! Je vais vous aider.\n", + /* 33*/ "Qu'est-ce que vous foutez ici?\n", + /* 34*/ "Je vais vous aider...\n", + /* 35*/ "Zut alors. J'ai fait une b黎ise.\n", + /* 36*/ "ACCES REFUSE - code de s馗urit requis.\n", + /* 37*/ "Recherche mot de passe.\n", + /* 38*/ ".", + /* 39*/ "Mot de passe localis - d駻ivation serrure.\n", + /* 40*/ "Contact rompu - r騁ablissement connexion.\n", + /* 41*/ "Porte de s馗urit d駛 d騅errouill馥.\n", + /* 42*/ "Exp駻ience d駛 interrompue.\n", + /* 43*/ "Etrange - l'exp駻ience est d駛 arr黎馥!\n", + /* 44*/ "Quelqu'un a cass mon PC!\n", + /* 45*/ "Obtenir Vision nocturne.\n", + /* 46*/ "Cassandra De Vries: \n", + /* 47*/ "Vision nocturne\n", + /* 48*/ "Mallette de De Vries\n", + /* 49*/ "Vision nocturne obtenue.\n", + /* 50*/ "Obtenir objet de tech bouclier.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Objet de tech bouclier\n", + /* 53*/ "Mallette de De Vries\n", + /* 54*/ "objet de tech bouclier obtenu.\n", + /* 55*/ "Obtenir r馗epteur.\n", + /* 56*/ "\n", + /* 57*/ "R馗epteur\n", + /* 58*/ "Un r馗epteur\n", + /* 59*/ "R馗epteur obtenu.\n", + /* 60*/ "Connexion 騁ablie.\n", + /* 61*/ "Sas de maintenance ouvert.\n", + /* 62*/ "Sas de maintenance d駛 ouvert.\n", + /* 63*/ "ATTENTION - radioactivit d騁ect馥.\n", + /* 64*/ "Que faites-vous dans mon labo?\n", + /* 65*/ "Je ne vous connais pas...\n", + /* 66*/ "Vous 黎es qui, bordel?\n", + /* 67*/ "Arr黎ez l'exp駻ience.\n", + /* 68*/ "Eteignez-moi tout 軋. MAINTENANT!\n", + /* 69*/ "Coupez ce truc.\n", + /* 70*/ "Je vais l'騁eindre.\n", + /* 71*/ "Ne me faites pas de mal!\n", + /* 72*/ "Je vais vous aider.\n", + /* 73*/ "Mes exp駻iences!\n", + /* 74*/ "Voil. C'est 騁eint.\n", + /* 75*/ "Partez... TOUT DE SUITE!\n", + /* 76*/ "S馗urit!\n", + /* 77*/ "J'appelle la s馗urit.\n", + /* 78*/ "Oups. Je me suis tromp...\n", + /* 79*/ "Comment s'est arriv?\n", + /* 80*/ "C'est d駛 騁eint on dirait.\n", + /* 81*/ "Vous avez jou avec 軋, ou quoi?\n", + /* 82*/ "On a tout cass mon 駲uipement!\n", + /* 83*/ "Qu'est-il arriv mon terminal?\n", + /* 84*/ "Racaille, va! Tout est fichu!\n", + /* 85*/ "Connexion perdue - exp駻iences en cours.\n", + /* 86*/ "Objet exp駻imental 1 obtenu.\n", + /* 87*/ "Objet exp駻imental 2 obtenu.\n", + /* 88*/ "Objet exp駻imental 3 obtenu.\n", + /* 89*/ "Obtenir CamSpy.\n", + /* 90*/ "Dr. Caroll: \n", + /* 91*/ "CamSpy\n", + /* 92*/ "Une CamSpy\n", + /* 93*/ "CamSpy obtenue.\n", + /* 94*/ "C'est le secteur le plus prot馮 - Le Dr. Caroll\ndoit s'y trouver.\n", + /* 95*/ "Quelque chose dans les environs consomme beaucoup d'駭ergie.\n", + /* 96*/ "Reprogrammez ce robot de nettoyage - \nil vous fera entrer.\n", + /* 97*/ "Sortez, Joanna! Les niveaux sont trop haut.\nUtilisez la CamSpy.\n", + /* 98*/ "Compartiment armes secr鑼es ouvert.\n", + /* 99*/ "Ennemi d騁ect - coffre d'armes ferm.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, 黎es-vous ici?\n", + /*102*/ "Tout...tout danger est 馗art?\n", + /*103*/ "Oui. Tout va bien.\n", + /*104*/ "M...Mais... vous...\n", + /*105*/ "Belle manoeuvre, mon enfant. Il n'y a pas de\ntemps perdre. Nous devons partir!\n", + /*106*/ "Allons. J'ai des informations vitales \nr騅駘er et vous devez me prot馮er.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_g.c b/src/files/lang/pal-beta/ear_str_g.c new file mode 100644 index 000000000..916ab56e4 --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgefhrt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelst wird. Auf keinen Fall drfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Bringen Sie die experimentellen Technologien in Ihren Besitz!\n\nDr. Caroll hat uns darber informiert, dass noch drei weitere Projekte kurz vor dem Abschluss stehen. Ihre Aufgabe ist es, die drei Prototypen zu finden und diese an das Carrington Institut zur Evaluierung zu bergeben. \n\n|5. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 1*/ "UNTERGRUND-LABOR\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgefhrt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelst wird. Auf keinen Fall drfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Finden Sie Dr. Caroll!\n", + /* 10*/ "Unterbrechen Sie alle Experimente!\n", + /* 11*/ "Starten Sie den Wartungszyklus!\n", + /* 12*/ "Finden Sie die technischen Experimente!\n", + /* 13*/ "Holografieren Sie die Isotope!\n", + /* 14*/ "Maschineller Soundeffekt.\n", + /* 15*/ "Wartungsroboter aktiviert.\n", + /* 16*/ "Wartungsroboter umprogrammiert.\n", + /* 17*/ "Sicherheitstren entriegelt.\n", + /* 18*/ "Wartungszyklus aktiviert.\n", + /* 19*/ "Wartungszyklus-Routine aktiviert.\n", + /* 20*/ "Unerlaubte Operation - Roboter sind besch臟tigt.\n", + /* 21*/ "Wartungsroboter deaktiviert.\n", + /* 22*/ "Wichtiges Objekt zerstrt.\n", + /* 23*/ "Wartungssystem ist offline.\n", + /* 24*/ "MISSION FEHLGESCHLAGEN \n - Erreichung aller Ziele unmglich.\n", + /* 25*/ "Wer sind Sie?\n", + /* 26*/ "Es sind unschuldige Wissenschaftler zu Schaden gekommen.\n", + /* 27*/ "Das Terminal ist nicht aktiv.\n", + /* 28*/ "Aktive Systeme werden heruntergefahren.\n", + /* 29*/ "Das Experiment wurde abgeschaltet.\n", + /* 30*/ "Alarm wurde aktiviert.\n", + /* 31*/ "Alarm wurde deaktiviert.\n", + /* 32*/ "Nicht schie゚en - Ich helfe Ihnen.\n", + /* 33*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 34*/ "Lassen Sie mich Ihnen helfen.\n", + /* 35*/ "Unf舁le passieren manchmal.\n", + /* 36*/ "ZUGRIFF VERWEIGERT - Sicherheitscode erforderlich.\n", + /* 37*/ "Passwort wird gesucht.\n", + /* 38*/ ".", + /* 39*/ "Passwort gefunden - Verriegelung wird umgangen.\n", + /* 40*/ "Kontakt abgebrochen - Link muss wiederhergestellt werden.\n", + /* 41*/ "Sicherheitstr wurde bereits entriegelt.\n", + /* 42*/ "Experiment wurde bereits abgeschaltet.\n", + /* 43*/ "Eigenartig - das Experiment ist bereits abgebrochen worden!\n", + /* 44*/ "Es sieht so aus, als h舩te jemand meinen PC besch臈igt.\n", + /* 45*/ "Erlangen Sie das Nachtsichtger舩.\n", + /* 46*/ "Cassandra De Vries\n", + /* 47*/ "Nachtsichtger舩\n", + /* 48*/ "Aktenkoffer von De Vries\n", + /* 49*/ "Nachtsichtger舩 aufgenommen.\n", + /* 50*/ "Finden Sie den Schildgenerator-Prototyp.\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Schildgenerator-Prototyp\n", + /* 53*/ "De Vries Aktenkoffer\n", + /* 54*/ "Schildgenerator-Prototyp aufgenommen.\n", + /* 55*/ "Finden sie das Data Uplink-Ger舩.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink-Ger舩\n", + /* 58*/ "Ein Data Uplink-Ger舩\n", + /* 59*/ "Data Uplink-Ger舩 aufgenommen.\n", + /* 60*/ "Verbindung hergestellt.\n", + /* 61*/ "Wartungsklappe wurde geffnet.\n", + /* 62*/ "Wartungsklappe ist bereits offen.\n", + /* 63*/ "WARNUNG - Radioaktive Substanz entdeckt!\n", + /* 64*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 65*/ "Ich habe Sie hier noch nie gesehen...\n", + /* 66*/ "Wer sind Sie, verdammt noch mal?\n", + /* 67*/ "Brechen Sie das Experiment ab!\n", + /* 68*/ "Ziehen Sie den Stecker raus, SOFORT!\n", + /* 69*/ "Schalten Sie das Ding ab!\n", + /* 70*/ "Ich schalte es ab.\n", + /* 71*/ "Bitte tun Sie mir nichts!\n", + /* 72*/ "Erlauben Sie mir, Ihnen zu helfen.\n", + /* 73*/ "Meine Experimente!\n", + /* 74*/ "Da! Das Experiment ist abgeschaltet!\n", + /* 75*/ "Verschwinden Sie von hier - SOFORT!\n", + /* 76*/ "Security!\n", + /* 77*/ "Ich alarmiere die Security.\n", + /* 78*/ "Unf舁le knnen passieren.\n", + /* 79*/ "Wie konnte das geschehen?\n", + /* 80*/ "Sieht so aus, als w舐e es bereits abgeschaltet.\n", + /* 81*/ "Haben Sie daran herumgefummelt?\n", + /* 82*/ "Jemand hat meine Ausrstung zerstrt!\n", + /* 83*/ "Was ist mit dem Terminal geschehen?\n", + /* 84*/ "Du Vandale - du hast es zerstrt!\n", + /* 85*/ "Verbindung abgebrochen - Experimente sind noch aktiv.\n", + /* 86*/ "Experimentelles Objekt Nr. 1 aufgenommen.\n", + /* 87*/ "Experimentelles Objekt Nr. 2 aufgenommen.\n", + /* 88*/ "Experimentelles Objekt Nr. 3 aufgenommen.\n", + /* 89*/ "Finden Sie den CamSpy.\n", + /* 90*/ "Dr. Carolls\n", + /* 91*/ "CamSpy\n", + /* 92*/ "Ein CamSpy\n", + /* 93*/ "CamSpy aufgenommen.\n", + /* 94*/ "Dies ist der Hochsicherheitssektor - Dr. Caroll \nmuss ganz nahe sein.\n", + /* 95*/ "Etwas in diesem Areal verbraucht extrem viel Strom.\n", + /* 96*/ "Programmieren Sie den Wartungsroboter um! \nMit seiner Hilfe kommen Sie weiter.\n", + /* 97*/ "Mach, dass du raus kommst, Jo! Die Strahlung ist zu stark. \nSetz den CamSpy ein.\n", + /* 98*/ "Geheimes Waffenschott geffnet.\n", + /* 99*/ "Feind entdeckt - Waffenspeicher verriegelt.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, sind Sie da?\n", + /*102*/ "Ka... kann ich jetzt rauskommen?\n", + /*103*/ "Ja, Sie sind jetzt sicher.\n", + /*104*/ "Wa..was... Sie sind...\n", + /*105*/ "Sehr professionell, meine Liebe, aber wir \ndrfen keine Zeit verlieren! Wir mssen sofort hier raus!\n", + /*106*/ "Kommen Sie. Ich habe wichtige Informationen, und Sie \nmssen mich beschtzen!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_i.c b/src/files/lang/pal-beta/ear_str_i.c new file mode 100644 index 000000000..f2b9b968a --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington - \n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ci ti permetter di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Procurati strumento tecnologico sperimentale\n\nIl Dr. Caroll ci ha informato della presenza di altri tre importanti progetti in fase di completamento nei laboratori di fianco al suo. Dovrai raccogliere i prototipi dei tre progetti e portarli al Carrington Institute per l'analisi.\n\n|Obiettivo 5: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 1*/ "LABORATORIO SOTTERRANEO\n", + /* 2*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington - \n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ci ti permetter di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington - \n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizza il Dr. Caroll\n", + /* 10*/ "Interrompi gli esperimenti\n", + /* 11*/ "Inizia manutenzione sistemi di sicurezza\n", + /* 12*/ "Procurati le tecnologie sperimentali\n", + /* 13*/ "Isotopo olografico radioattivo\n", + /* 14*/ "Effetti sonori macchine\n", + /* 15*/ "Attivati robot di manutenzione\n", + /* 16*/ "Riprogrammati robot di manutenzione\n", + /* 17*/ "Aperte porte di sicurezza\n", + /* 18*/ "Attivato ciclo di manutenzione\n", + /* 19*/ "Attivato ciclo di pulizia di routine\n", + /* 20*/ "Operazione impossibile: robot impegnati\n", + /* 21*/ "Disattivati robot di manutenzione\n", + /* 22*/ "Distrutto strumento essenziale alla missione\n", + /* 23*/ "Sistema robot di manutenzione non in linea\n", + /* 24*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 25*/ "Chi sei?\n", + /* 26*/ "Vittime inaccettabili: uccisi scienziati\n", + /* 27*/ "Terminale non attivo\n", + /* 28*/ "Spegnimento sistemi attivi...\n", + /* 29*/ "Interrotto esperimento\n", + /* 30*/ "Allarme attivato\n", + /* 31*/ "Allarme disattivato\n", + /* 32*/ "Non sparare! Ti aiuter!\n", + /* 33*/ "Cosa diavolo ci fai nel mio laboratorio?\n", + /* 34*/ "Ti dar una mano.\n", + /* 35*/ "Eh s! Succede...\n", + /* 36*/ "ACCESSO NEGATO: inserire codice di sicurezza\n", + /* 37*/ "Ricerca password in corso...\n", + /* 38*/ ".", + /* 39*/ "Trovata password: blocco eliminato\n", + /* 40*/ "Contatto interrotto: ristabilire connessione\n", + /* 41*/ "Porta di sicurezza gi aperta\n", + /* 42*/ "Esperimento gi interrotto\n", + /* 43*/ "Strano: l'esperimento gi chiuso!\n", + /* 44*/ "Qualcuno deve aver manomesso il mio PC!\n", + /* 45*/ "Procurati Vista Notturna\n", + /* 46*/ "Cassandra De Vries:\n", + /* 47*/ "Vista Notturna\n", + /* 48*/ "Cartella di De Vries\n", + /* 49*/ "Presa Vista Notturna\n", + /* 50*/ "Procurati strum. tecn. scudo\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Strum. tecn. scudo\n", + /* 53*/ "Cartella di De Vries\n", + /* 54*/ "Preso strum. tecn. scudo\n", + /* 55*/ "Procurati Connettore Dati.\n", + /* 56*/ "\n", + /* 57*/ "C. Dati\n", + /* 58*/ "Connettore Dati\n", + /* 59*/ "Preso Connettore Dati.\n", + /* 60*/ "Stabilita connessione\n", + /* 61*/ "Sportello di manutenzione aperto\n", + /* 62*/ "Sportello di manutenzione gi aperto\n", + /* 63*/ "ATTENZIONE! Materiale radioattivo!\n", + /* 64*/ "Cosa ci fai nel mio laboratorio?\n", + /* 65*/ "Non ti ho mai visto prima...\n", + /* 66*/ "Chi diavolo sei?\n", + /* 67*/ "Interrompi l'esperimento.\n", + /* 68*/ "Stacca la spina! SUBITO!\n", + /* 69*/ "Spegni quest'affare!\n", + /* 70*/ "Va bene! Lo chiudo!\n", + /* 71*/ "Non farmi del male!\n", + /* 72*/ "Lascia che t'aiuti.\n", + /* 73*/ "I miei esperimenti!\n", + /* 74*/ "Ecco, l'esperimento interrotto.\n", + /* 75*/ "Ora vattene! SUBITO!\n", + /* 76*/ "Sicurezza!\n", + /* 77*/ "Chiamer la sicurezza!\n", + /* 78*/ "Eh s! Succede...\n", + /* 79*/ "Com' potuto succedere?\n", + /* 80*/ "Sembra che sia gi spento!\n", + /* 81*/ "Ci hai messo le mani tu?\n", + /* 82*/ "Qualcuno ha manomesso la strumentazione!\n", + /* 83*/ "Cos' successo al terminale?\n", + /* 84*/ "L'hai rotto, maledizione!\n", + /* 85*/ "Connessione interrotta: esperimento ancora attivo\n", + /* 86*/ "Trovato strumento sperimentale 1\n", + /* 87*/ "Trovato strumento sperimentale 2\n", + /* 88*/ "Trovato strumento sperimentale 3\n", + /* 89*/ "Procurati TeleSpia.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "TeleSpia\n", + /* 93*/ "Presa la TeleSpia.\n", + /* 94*/ "Questo il principale settore di sicurezza: \nil Dr. Caroll non pu essere lontano.\n", + /* 95*/ "C' qualcosa che consuma un sacco qua!\n", + /* 96*/ "Riprogramma quella scatola di latta: \nti dar una mano ad entrare.\n", + /* 97*/ "Attenzione! I piani sono troppo alti.\n Usa la TeleSpia!\n", + /* 98*/ "Aperto compartimento armi segrete\n", + /* 99*/ "Intercettato nemico: bloccato compartimento armi.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, qui dentro?\n", + /*102*/ "Si pu uscire? Via libera?\n", + /*103*/ "S, nessun problema!\n", + /*104*/ "Che... cosa... lei ...\n", + /*105*/ "Molto professionale, mia cara, ma non c' \ntempo da perdere! Dobbiamo uscire subito di qui!\n", + /*106*/ "Andiamo! Sono a conoscenza di informazioni \ndi vitale importanza e tu devi proteggermi!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_s.c b/src/files/lang/pal-beta/ear_str_s.c new file mode 100644 index 000000000..f880f2042 --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del 疵ea de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitir llegar m疽 lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios est疣 causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los cdigos de seguridad. Obliga a los cientficos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los cientficos.\n\n|Objetivo Cuatro: - Obtener Objetos de Tecnologa Experimental\n\nEl Dr. Caroll nos inform de que hay otros tres grandes proyectos a punto de ser terminados en los laboratorios adem疽 del suyo. Debes recoger los prototipos de los tres proyectos y traerlos al Instituto Carrington para su evaluacin.\n\n|Objetivo Cinco: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 1*/ "LABORATORIO DEL SOTANO\n", + /* 2*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del 疵ea de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitir llegar m疽 lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios est疣 causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los cdigos de seguridad. Obliga a los cientficos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los cientficos.\n\n|Objetivo Cuatro: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizar al Dr. Caroll\n", + /* 10*/ "Detener los experimentos\n", + /* 11*/ "Iniciar ciclo de mant. de seguridad\n", + /* 12*/ "Obtener experimentos tecnolgicos\n", + /* 13*/ "Holografiar istopos radioactivos\n", + /* 14*/ "Efectos de sonido Fx de maquinaria.\n", + /* 15*/ "Robots de mantenimiento activados.\n", + /* 16*/ "Robots de mantenimiento reprogramados.\n", + /* 17*/ "Puertas de seguridad desbloqueadas.\n", + /* 18*/ "Ciclo de mantenimiento activado.\n", + /* 19*/ "Rutina del ciclo de limpieza activada.\n", + /* 20*/ "Operacin no permitida: robots ocupados.\n", + /* 21*/ "Robots de mantenimiento desactivados.\n", + /* 22*/ "Objeto crtico de la misin destruido.\n", + /* 23*/ "Sistema de mantenimiento de robots apagado.\n", + /* 24*/ "MISIモN FALLADA:\n no se pueden completar los objetivos.\n", + /* 25*/ "ソQui駭 eres t?\n", + /* 26*/ "Bajas de cientficos inaceptables.\n", + /* 27*/ "El terminal no est activo.\n", + /* 28*/ "Quitando energa a los sistemas activos.\n", + /* 29*/ "El experimento ha sido detenido.\n", + /* 30*/ "Alarma activada.\n", + /* 31*/ "Alarma desactivada.\n", + /* 32*/ "No me dispares: te ayudar.\n", + /* 33*/ "ソQu demonios est疽 haciendo en mi laboratorio?\n", + /* 34*/ "D駛ame ayudarte.\n", + /* 35*/ "Pueden ocurrir accidentes.\n", + /* 36*/ "ACCESO DENEGADO - cdigo de seguridad requerido.\n", + /* 37*/ "Buscando el cdigo.\n", + /* 38*/ ".", + /* 39*/ "Cdigo localizado - abriendo cerradura.\n", + /* 40*/ "Contacto perdido - reestableciendo contacto.\n", + /* 41*/ "La puerta de seguridad ya ha sido abierta.\n", + /* 42*/ "El experimento ya ha sido apagado.\n", + /* 43*/ "。Qu extrao: el experimento ya est detenido!\n", + /* 44*/ "Parece que alguien ha roto mi PC.\n", + /* 45*/ "Obt駭 Visin Nocturna.\n", + /* 46*/ "Cassandra De Vries :\n", + /* 47*/ "Visin Nocturna\n", + /* 48*/ "Maletn de De Vries\n", + /* 49*/ "Visin Nocturna obtenida.\n", + /* 50*/ "Obt駭 el escudo tecnolgico.\n", + /* 51*/ "Cassandra de Vries:\n", + /* 52*/ "Escudo tecnolgico\n", + /* 53*/ "Maletn de De Vries\n", + /* 54*/ "Escudo tecnolgico obtenido.\n", + /* 55*/ "Obt駭 Conector de Datos.\n", + /* 56*/ "\n", + /* 57*/ "Conector de Datos\n", + /* 58*/ "Un Conector de Datos\n", + /* 59*/ "Conector de Datos obtenido.\n", + /* 60*/ "Conexin establecida.\n", + /* 61*/ "La rejilla de mantenimiento est abierta.\n", + /* 62*/ "La rejilla de mantenimiento ya est abierta.\n", + /* 63*/ "PELIGRO - material radioactivo detectado.\n", + /* 64*/ "ソQu est疽 haciendo en mi laboratorio?\n", + /* 65*/ "No te he visto antes...\n", + /* 66*/ "ソQui駭 demonios eres?\n", + /* 67*/ "Det駭 el experimento.\n", + /* 68*/ "Tira del enchufe, AHORA.\n", + /* 69*/ "Apaga esa cosa.\n", + /* 70*/ "Lo apagar.\n", + /* 71*/ "Por favor, no me haga dao.\n", + /* 72*/ "D駛eme ayudarle.\n", + /* 73*/ "。Mi experimento!\n", + /* 74*/ "Ya, el experimento est detenido.\n", + /* 75*/ "。Deja este 疵ea AHORA!\n", + /* 76*/ "。Seguridad!\n", + /* 77*/ "Estoy avisando a seguridad.\n", + /* 78*/ "Pueden ocurrir accidentes.\n", + /* 79*/ "ソCmo pudo ocurrir?\n", + /* 80*/ "Parece que ya est apagado.\n", + /* 81*/ "ソHas estado tocando esto?\n", + /* 82*/ "Alguien ha roto mi equipo.\n", + /* 83*/ "ソQu le ha pasado al terminal?\n", + /* 84*/ "Cafre. Lo has roto.\n", + /* 85*/ "Conexin perdida: experimentos todava activos.\n", + /* 86*/ "Objeto experimental 1 obtenido.\n", + /* 87*/ "Objeto experimental 2 obtenido.\n", + /* 88*/ "Objeto experimental 3 obtenido.\n", + /* 89*/ "Obt駭 la C疥ara Espa.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "C疥ara Espa\n", + /* 92*/ "Una C疥ara Espa\n", + /* 93*/ "C疥ara Espa obtenida.\n", + /* 94*/ "ノste es el sector de mayor seguridad: el Dr. Caroll \ndebe estar cerca.\n", + /* 95*/ "Algo est usando mucha energa por aqu.\n", + /* 96*/ "Reprograma ese robot de limpieza: \nte permitir entrar.\n", + /* 97*/ "。Sal, Joanna! Los niveles son demasiado altos. \nUsa la C疥ara Espa.\n", + /* 98*/ "Compartimento de armas secreto abierto.\n", + /* 99*/ "Enemigo detectado: arsenal de armas cerrado.\n", + /*100*/ "ソDr. Caroll?\n", + /*101*/ "Dr. Caroll, ソest usted aqu?\n", + /*102*/ "Pero, ソes seguro salir?\n", + /*103*/ "S, todo despejado.\n", + /*104*/ "ソQu... qu... eres...?\n", + /*105*/ "。Muy profesional, querida, pero no hay tiempo \nque perder! 。Debemos irnos inmediatamente!\n", + /*106*/ "Vamos. Tengo informacin vital, y t \ndebes protegerme.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eldE.c b/src/files/lang/pal-beta/eldE.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-beta/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eldJ.c b/src/files/lang/pal-beta/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/pal-beta/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eldP.c b/src/files/lang/pal-beta/eldP.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-beta/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_f.c b/src/files/lang/pal-beta/eld_str_f.c new file mode 100644 index 000000000..f4e644cf7 --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Eliminer les snipers du toit\n\nApr鑚 avoir re輹 la demande de ran輟n, nous avons effectu un vol de reconnaissance au-dessus de la villa. Nos prises de vues r騅鑞ent la pr駸ence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les 駘iminer.\n\n|Objectif 2: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Trouver et neutraliser les pirates\n\nA de nombreuses reprises, les hackers de la dataDyne ont tent de pirater les fichiers de l'Institut. Leur t稍he sera plus facile s'ils interviennent directement dans la villa. S'ils lancent une telle op駻ation, vous devrez agir promptement. Assurez-vous aussi que les terminaux contenant des donn馥s vitales pour l'Institut ne sont pas endommag駸.\n\n|Objectif 4: - Capturer un garde ennemi\n\nCapturer un membre de l'駲uipe d'assaut de la dataDyne nous donnerait une id馥 de leurs plans. Surtout ne le tuez pas: assommez-le si vous le pouvez, ainsi il ne pourra pas s'馗happer.\n\n|Objectif 5: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la n馮ociatrice\n\nUn membre de l'Institut s'est port volontaire pour cr馥r une diversion pendant votre entr馥 sur les lieux. Elle sera tr鑚 certainement execut馥 par les soldats de la dataDyne si vous ne la tirez pas de l tr鑚 rapidement. D駱lacez-vous en rampant.\n\n|Objectif 2: - Eliminer les snipers du toit\n\nApr鑚 avoir re輹 la demande de ran輟n, nous avons effectu un vol de reconnaissance au-dessus de la villa. Nos prises de vues r騅鑞ent la pr駸ence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les 駘iminer.\n\n|Objectif 3: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 4: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la n馮ociatrice\n\nUn membre de l'Institut s'est port volontaire pour cr馥r une diversion pendant votre entr馥 sur les lieux. Elle sera tr鑚 certainement execut馥 par les soldats de la dataDyne si vous ne la tirez pas de l tr鑚 rapidement. D駱lacez-vous en rampant.\n\n|Objectif 2: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Sauver la n馮ociatrice\n", + /* 6*/ "Eliminer les snipers du toit\n", + /* 7*/ "Activer l'駮lienne\n", + /* 8*/ "Trouver et neutraliser les pirates\n", + /* 9*/ "Sauver Carrington\n", + /* 10*/ "Capturer un garde ennemi\n", + /* 11*/ "N馮ociatrice abattue.\n", + /* 12*/ "Snipers 駘imin駸.\n", + /* 13*/ "N馮ociatrice en s馗urit.\n", + /* 14*/ "Refroidisseurs activ駸.\n", + /* 15*/ "Refroidisseurs d駸activ駸.\n", + /* 16*/ "G駭駻ateurs activ駸.\n", + /* 17*/ "G駭駻ateurs d駸activ駸.\n", + /* 18*/ "Eolienne r饌ctiv馥.\n", + /* 19*/ "Eolienne d駸activ馥.\n", + /* 20*/ "Courant r騁abli dans la villa.\n", + /* 21*/ "Objet crucial d騁ruit.\n", + /* 22*/ "Joanna! C'est Grimshaw. Il y a des hackers dans \n la villa! Arr黎ez-les avant\n qu'ils ne piratent nos fichiers!\n", + /* 23*/ "Les hackers ont copi les fichiers vitaux.\n", + /* 24*/ "Hackers 駘imin駸.\n", + /* 25*/ "Carrington sauv.\n", + /* 26*/ "Objectifs incomplets - mission 馗hou馥.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Fusil sniper\n", + /* 29*/ "Garde ennemi enlev.\n", + /* 30*/ "Obtenir cl de porte.\n", + /* 31*/ "Garde: \n", + /* 32*/ "Cl de porte\n", + /* 33*/ "Cl de porte\n", + /* 34*/ "Cl de porte obtenue.\n", + /* 35*/ "Si je r饌ctive l'駮lienne, je pourrai\nr騁ablir le courant dans le sous-sol.\n", + /* 36*/ "Je dois faire vite ou ils tueront la\nn馮ociatrice!\n", + /* 37*/ "Ils doivent garder Daniel ici.\n", + /* 38*/ "Je dois arr黎er les hackers avant de\nsauver Daniel.\n", + /* 39*/ "Journal de mission de l'agent Dark, 18:46.\nNous avons re輹 un appel de Cassandra de Vries hier soir. \nUne 駲uipe de la dataDyne retient Daniel Carrington \nen otage dans sa villa priv馥 sur la cte, \net 駱argnera sa vie en 馗hange de l'IA.\n", + /* 40*/ "Malheureusement, nous ne l'avons pas. Daniel et \nle Dr. Caroll 騁aient tous deux dans la villa \npour un 'arrangement.' Il semblerait que \nDaniel ait pu dissimuler le Dr. Caroll dans la \nvilla lors de l'arriv馥 des troupes de la \ndataDyne.\n", + /* 41*/ "Par chance notre ruse 'de la n馮ociatrice' \nme donnera l'occasion de surprendre les \nsoldats de la dataDyne. Cette fois il ne \ns'agit pas que de ma propre vie.\n", + /* 42*/ "Monsieur? Etes-vous bless?\n", + /* 43*/ "Non, Joanna. Je vais bien. Mais ces \nordures de la dataDyne m'ont fait dire \no se trouvait le Dr. Caroll. Si seulement \nj'avais pu tenir une minute de plus...\n", + /* 44*/ "Ce n'est pas de votre faute. J'aurais d \nfaire plus vite.\n", + /* 45*/ "Le Dr. Caroll m'a confi qu'il s'attendait \n une telle action. De plus, les hommes \nde la dataDyne, fiers de leur succ鑚, \nont discut alors que je faisais semblant \nd'黎re inconscient. Ils ont mentionn une \nrencontre dans l'immeuble G5 de Chicago, \nen Illinois, ce soir. Vous devez vous y \nrendre, bien qu'il ne vous reste que \npeu de temps pour vous pr駱arer.\n", + /* 46*/ "Aucun probl鑪e, monsieur. Le Dr. Caroll \na-t-il pu vous r騅駘er des informations \nimportantes?\n", + /* 47*/ "En effet, tr鑚 importantes. \nJe vous brieferai sur la route de \nChicago. Nous pourrons peut-黎re encore \nl'aider, m麥e si ces sadiques lui enl钁ent \nsa personnalit. Il veulent en garder \nune sauvegarde l'abri. Il est \nenfin temps que j'appelle certains amis \npour s'occuper de la dataDyne.\n", + /* 48*/ "Op駻ation refus馥 - 駮lienne active.\n", + /* 49*/ "Mission 馗hou馥 - garde ennemi non captur.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_g.c b/src/files/lang/pal-beta/eld_str_g.c new file mode 100644 index 000000000..e28d149ac --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Eliminieren Sie die Scharfschtzen auf dem Dach!\n\nGleich nachdem wir die Forderungen bermittelt bekommen haben, wurde von uns ein Aufkl舐ungsflug ber der Villa durchgefhrt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschtzen auf den D臘hern positioniert wurden. Es ist von hchster Notwendigkeit, diese Schtzen zu eliminieren.\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Windkraft-Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Finden und stoppen Sie die dataDyne-Hacker!\n\nIn der Vergangenheit hat es sporadische Versuche von dataDyne-Hackern gegeben, Zugriff auf die Daten des Instituts zu erhalten. Es wrde ihre Arbeit stark vereinfachen, wenn sie in der Villa auf die Direktverbindung zum Institut zugreifen knnten. Sollte dies der Fall sein, mssen Sie rasch reagieren. Achten Sie allerdings darauf, dass die Terminals nicht besch臈igt werden drfen, da sonst das Institut Daten der Priorit舩sstufe 1 verliert.\n\n|4. Ziel: - Nehmen Sie eine Wache gefangen!\n\nDie Gefangennahme eines Mitglieds der dataDyne-Truppe verschafft uns Einblick in ihre tats臘hlichen Vorhaben. Sie drfen diese Wachen nicht eliminieren, sondern nur bewusstlos schlagen. Dadurch verhindern Sie auch eine Flucht.\n\n|5. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werdensie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Retten Sie die Unterh舅dlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Eliminieren Sie die Scharfschtzen auf dem Dach!\n\nGleich nachdem wir die Forderungen bermittelt bekommen haben, wurde von uns ein Aufkl舐ungsflug ber der Villa durchgefhrt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschtzen auf den D臘hern positioniert wurden. Es ist von hchster Notwendigkeit, diese Schtzen zu eliminieren.\n\n|3. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Windkraft-Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|4. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werdensie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Retten Sie die Unterh舅dlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Windkraft-Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werdensie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retten Sie die Unterh舅dlerin!\n", + /* 6*/ "Eliminieren Sie die Scharfschtzen!\n", + /* 7*/ "Aktivieren Sie den Windkraft-Generator!\n", + /* 8*/ "Finden und stoppen sie die Hacker!\n", + /* 9*/ "Retten Sie Carrington!\n", + /* 10*/ "Nehmen Sie eine feindliche Wache gefangen!\n", + /* 11*/ "Die Unterh舅dlerin wurde verloren.\n", + /* 12*/ "Die Scharfschtzen wurden eliminiert.\n", + /* 13*/ "Die Unterh舅dlerin konnte sich in Sicherheit bringen.\n", + /* 14*/ "Khlsysteme wurden aktiviert.\n", + /* 15*/ "Khlsysteme wurden deaktiviert.\n", + /* 16*/ "Stromversorgung wurde aktiviert.\n", + /* 17*/ "Stromversorgung wurde deaktiviert.\n", + /* 18*/ "Windmhle wurde aktiviert.\n", + /* 19*/ "Windmhle wurde deaktiviert.\n", + /* 20*/ "Die Stromversorgung der Villa wurde wiederhergestellt.\n", + /* 21*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 22*/ "Joanna! Hier spricht Grimshaw. In der Villa befinden \n sich Hacker! Sie mssen Sie aufhalten, \n bevor sie an unsere Daten gelangen!\n", + /* 23*/ "Die Hacker haben geheime Daten kopiert.\n", + /* 24*/ "Die Hacker wurden eliminiert.\n", + /* 25*/ "Carrington wurde gerettet.\n", + /* 26*/ "Es wurden nicht alle Ziele erreicht - die Mission ist fehlgeschlagen.\n", + /* 27*/ "Laptop-Gewehr\n", + /* 28*/ "Sniper-Gewehr\n", + /* 29*/ "Feindliche Wache wurde kampfunf臧ig gemacht.\n", + /* 30*/ "Finden Sie den Schlssel!\n", + /* 31*/ "Schlssel\n", + /* 32*/ "der Wache\n", + /* 33*/ "Schlssel\n", + /* 34*/ "Schlssel aufgenommen.\n", + /* 35*/ "Wenn ich den Windkraft-Generator aktiviere, \nsteht auch die Stromversorgung im Keller wieder.\n", + /* 36*/ "Ich muss schnell sein, oder der Unterh舅dler \nist verloren!\n", + /* 37*/ "Hier mssen sie Daniel gefangenhalten.\n", + /* 38*/ "Bevor ich Daniel rette, mssen diese Hacker \n gestoppt werden.\n", + /* 39*/ "Agent Dark Missions-Logbuch, 18.46 Uhr. Letzte \nNacht erhielten wir einen Anruf von Cassandra de Vries. \nEin dataDyne-Trupp hat Daniel Carrington \nin seiner Villa an der Kste als Geisel genommen. \nSie sagen, dass sie sein Leben im Austausch \nfr die KI schonen werden.\n", + /* 40*/ "Unglcklicherweise haben wir die KI nicht. Daniel und \nDr. Caroll waren in der Villa, um 'Themen von \nbeiderseitigem Interesse' zu besprechen. Es sieht \nso aus, als h舩te Daniel einen Weg gefunden, Dr. Caroll \nin der Villa zu verstecken, bevor die dataDyne-Truppen \neingetroffen sind.\n", + /* 41*/ "Ich hoffe, dass mir unser Unterh舅dler-Trick \nzu einer Chance verhilft, die dataDyne-Truppen zu \nberraschen. Diesmal geht es nicht nur um mein \nLeben...\n", + /* 42*/ "Sir? Sind Sie verletzt?\n", + /* 43*/ "Nein, Joanna, ich bin okay, aber diese dataDyne- \nSchl臠er haben aus mir herausgeprgelt, wo ich \nDr. Caroll versteckt habe. Wenn ich nur noch ein \npaar Minuten l舅ger durchgehalten h舩te...\n", + /* 44*/ "Es ist nicht Ihre Schuld, Sir. Ich h舩te schneller \nsein mssen.\n", + /* 45*/ "Machen Sie sich keine Vorwrfe! Dr. Caroll \nhat mir gesagt, dass er diesen Zug erwartet hat. \nAls sie ihn gefunden haben, sind die dataDyne-Leute \netwas unvorsichtig geworden. Sie dachten, ich w舐e \nbewusstlos und haben darber gesprochen, wohin sie \nihn bringen. Sie erw臧nten ein Meeting im \nG5-Building in Chicago, Illinois, noch heute Nacht.\nIch mchte, dass Sie dorthin gehen, aber das \nbedeutet, dass Sie nicht viel Zeit haben, um sich \nauf die Mission vorzubereiten.\n", + /* 46*/ "Das soll nicht das Problem sein, Sir. Konnte \nIhnen Dr. Caroll wenigstens einige ntzliche \nInformationen weitergeben?\n", + /* 47*/ "Oh ja, das konnte er. Ich werde Sie weiterinformieren, \nwenn Sie sich auf dem Weg nach Chicago befinden. \nWir sind noch immer in der Lage, ihm zu helfen, \nselbst wenn diese Schl臘hter seine Persnlichkeit \nver舅dern. Er glaubt, dass sie eine Sicherungskopie \nseiner Daten haben. Es ist wohl an der Zeit, dass ich \nmich mit ein paar Freunden unterhalte, die mit dataDyne \nabrechnen werden.\n", + /* 48*/ "Unzul舖sige Operation - Windmhle ist aktiv.\n", + /* 49*/ "Mission nicht erfolgreich - Feindliche Wache wurde nicht gefangen.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_i.c b/src/files/lang/pal-beta/eld_str_i.c new file mode 100644 index 000000000..3fb73b92f --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa almomento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington - \n\nIrreperibile.\n\n|Obiettivo 1: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Localizza e blocca gli hacker dataDyne\n\nIn passato gli hacker dataDyne hanno effettuato sporadici tentativi di accedere ai file dell'istituto. Ora avrebbero la vita molto pi facile provando dall'interno della villa, grazie al nostro collegamento diretto con l'istituto. Se agiscono in tal senso dovrai rispondere repentinamente! Evita qualsiasi danno ai terminali poich contengono dati di fondamentale importanza per l'istituto.\n\n|Obiettivo 4: - Cattura la guardia dataDyne\n\nSe riuscissimo a catturare un componente della squadra d'assalto dataDyne, saremmo in grado di farci finalmente un'idea in merito ai loro obiettivi. Ricorda di non ucciderli: colpiscili facendo perdere loro i sensi, in modo da impedirne la fuga.\n\n|Obiettivo 5: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 1*/ "VILLA DI CARRINGTON \n", + /* 2*/ "|Situazione - \n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa almomento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington - \n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sar sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 3: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 4: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa almomento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington - \n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sar sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Salva la mediatrice\n", + /* 6*/ "Elimina i cecchini sul tetto\n", + /* 7*/ "Attiva il generatore eolico\n", + /* 8*/ "Localizza e blocca gli hacker dataDyne\n", + /* 9*/ "Salva Carrington\n", + /* 10*/ "Cattura la guardia dataDyne\n", + /* 11*/ "La mediatrice stata uccisa.\n", + /* 12*/ "I cecchini sono stati eliminati.\n", + /* 13*/ "La mediatrice si messa in salvo.\n", + /* 14*/ "Attivato l'impianto di raffreddamento\n", + /* 15*/ "Disattivato l'impianto di raffreddamento\n", + /* 16*/ "Attivati gli accumulatori energetici\n", + /* 17*/ "Disattivati gli accumulatori energetici\n", + /* 18*/ "Riattivato il generatore eolico\n", + /* 19*/ "Disattivato il generatore eolico\n", + /* 20*/ "Ristabilita l'elettricit nella villa\n", + /* 21*/ "Distrutto strumento essenziale alla missione.\n", + /* 22*/ "Joanna! Sono Grimshaw. Ci sono degli hacker \nnella villa! Devi fermarli prima che \n mettano le mani sui file.\n", + /* 23*/ "Gli hacker hanno scaricato dati essenziali.\n", + /* 24*/ "Gli hacker sono stati eliminati.\n", + /* 25*/ "Carrington stato salvato.\n", + /* 26*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 27*/ "Pistola Laptop\n", + /* 28*/ "Fucile cecchino\n", + /* 29*/ "Sconfitta la guardia nemica\n", + /* 30*/ "Procurati chiave porta\n", + /* 31*/ "Guardia:\n", + /* 32*/ "Chiave porta\n", + /* 33*/ "Chiave porta\n", + /* 34*/ "Presa chiave porta\n", + /* 35*/ "Riattivando il generatore eolico, \npotr portare l'elettricit \nnel sotterraneo inferiore.\n", + /* 36*/ "Devo fare alla svelta o \nuccideranno la mediatrice!\n", + /* 37*/ "Daniel dev'essere imprigionato qui!\n", + /* 38*/ "Devo fermare gli hacker prima \ndi salvare Daniel!\n", + /* 39*/ "Missione dell'Agente Dark, ore 18.46. La notte\nscorsa abbiamo ricevuto una chiamata di Cassandra \nde Vries. Una squadra dataDyne ha preso in ostaggio \nDaniel Carrington nella sua villa sulla costa. \nDicono che lo risparmieranno in cambio \ndell'automa.\n", + /* 40*/ "Sfortunatamente, non ce l'abbiamo noi. \nDaniel e il Dr. Caroll erano alla villa \nper discutere 'questioni di interesse \nreciproco'. Sembra che Daniel abbia trovato \nil modo di nascondere il Dr. Caroll prima \nche arrivasse la squadra dataDyne.\n", + /* 41*/ "Speriamo che il nostro piano della falsa \nmediatrice mi permetta di sorprendere la \nsquadra dataDyne. Stavolta non c' solo \nla mia vita in gioco!\n", + /* 42*/ "ネ ferito, Signore?\n", + /* 43*/ "No, Joanna, tutto bene, ma quelle bestie \ndella dataDyne mi hanno costretto a dir loro \ndove ho nascosto il Dr. Caroll. Se solo \navessi resistito qualche minuto in pi...\n", + /* 44*/ "Non colpa sua, Signore! Avrei \ndovuto fare pi in fretta io!\n", + /* 45*/ "Non essere troppo dura con te stessa, Jo. \nIl Dr. Caroll si aspettava una cosa del \ngenere. Anzi, dopo averlo catturato la \nsquadra dataDyne ha guadagnato sicurezza \ne, credendomi svenuto, si lasciata \nsfuggire un paio di cosette interessanti. \nHanno parlato di una riunione prevista per\nquesta notte nell'Edificio G5 a Chicago, \nIllinois! Voglio che tu sia l, ma certo\nnon ti resta molto tempo per prepararti! \n", + /* 46*/ "Non c' problema, Signore! Allora, \nil Dr. Caroll le ha dato informazioni \nutili?\n", + /* 47*/ "Oh, certo, eccome! Ti racconter ogni \nparticolare durante il tuo viaggio verso \nChicago. Possiamo ancora salvarlo, anche \nse quei macellai riescono a manipolargli \nil cervello. Ritiene che ne conservino una \ncopia in un posto sicuro. ネ proprio ora \ndi contattare alcuni amici perch si \noccupino della dataDyne!\n", + /* 48*/ "OPERAZIONE IMPOSSIBILE - Generatore attivo\n", + /* 49*/ "MISSIONE FALLITA - Guardia nemica non catturata\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_s.c b/src/files/lang/pal-beta/eld_str_s.c new file mode 100644 index 000000000..9df01647b --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deber疽 eliminarlos.\n\n|Objetivo Dos: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Tres: - Localizar y Detener a los 'Hackers' de dataDyne\n\nEn el pasado ha habido intentos espor疆icos de los 'hackers' de dataDyne de acceder a los ficheros del Instituto. Su trabajo ser mucho m疽 f當il si lo intentan desde la villa, debido a la conexin directa con el Instituto. Si se hace ese intento, necesitar疽 responder r疳idamente. Asegrate de que los terminales no son daados, ya que contienen datos vitales para el Instituto.\n\n|Objetivo Cuatro: - Capturar a Guarda Enemigo\n\nCapturar a un miembro del equipo de asalto de dataDyne nos dar una idea de sus intenciones reales. Recuerda no matarles: d駛alos inconscientes si puedes, ya que esto nos asegurar que no escapen.\n\n|Objetivo Cinco: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distraccin para ayudarte a entrar. Es casi seguro que esa persona ser abatida por los soldados de dataDyne a menos que acabes con ellos r疳idamente. Tienes que ser muy r疳ida.\n\n|Objetivo Dos: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deber疽 eliminarlos.\n\n|Objetivo Tres: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Cuatro: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distraccin para ayudarte a entrar. Es casi seguro que esa persona ser abatida por los soldados de dataDyne a menos que acabes con ellos r疳idamente. Tienes que ser muy r疳ida.\n\n|Objetivo Dos: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Tres: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Salvar al negociador\n", + /* 6*/ "Eliminar francotiradores del tejado\n", + /* 7*/ "Activar generador elico\n", + /* 8*/ "Localizar y eliminar 'hackers'\n", + /* 9*/ "Rescatar a Carrington\n", + /* 10*/ "Capturar guarda de dataDyne \n", + /* 11*/ "El negociador ha muerto.\n", + /* 12*/ "Los francotiradores han sido eliminados.\n", + /* 13*/ "El negociador ha escapado a lugar seguro.\n", + /* 14*/ "Los sistemas de refrigeracin han sido activados.\n", + /* 15*/ "Los sistemas de refrigeracin han sido desactivados.\n", + /* 16*/ "Los sistemas de energa han sido activados.\n", + /* 17*/ "Los sistemas de energa han sido desactivados.\n", + /* 18*/ "La torre elica ha sido activada.\n", + /* 19*/ "La torre elica ha sido desactivada.\n", + /* 20*/ "La electricidad ha sido restablecida en la Villa.\n", + /* 21*/ "Objeto crtico de la misin destruido.\n", + /* 22*/ "。Joanna! Grimshaw al habla. 。Tenemos 'hackers' en \nla villa! Debes detenerles antes de que accedan\n a nuestros ficheros.\n", + /* 23*/ "Los 'hackers' han descargado datos vitales.\n", + /* 24*/ "Los 'hackers' han sido eliminados.\n", + /* 25*/ "Carrington ha sido rescatado.\n", + /* 26*/ "Objetivos no completados: misin fallada.\n", + /* 27*/ "Arma PC\n", + /* 28*/ "Rifle de Francotirador\n", + /* 29*/ "Guarda enemigo ha sido dominado.\n", + /* 30*/ "Obt駭 la llave de la puerta.\n", + /* 31*/ "Guarda:\n", + /* 32*/ "Llave de la Puerta\n", + /* 33*/ "Llave de la Puerta\n", + /* 34*/ "Llave de la Puerta obtenida.\n", + /* 35*/ "Si conecto de nuevo el generador elico, \ntendremos energa en el stano inferior.\n", + /* 36*/ "。Tengo que ser r疳ida, o matar疣 \nal negociador!\n", + /* 37*/ "Aqu es donde deben tener retenido a Daniel.\n", + /* 38*/ "Esos 'hackers' deben ser detenidos antes \n de que rescate a Daniel.\n", + /* 39*/ "Informe de la Misin de la Agente Dark, 1846 horas. \nAnoche tuvimos una llamada de Cassandra De Vries. \nUn equipo de dataDyne tiene a Daniel Carrington \nretenido en su villa privada en la costa, \ny dicen que respetar疣 su vida a cambio \nde la IA.\n", + /* 40*/ "Desafortunadamente, no la tenemos. Daniel y el \nDr. Caroll estaban en la villa para discutir \n'materias de mutuo inter駸'. Parece que Daniel \nencontr un modo de esconder al Dr. Caroll en \nla villa cuando el escuadrn de dataDyne \nirrumpi all.\n", + /* 41*/ "Con un poco de suerte nuestro ardid del falso \nnegociador me dar una oportunidad de sorprender \nal escuadrn de dataDyne. Esta vez no slo mi \nvida est en juego.\n", + /* 42*/ "Seor, ソest herido?\n", + /* 43*/ "No, Joanna, estoy bien, pero esos matones \nde dataDyne me han hecho contarles donde \nesconda al Dr. Caroll. Si hubiera aguantado \nunos minutos m疽...\n", + /* 44*/ "No fue su culpa, seor. Deb ser \nm疽 r疳ida.\n", + /* 45*/ "No te culpes, Joanna. El Dr. Caroll \nme dijo que esperaba que esto ocurriera. \nEn realidad, cuando fue recapturado, el \nequipo de dataDyne, en un exceso de confianza, \ndej caer algunas cosas, ya que pensaban que \nestaba inconsciente. Mencionaron una reunin \nen el Edificio G5 en Chicago, Illinois, esta \nnoche. Quiero que est駸 all, pero esto no \nte deja mucho tiempo para prepararte.\n", + /* 46*/ "Eso no ser un problema, seor. As que, \nソel Dr. Caroll le dio alguna informacin \ntil para usted?\n", + /* 47*/ "Oh, claro que s. Ciertamente lo hizo, y \nte har un breve resumen cuando est駸 de \ncamino a Chicago. Todava podemos ser capaces \nde ayudarle, incluso aunque esos carniceros \neliminen su personalidad. ノl cree que ellos \nguardar疣 una copia en un lugar seguro. Es \ncuestin de tiempo que llame a unos \namigos para que se encarguen de dataDyne.\n", + /* 48*/ "Operacin denegada - el molino est activo.\n", + /* 49*/ "Misin no conseguida - guarda enemigo no capturado.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gunE.c b/src/files/lang/pal-beta/gunE.c new file mode 100644 index 000000000..42beea849 --- /dev/null +++ b/src/files/lang/pal-beta/gunE.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gunJ.c b/src/files/lang/pal-beta/gunJ.c new file mode 100644 index 000000000..ad51bf13c --- /dev/null +++ b/src/files/lang/pal-beta/gunJ.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gunP.c b/src/files/lang/pal-beta/gunP.c new file mode 100644 index 000000000..42beea849 --- /dev/null +++ b/src/files/lang/pal-beta/gunP.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_f.c b/src/files/lang/pal-beta/gun_str_f.c new file mode 100644 index 000000000..2711dfe4f --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_f.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Frags", + /* 2*/ "Mort(e) 1 fois\n", + /* 3*/ "Mort(e)", + /* 4*/ "fois", + /* 5*/ "Suicides", + /* 6*/ "Mains nues\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Fusil pompe\n", + /* 26*/ "Reaper\n", + /* 27*/ "Lance-roquettes\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Grenade Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Fusil sniper\n", + /* 33*/ "Arbal鑼e\n", + /* 34*/ "Tranquillisant\n", + /* 35*/ "Couteau de combat\n", + /* 36*/ "Grenade\n", + /* 37*/ "Bombe-N\n", + /* 38*/ "Mine retardement\n", + /* 39*/ "Mine proximit饅n", + /* 40*/ "Mine t駘馗om.\n", + /* 41*/ "Mine CME\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Costume\n", + /* 44*/ "Roquette\n", + /* 45*/ "Roquette t黎e ch.\n", + /* 46*/ "Munit. grenade\n", + /* 47*/ "Laser\n", + /* 48*/ "Carreau\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Sp馗ial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Vision nocturne\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "D馗odeur porte\n", + /* 64*/ "Explosifs\n", + /* 65*/ "Scanner rayons X\n", + /* 66*/ "Medkit extraterr.\n", + /* 67*/ "Valise\n", + /* 68*/ "Costume\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Pisteur R\n", + /* 71*/ "Mallette\n", + /* 72*/ "Pilule suicide\n", + /* 73*/ "Occulteur\n", + /* 74*/ "Boost combat\n", + /* 75*/ "R馗epteur\n", + /* 76*/ "Scanner Horizon\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L-roquettes\n", + /* 81*/ "Mine prox.\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Couteau\n", + /* 84*/ "DY357\n", + /* 85*/ "Tir simple\n", + /* 86*/ "Tir rapide\n", + /* 87*/ "Tir explosif\n", + /* 88*/ "Etripage\n", + /* 89*/ "Tir simple\n", + /* 90*/ "Effet Rail-gun\n", + /* 91*/ "Roquette\n", + /* 92*/ "Roquette cibl馥\n", + /* 93*/ "Roquette filoguid馥\n", + /* 94*/ "Coup de crosse\n", + /* 95*/ "Balles explosives\n", + /* 96*/ "Tirs guid駸\n", + /* 97*/ "Vider chargeur\n", + /* 98*/ "Lance-grenades\n", + /* 99*/ "Attache-mur\n", + /*100*/ "Coup de poing\n", + /*101*/ "D駸armer\n", + /*102*/ "Verr. cible\n", + /*103*/ "Utiliser Scope\n", + /*104*/ "Vider moiti chargeur\n", + /*105*/ "Double tir\n", + /*106*/ "Hachoir\n", + /*107*/ "Endormir\n", + /*108*/ "Injection mortelle\n", + /*109*/ "Coup de couteau\n", + /*110*/ "Lancer couteau poison\n", + /*111*/ "Localisateur cible\n", + /*112*/ "Mort instantan馥\n", + /*113*/ "Boost\n", + /*114*/ "Retour\n", + /*115*/ "Perce-blindage\n", + /*116*/ "Occulter\n", + /*117*/ "D駱loyer comme sentinelle\n", + /*118*/ "Auto-destruction proximit饅n", + /*119*/ "D騁ecteur danger\n", + /*120*/ "Explosif retardement\n", + /*121*/ "Explosif proximit饅n", + /*122*/ "Explosif t駘馗ommand饅n", + /*123*/ "D騁onation\n", + /*124*/ "Fusible 4 secondes\n", + /*125*/ "Pinball proximit饅n", + /*126*/ "D騁onation retardement\n", + /*127*/ "D騁onation proximit饅n", + /*128*/ "Tir 3 balles\n", + /*129*/ "Tir charg饅n", + /*130*/ "S'accroupir\n", + /*131*/ "Infecter\n", + /*132*/ "Tir impulsion\n", + /*133*/ "Courant courte port馥\n", + /*134*/ "D騁onation impact\n", + /*135*/ "Amplificateur lumi鑽e\n", + /*136*/ "Cam駻a mobile\n", + /*137*/ "Vision rayons X\n", + /*138*/ "Image thermique\n", + /*139*/ "Zoom\n", + /*140*/ "App. brouillage\n", + /*141*/ "Connecter\n", + /*142*/ "Identifier cibles\n", + /*143*/ "Porter costume\n", + /*144*/ "Placer explosifs\n", + /*145*/ "Vue t駘escopique\n", + /*146*/ "Silencieux\n", + /*147*/ "Rallonge chargeur\n", + /*148*/ "Vue laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "M麥e sans arme, vous demeurez une menace pour vos ennemis. Vos poings peuvent assommer ou d駸armer un ennemi pour lui voler son arme.\n", + /*156*/ "Pr馗is et fiable, c'est l'arme de base des op駻ations de l'Institut. La vis馥 laser sert localiser les tirs. Utiliser aussi la crosse pour assommer les ennemis.\n", + /*157*/ "Un Falcon 2 am駘ior, b駭馭iciant d'un silencieux tr鑚 utile.\n", + /*158*/ "Un Falcon 2 am駘ior, b駭馭iciant d'un scope d'agrandissement x2 pour profiter d'une grande pr馗ision.\n", + /*159*/ "Un pistolet de l'arm馥 dernier cri utilis par les forces de l'ordre. Il poss鐡e un l馮er zoom et lance trois balles en mode de tir secondaire.\n", + /*160*/ "C'est l'arme de pr馘ilection de tout Skedar qui se respecte. Un grand chargeur et un canon ray font de ce pistolet une arme de poing formidable, surtout gr稍e son tir secondaire: charger le tir pour plus de puissance en utilisant plusieurs munitions.\n", + /*161*/ "Le dataDyne DY357 est la plus puissante des armes de poing. Ses balles poss鐡ent un facteur de p駭騁ration 駘ev et repoussent la cible de leur poids et leur puissance. Des mod鑞es customis駸 sont fabriqu駸 pour des clients importants. On raconte que Trent Easton, le directeur de la NSA en poss鐡e un plaqu or.\n", + /*162*/ "Le DY357-LX a 騁 con輹 la demande du directeur de la NSA, Trent Easton. En plus de poss馘er une crosse en peau de tigre, ce pistolet d'or poss鐡e un canon ray et utilise des balles haute v駘ocit. C'est une arme meurtri鑽e.\n", + /*163*/ "L'arme standard Maian. Elle peut au choix tirer des balles normales ou des balles explosives, sans modifier la consommation de munitions.\n", + /*164*/ "Un classique de la dataDyne tr鑚 r駱andu. Cette arme automatique tire des rafales de calibre 32 et poss鐡e une capacit sp馗iale: verrouiller une cible. Elle fait du profane un tireur d'駘ite. Cadence de tir moyenne: 900 cpm.\n", + /*165*/ "Le fusil d'assaut principal de l'Institut Carrington. Une port馥 et un grand chargeur font de cette arme un excellent choix. Le tir secondaire permet de se d駱lacer tout en ciblant un ennemi. Cadence de tir moyenne: 750 cpm.\n", + /*166*/ "Un fusil d'assaut standard avec un ct vicieux: lorsque le mode secondaire est activ, il devient une mine de proximit aux apparences d'un fusil. Cadence de tir moyenne: 700 cpm.\n", + /*167*/ "Une variante du fusil d'assaut Dragon: plutt qu'un explosif de proximit, il poss鐡e un mini lance-grenades. Une arme excellente. Cadence de tir moyenne: 700 cpm.\n", + /*168*/ "Une autre arme high-tech de la dataDyne. Un fusil d'assaut poss馘ant un chargeur plus petit et un impact puissant, qui peut d騁ecter les explosifs, les armes sentinelles et autres pi鑒es du m麥e ordre. Cadence de tir moyenne: 950 cpm.\n", + /*169*/ "Con輹 pour les gardes du corps, le Cyclone a 騁 choisi par le service de s馗urit du Pr駸ident gr稍e son efficacit en mati鑽e de r駱ression. En cas d'urgence, il peut doubler sa cadence de tir, vidant son chargeur en moins d'une seconde. Cadence de tir moyenne: 900 cpm. Se vide 2000 cpm.\n", + /*170*/ "L'arme secr鑼e de l'Institut Carrington. Elle tire une cadence ph駭om駭ale et contient 駭orm駑ent de munitions. Le mode secondaire est un occulteur qui consomme les munitions. Une arme d騅astatrice. Cadence de tir moyenne: 1100 cpm.\n", + /*171*/ "Un autre exemple du g駭ie maian. Il peut tirer des balles normales aussi vite qu'un autre pistolet-mitrailleur, ou tirer des projectiles rapides p駭騁rant facilement les obstacles vous s駱arant d'une cible. Seul d駸avantage du mode secondaire: la cadence de tir est plus lente et la pr馗ision est diminu馥 par la puissance du coup. Cadence de tir moyenne: 900 cpm (tir sec. 300 cpm).\n", + /*172*/ "Un PC portable qui peut tirer une fois transform en mitrailleuse. Il peut 黎re utilis comme PC mais un contrle minutieux r騅駘era la supercherie. Cadence de tir moyenne: 1000 cpm.\n", + /*173*/ "Une arme de la dataDyne fabriqu馥 par les services de s馗urit. Un chargeur de 9 balles est coupl un mode de tir simple ou double, faisant de cette arme un atout en combat rapproch.\n", + /*174*/ "Con輹 pour 黎re mani par un utilisateur plus fort qu'un humain. Sa cadence de tir ultra rapide en fait une v駻itable machine d馗hiqueter, tr鑚 efficace dans les couloirs. \nCadence de tir maximum: 1800 cpm.\n", + /*175*/ "Une arme encombrante. Elle tire soit une roquette normale soit un missile plus lent mais t黎e chercheuse, pouvant verrouiller un ennemi.\n", + /*176*/ "Un lance-grenades de longue port馥 fabriqu par la dataDyne. Le tir secondaire recouvre les grenades d'une substance collante. Une fois projet馥, la bombe se fixe sur un mur ou un plafond. Apr鑚 quelques secondes, elle se d騁ache et tombe au sol pour exploser.\n", + /*177*/ "Les Skedars aiment inspirer la terreur chez leurs ennemis. Il est donc naturel pour eux de disposer d'une roquette command馥 distance comme tir secondaire de leur lance-roquettes. Ils ont ainsi le plaisir de voir leur proie tenter de s'enfuir devant un projectile mortel.\n", + /*178*/ "Le fusil FarSight est un appareil maian combinant un scanner rayons X et un lance-projectiles traversant les 駘駑ents solides. Le traceur peut rep駻er et verrouiller une forme de vie mais ne peut compenser les d駱lacements rapides d'un ennemi en pleine course.\n", + /*179*/ "B駭馭iciant d'un puissant zoom et de balles haute v駘ocit, cette arme de l'Institut Carrington est l'un des meilleurs fusils de sniper. S'accroupir permet une meilleure pr馗ision.\n", + /*180*/ "Cette arbal鑼e est une arme de courte port馥 mont馥 sur le poignet de l'agent de l'Institut Carrington. Elle se plie pour mieux se dissimuler et peut tirer jusqu' 5 carreaux anesth駸iants ou mortels.\n", + /*181*/ "Un appareil tir rapide utilis en cas d'urgence mais plus souvent en seringue hypodermique pour injecter un s馘atif. Les utilisateurs sont inform駸 qu'une dose trop importante peut entraner la mort.\n", + /*182*/ "Un tr鑚 long couteau de combat. Il contient un r駸ervoir de poison se brisant l'impact et tue la cible en moins de 6 secondes. Une arme sign馥 dataDyne.\n", + /*183*/ "Une version am駘ior馥 de la grenade. Elle peut 黎re utilis馥 avec un d騁onateur de 4 secondes ou en tant que bombe effet de ricochet.\n", + /*184*/ "Une bombe neutrons faible zone d'effet. Elle peut se d馗lencher l'impact ou 黎re r馮l馥 en mode de proximit.\n", + /*185*/ "Une mine dot馥 d'un d騁onateur de courte dur馥. Elle poss鐡e un d騁ecteur et 騅aluateur activer en mode secondaire.\n", + /*186*/ "Une mine dot馥 d'un d騁onateur de proximit. Elle poss鐡e un d騁ecteur de menace activ en mode secondaire.\n", + /*187*/ "Une mine d馗lencher distance. La commande d'activation est la fonction secondaire.\n", + /*188*/ "Un appareil 駘ectronique de brouillage, capable d'engendrer une panne 駘ectrique sur n'importe quel syst鑪e sur lequel il est fix.\n", + /*189*/ "Un laser de poignet meurtrier et ultra pr馗is. Il peut lancer des impulsions de longue distance ou maintenir un flux continu et concentr courte distance.\n", + /*190*/ "Une drogue de combat chimique. Une fois absorb馥, elle permet des r饌ctions plus rapides.\n", + /*191*/ "Le dernier de la ligne de scopes 'starlight' amplifiant la lumi鑽e ambiante pour une image plus claire des environs. Cet appareil utilise un algorithme de mouvement pour identifier les menaces possibles.\n", + /*192*/ "Cet appareil utilise la meilleure des applications en mati鑽e d'anti-gravit. Il poss鐡e un lien audio/vid駮 avec une fonction d'enregistrement et d'holographie spectroscopique.\n", + /*193*/ "Un scope de courte port馥 pouvant voir travers toute mati鑽e - m麥e le plomb - et produisant une repr駸entation chromatique simplifi馥 des environs.\n", + /*194*/ "Ce scope utilise un scanner infrarouge modul par ultrason pour donner une image claire des environs et la position des irr馮ularit駸 de structure. Il peut aussi localiser les ennemis occult駸 ou utilisant un appareil de brouillage optique.\n", + /*195*/ "Il utilise les capacit駸 d'un cristal extraterrestre pour cr馥r une champs de r馭raction de la lumi鑽e autour de l'utilisateur. Il ne peut fonctionner si une turbulence cin騁ique p駭鑼re dans le champ. Ouvrir le feu annule les effets du champ.\n", + /*196*/ "Un scanner optique binoculaire de longue port馥. Le viseur affiche une image composite de deux sources d'entr馥. Il poss鐡e aussi un zoom.\n", + /*197*/ "Il peut enregistrer n'importe quelles donn馥s et les envoyer au service informatique de l'Institut. Une variante de cet appareil permet aux pirates d'騁ablir un lien direct entre eux et le terminal connect.\n", + /*198*/ "Un pisteur puissant param騁rer sur les humains, les armes, les objets, ou encore les emplacements g駮graphiques.\n", + /*199*/ "Un scanner m馘ical modifi contenant les derni鑽es donn馥s de l'騁at de sant du Pr駸ident ainsi qu'un r駸um de tous les traitements administr駸. Il peut monitorer les fonctions vitales du Pr駸ident distance m麥e s'il se trouve au milieu d'une foule.\n", + /*200*/ "Un passe-partout 駘ectronique. Il ouvre les serrures cod馥s en quelques secondes mais un syst鑪e tr鑚 駘abor lui prendra plus de temps.\n", + /*201*/ "Une merveille m馘icale maian pouvant effectuer un diagnostique automatique et une intervention chirurgicale sans aucune incision. Un seul d馭aut: il ne reconnat et donc ne fonctionne que sur des organismes maians.\n", + /*202*/ "Une petite charge de plastique explosive coupl馥 une horloge scell馥 et impossible d駸amorcer, le tout rev黎u de shrapnel en t馭lon.\n", + /*203*/ "Une bombe fusion directionnelle placer de telle fa輟n que la charge est point馥 vers le bas. Ceci interrompra les recherches des labos de la dataDyne et fera s'effondrer l'immeuble tout entier.\n", + /*204*/ "Un petit mouchard fixer sur tout relais de communication qui permet d'imiter le signal officiel, 騁ablissant ainsi le lien entre l'Institut et l'agent m麥e dans une zone de brouillage. Il fait partie int馮rante du syst鑪e de communication local cibl.\n", + /*205*/ "Le fonctionnement de ce mouchard sp馗ial est tenu secret. Le m馗anisme d'auto-destruction couvre la majeure partie de l'appareil. Il est tr鑚 probable qu'il soit un exemple de communication mol馗ulaire quantique, ceci expliquant son efficacit.\n", + /*206*/ "Il utilise la technologie de communication quantique pour fournir des informations ultra pr馗ises l'armement en orbite, ceci minimisant les risques de dommages collat駻aux. La m麥e technologie est utilis馥 pour les mouchards pisteurs de l'Institut Carrington.\n", + /*207*/ "Ils d騁aillent les points de navigation et les codes de communication ainsi que les codes et fr駲uences de l'Air Force One. Les codes de cryptage y sont aussi donn駸.\n", + /*208*/ "Toutes les donn馥s se rattachant aux recherches oc饌niques conduites par la dataDyne sur le navire d騁ourn Pelagic II y figurent. Elle contient le relev sonar, les donn馥s g駮logiques, les donn馥s sur les artefacts extraterrestres, les 馗hantillons de coque, etc.\n", + /*209*/ "Le dernier enregistrement en date de la personnalit de l'IA Dr. Caroll avant conditionnement c駻饕ral. A utiliser pour 騁ude seulement ou projections th駮riques. Mental corrompu et dangereux. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un m駘ange chimique alt駻ant la perception de la cible. Le bien devient le mal, les m馗hants les gentils, les ennemis et les amis s'intervertissent. Un des nombreux projets du Secteur 51 sign Trent Easton.\n", + /*211*/ "Un uniforme diff駻ent du vtre. Portez-le et jouez la com馘ie.\n", + /*212*/ "PROX.\n", + /*213*/ "RETARD.\n", + /*214*/ "TELECOM.\n", + /*215*/ "SENTINELLE\n", + /*216*/ "IMPACT\n", + /*217*/ "M馮a Roquette\n", + /*218*/ "R馗epteur\n", + /*219*/ "Scanner pr駸identiel\n", + /*220*/ "Auto-chirurgien\n", + /*221*/ "Bombe skedar\n", + /*222*/ "D駻oute-Comms\n", + /*223*/ "Mouchard pisteur\n", + /*224*/ "Amplificateur cible\n", + /*225*/ "Plans de vol\n", + /*226*/ "Cassette de recherche\n", + /*227*/ "Disque sauvegarde\n", + /*228*/ "Carte\n", + /*229*/ "Mallette\n", + /*230*/ "Collier\n", + /*231*/ "ScanPresident\n", + /*232*/ "Boost\n", + /*233*/ "Scan RayonsX\n", + /*234*/ "Scan Horizon\n", + /*235*/ "Ampli cible\n", + /*236*/ "Dans cette variante de la Camspy, le module d'enregistrement a 騁 remplac par du plastic hautement explosif.\n", + /*237*/ "Cette variante de la Camspy utilise une toxine neuro-active qui provoque un coma presque instantan chez la victime.\n", + /*238*/ "Collier de Cassandra De Vries. Pourvu d'une cl-駑etteur ouvrant les portes courte port馥, qui permet l'acc鑚 aux zones non-autoris馥s. Le mod鑞e Mk3 ne fonctionne que si son propri騁aire est en vie. Niveau de s馗urit AA-1 (gamma).", + /*239*/ "Collier de remplacement de Cassandra De Vries'. Nom d'utilisateur: %s Mot de passe: %s\n", + /*240*/ "Bouclier\n", + /*241*/ "Le bouclier prot鑒e son utilisateur en d騁ectant les attaques et en g駭駻ant momentan駑ent un champ de force concentr pour repousser l'attaque. Le bouclier poss鐡e une quantit d'駭ergie limit馥. Il ne prot鑒e pas l'utilisateur ind馭iniment. Les boucliers sont g駭駻alement activ駸 lorsqu'ils sont port駸, bien que celui-ci soit un prototype inachev.\n", + /*242*/ "Boosts combat\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_g.c b/src/files/lang/pal-beta/gun_str_g.c new file mode 100644 index 000000000..de65d0ac0 --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_g.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Treffer", + /* 2*/ "Ein Fehlversuch\n", + /* 3*/ "Versagt", + /* 4*/ "Fehlversuche", + /* 5*/ "Selber schuld!", + /* 6*/ "unbewaffnet\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (Schalld.)\n", + /* 9*/ "Falcon 2 (Zielf.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop-Gewehr\n", + /* 25*/ "Schrotflinte\n", + /* 26*/ "Reaper\n", + /* 27*/ "Raketenwerfer\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Maianische Granate\n", + /* 31*/ "FS XR-20\n", + /* 32*/ "Sniper-Gewehr\n", + /* 33*/ "Armbrust\n", + /* 34*/ "Bet舫bungs-Gewehr\n", + /* 35*/ "Kampfmesser\n", + /* 36*/ "Granate\n", + /* 37*/ "N-Bombe\n", + /* 38*/ "Zeitznder-Mine\n", + /* 39*/ "Ann臧erungs-Mine\n", + /* 40*/ "Fernznder-Mine\n", + /* 41*/ "ECM-Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Verkleidung\n", + /* 44*/ "Rakete\n", + /* 45*/ "Zielsuch-Rakete\n", + /* 46*/ "Granatwerfer-Munition\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolzen\n", + /* 49*/ "Psychosis-Gewehr\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KlO1313\n", + /* 53*/ "KF7 Spezial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Nachtsicht-Ger舩\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Tr-Decoder\n", + /* 64*/ "Sprengsatz\n", + /* 65*/ "Rntgen-Scanner\n", + /* 66*/ "extraterrestrisches Medipack\n", + /* 67*/ "Koffer\n", + /* 68*/ "Verkleidung\n", + /* 69*/ "IR-Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Aktenkoffer\n", + /* 72*/ "Suizid-Kapsel\n", + /* 73*/ "Tarnkappe\n", + /* 74*/ "Adrenalin\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizont-Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "Weitsicht\n", + /* 80*/ "R-Werfer\n", + /* 81*/ "N臧erungs-Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Messer\n", + /* 84*/ "DY357\n", + /* 85*/ "Einzelfeuer\n", + /* 86*/ "Schnellfeuer\n", + /* 87*/ "Feuersto゚\n", + /* 88*/ "Streufeuer\n", + /* 89*/ "Schrotflintenfeuer\n", + /* 90*/ "Rail-gun-Effekt\n", + /* 91*/ "Raketenabschuss\n", + /* 92*/ "kalibrierte Rakete\n", + /* 93*/ "Fly-By-Wire-Rakete\n", + /* 94*/ "Schlag \n", + /* 95*/ "Explosiv-Munition\n", + /* 96*/ "gezielte Schsse\n", + /* 97*/ "Magazin-Entleerung\n", + /* 98*/ "Granat-Werfer\n", + /* 99*/ "Wandhaftung\n", + /*100*/ "Schlag\n", + /*101*/ "entwaffnen\n", + /*102*/ "folgt der Zielaufschaltung.\n", + /*103*/ "Zielfernrohr kompatibel\n", + /*104*/ "halbes Magazin wird entleert\n", + /*105*/ "Doppelschuss\n", + /*106*/ "Schleifer\n", + /*107*/ "Sedativ\n", + /*108*/ "letale Injektion\n", + /*109*/ "Messerstich\n", + /*110*/ "vergiftetes Wurfmesser\n", + /*111*/ "Zielsucher\n", + /*112*/ "sofortige Eliminierung\n", + /*113*/ "Verst舐kung\n", + /*114*/ "Umkehr\n", + /*115*/ "High Impact-Munition\n", + /*116*/ "Tarnung\n", + /*117*/ "Waffe der Wachleute\n", + /*118*/ "Selbstzerst. bei N臧erung\n", + /*119*/ "Bewegungsmelder\n", + /*120*/ "verzgerte Explosion\n", + /*121*/ "Explosion bei Ann臧erung\n", + /*122*/ "ferngezndete Explosion\n", + /*123*/ "Detonator\n", + /*124*/ "Vier-Sekunden-Zndung\n", + /*125*/ "Ann臧erungs-Pinball\n", + /*126*/ "Verzgerte Detonation\n", + /*127*/ "Detonation bei Ann臧erung\n", + /*128*/ "dreifacher Schuss\n", + /*129*/ "aufgeladener Schuss\n", + /*130*/ "Hocken\n", + /*131*/ "infizieren\n", + /*132*/ "Feuerst゚e\n", + /*133*/ "Kurzstrecken-Strahl\n", + /*134*/ "Detonation beim Aufprall\n", + /*135*/ "Restlichtverst舐ker\n", + /*136*/ "Mobile Kamera\n", + /*137*/ "Rntgen-Sicht\n", + /*138*/ "Infrarot-Scanning\n", + /*139*/ "Zoom\n", + /*140*/ "Strsender\n", + /*141*/ "Verbindung\n", + /*142*/ "Zielidentifizierung\n", + /*143*/ "Verkleidung kann getragen werden\n", + /*144*/ "Sprengs舩ze mssen platziert werden\n", + /*145*/ "Teleskop-Sicht\n", + /*146*/ "Schalld舂pfer\n", + /*147*/ "Magazin-Erweiterung\n", + /*148*/ "Ziel-Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maianisch\n", + /*154*/ "JonesCorp\n", + /*155*/ "Auch ohne Waffen sind Sie ein wrdiger Gegner. Setzen Sie Ihre F舫ste ein, um Gegner niederzuschlagen oder zu entwaffnen. Anschlie゚end knnen Sie deren Waffen aufsammeln.\n", + /*156*/ "Diese zielgenaue und treffsichere Waffe wird von den Mitarbeitern des Instituts bevorzugt eingesetzt. Verwenden Sie die Laser-Zieleinheit, um Schsse punktgenau zu platzieren. Im Gefecht empfiehlt es sich, von der Pistolen-Funktion Gebrauch zu machen.\n", + /*157*/ "Eine verbesserte Falcon 2, die noch zus舩zlich ber einen Schalld舂pfer verfgt.\n", + /*158*/ "Eine verbesserte Falcon 2, die durch ein Pr艘isions-Fernrohr noch zus舩zlich an Genauigkeit gewinnt.\n", + /*159*/ "Eine state-of-the-art Milit舐-Pistole, die haupts臘hlich von Friedenstruppen eingesetzt wird. Die Waffe verfgt ber eine leichte Zoom-Funktion und feuert drei Kugeln gleichzeitig ab. Sekund舐-Feuermodus.\n", + /*160*/ "Wenn Sie auf einen Skedar treffen, ist er vermutlich mit dieser Waffe ausgestattet. Ein gro゚es Magazin macht diese Pistole zu einer formidablen Handfeuerwaffe. Aber die Sekund舐-Funktion ist noch bemerkenswerter. Die Feuerkraft kann durch Aufladen verst舐kt werden, kostet aber Munition.\n", + /*161*/ "Die dataDyne DY357 ist die st舐kste Handfeuerwaffe der Welt. Jede Kugel verfgt ber einen hohen Penetrations-Faktor und schleudert das Ziel zurck. Modifizierte Modelle werden nur fr spezielle Kunden angefertigt. NSA-Chef Trent Easton verfgt angeblich ber eine vergoldete Variante.\n", + /*162*/ "Die DY357-LX wurde speziell fr Trent Easton angefertigt. Neben einem mit Tigerleder berzogenen Griff verfgt diese Pistole ber einen integrierten Beschleuniger, der jeder Kugel noch mehr Kraft verleiht.\n", + /*163*/ "Die Maianische Standard-Waffe. Eine flexible Waffe, die in der Lage ist, sowohl normale als auch Explosiv-Geschosse abzufeuern. Bei letzterer Variante wird nicht mehr Munition als sonst verbraucht.\n", + /*164*/ "Ein dataDyne-Klassiker und Bestseller! Dieses Maschinengewehr verfgt ber ein 32er Magazin und eine Sonderfunktion. Jedes sichtbare Ziel kann fixiert werden. Dieses Feature macht jeden durchschnittlichen Schtzen zu einem Profi. Vorausgesetzt natrlich, er oder sie ist intelligent genug, die Waffe zu bedienen. Durchschnittliche Feuerrate: 900 rpm.\n", + /*165*/ "Das Sturmgewehr des Carrington Instituts. Diese Waffe zeichnet sich durch hohe Reichweite und Magazin-Kapazit舩 aus. Die Sekund舐-Funktion ermglicht es dem Schtzen, sich zu bewegen, w臧rend er auf ein Ziel zoomt. Durchschnittliche Feuerrate: 750 rpm.\n", + /*166*/ "Ein Standard-Gewehr mit ワberraschungseffekt. Die Sekund舐-Funktion verwandelt es in eine Mine, die auf Bewegungen reagiert, aber nach wie vor wie ein herumliegendes Gewehr aussieht. Durchschnittliche Feuerrate: 700 rpm.\n", + /*167*/ "Eine Variante des Dragon. Anstatt der Minen-Funktion verfgt die Waffe ber einen kleinen Granat-Werfer. Hervorragend als Untersttzung. Durchschnittliche Feuerrate: 700 rpm.\n", + /*168*/ "High-tech pur von dataDyne. Der Avenger wird als Sturmgewehr eingesetzt. Die wichtigste Funktion ist ein Gefahren-Melder, der auf die Anwesenheit von Sprengkrpern, Selbstschu゚anlagen und トhnlichem reagiert. Durchschnittliche Feuerrate: 950 rpm.\n", + /*169*/ "Speziell fr Bodyguards. Die Cyclone wird auch von der Leibwache des Pr舖identen eingesetzt. In Extremsituationen kann die Feuerrate um mehr als das Doppelte erhht werden. Allerdings wird durch diese Aktion das Magazin in sekundenschnelle geleert. Durchschnittliche Feuerrate: 900 rpm bzw. 2000 rpm.\n", + /*170*/ "Die geheime Waffe des Carrington Instituts. Verfgt ber eine hohe Feuerrate und ein gro゚es Magazin. Die Sekund舐-Funktion aktiviert eine Tarnfunktion, allerdings auf Kosten der Munition. Daher sollte diese Funktion mit gr゚ter Vorsicht gehandhabt werden. Durchschnittliche Feuerrate: 1100 rpm.\n", + /*171*/ "Ein weiteres Beispiel Maianischer Waffentechnik. Diese Waffe feuert normale Munition mit der gleichen Geschwindigkeit ab, wie jedes andere Gewehr. Es sind aber auch Hochgeschwindigkeits-Schsse mglich, die Deckungen durchbrechen knnen. Der Nachteil dabei ist, dass die Feuerrate sinkt und aufgrund des Rcksto゚es die Genauigkeit leidet. Durchschnittliche Feuerrate: 900 rpm bzw. 300 rpm.\n", + /*172*/ "Ein Maschinengewehr, das in der Form eines Laptops designt wurde. In Tarnform kann nicht gefeuert werden. Diese Waffe h舁t auch einer genaueren Untersuchung stand. Sie wird wie jeder PC gebootet, verfgt aber nur ber ein Viertel des Speichers. Durschnittliche Feuerrate: 1000 rpm.\n", + /*173*/ "Eine dataDyne-Waffe fr die hausinterne Security. Ein neunfaches Magazin in Kombination mit Einfach- oder Doppelfeuer macht diese Waffe zu einem gef臧rlichen Nahkampf-Instrument.\n", + /*174*/ "In den H舅den von jemandem, der den starken Rcksto゚ ausgleichen kann, ist dies wohl die schrecklichste aller Waffen. Auf jeden Fall eignet sie sich hervorragend fr Gefechte in engen Korridoren. Maximale Feuerrate: 1800 rpm.\n", + /*175*/ "An und fr sich eine sehr unhandliche Waffe. Sie feuert eine Standard-Rakete oder eine langsamere Zielsuch-Rakete auf das Ziel ab.\n", + /*176*/ "Ein von dataDyne entworfener Granatwerfer. Die Sekund舐funktion umhllt die Granate mit einer klebrigen Substanz, welche die Haftung an W舅den und Decken ermglicht. Einige Sekunden sp舩er f舁lt die Granate zu Boden, wo sie detoniert.\n", + /*177*/ "Die Skedar lieben es, die Angst in den Augen ihrer Gegner zu sehen. Daher ist es beinahe selbstverst舅dlich, dass sie mit der Sekund舐-Funktion ihres Raketenwerfers ein Geschoss fernsteuern knnen. So knnen sie sichan den vergeblichen Fluchtversuchen ihrer Opfer weiden.\n", + /*178*/ "Das Fernsicht-Gewehr ist ein Maianischer Hybrid zwischen einem Rntgen-Scanner und einem Gewehr, das durch feste Objekte schie゚en kann. Das Fernrohr ist in der Lage, langsame lebende Objekte zu erfassen und als festgelegten Zielpunkt zu speichern.\n", + /*179*/ "Ausgestattet mit hervorragender Zoom-F臧igkeit und Hochgeschwindigkeits-Kugeln ist dies wohl eines der besten Sniper-Gewehre aller Zeiten. In geduckter Haltung erzielen Sie die bestmgliche Genauigkeit.\n", + /*180*/ "Die Armbrust ist nicht gr゚er als eine Pistole, und wird am Handgelenk des Agenten befestigt. Die Spannweite der Waffe kann aus Grnden der Geheimhaltung verringert werden. Die Munition umfasst bis zu fnf entweder vergiftete oder regelrecht letale Bolzen.\n", + /*181*/ "Eine Vorrichtung, die im Notfall auch als Waffe benutzt werden kann. Der eigentliche Verwendungszweck dient aber der Verabreichung von Sedativen. Eine volle Entladung des Reservoirs kann durchaus fatale Folgen haben.\n", + /*182*/ "Ein sehr gro゚es Kampfmesser. Es enth舁t eine Giftkapsel, die beim Aufprall nach einem Wurf zerbricht. Das Gift entfaltet im Normalfall nach ca. sechs Sekunden seine Wirkung. Eine typische dataDyne-Waffe.\n", + /*183*/ "Eine verbesserte Version der Granate. Kann sowohl mit verzgerter Detonation als auch mit Ann臧erungs-Sensor eingesetzt werden. \n", + /*184*/ "Eine kleine Neutronenbombe mit reduziertem Wirkungsradius. Die Detonation kann, je nach Wunsch, beim Aufprall oder bei Ann臧erung erfolgen.\n", + /*185*/ "Eine Mine mit verzgerter Detonation. Diese Waffe verfgt ber einen Gefahren-Sensor, der als Sekund舐-Funktion aktiviert werden kann.\n", + /*186*/ "Eine Mine, die auf Bewegung reagiert. Diese Waffe verfgt ber einen Gefahren-Sensor, der als Sekund舐-Funktion aktiviert werden kann.\n", + /*187*/ "Diese Mine kann ferngezndet werden. Die Sekund舐-Funktion stellt quasi die Aktivierung dar.\n", + /*188*/ "Diese Strsender-Vorrichtung ist in der Lage, in jedem System, mit dem sie verbunden ist, eine fokusierte elektrische Strung zu simulieren. Voraussetzung ist ein unmittelbarer Kontakt mit dem System.\n", + /*189*/ "Der Laser wird am Handgelenk getragen und verfgt ber perfekte Pr艘ision. Man kann mit ihm entweder Langstrecken-Energiest゚e oder einen konstanten, hochkonzentrierten Kurstrecken-Energiestrom entladen.\n", + /*190*/ "Genetische Stimulation fr die Anwendung im Kampf. Nach der Anwendung erscheint der zeitliche Ablauf verlangsamt, was eine wesentlich hhere Reaktionsf臧igkeit zur Folge hat.\n", + /*191*/ "Das neueste Produkt in einer Reihe von Ger舩en, das nicht nur Restlicht verst舐kt, um eine klarere Wahrnehmung der Umgebung zu ermglichen, sondern auch mit Hilfe eines Ziel-Algorithmus mgliche Gefahren erkennt und entsprechend hervorhebt.\n", + /*192*/ "Dieses Ger舩 beinhaltet die kleinstmgliche Antigravitations-Technologie. Als ultimative Spionage-Einheit bietet der CamSpy Video- und Audio-Links, Aufzeichnungsfunktion und eine integrierte Vorrichtung fr spektroskopische Holografie.\n", + /*193*/ "Dieser Scanner kann auf kurze Strecken jegliches Material durchleuchten. Blei bildet hier keine Ausnahme! Der Anwender nimmt eine vereinfachte, chromatisierte Darstellung der Umgebung wahr.\n", + /*194*/ "Der IR-Scanner setzt mit Ultraschall modulierte Infrarot-Strahlung ein, um die Umgebung auf strukturelle Irregularit舩en zu untersuchen. Der Anwender erh舁t ein erstaunlich detailliertes Bild der Gegebenheiten. Au゚erdem durchdringt der Scanner auch jegliche Art von Tarnkappen- Technologie und andere optische T舫schungen.\n", + /*195*/ "Diese Maschine nutzt die lichtbrechenden Eigenschaften einer kristallinen extraterrestrischen Substanz, um den Tr臠er unsichtbar erscheinen zu lassen. Solange es zu keinen kybernetischen Strungen kommt, bleibt das Feld intakt. Aber schon der Einsatz einer Waffe unterbricht diese Funktion.\n", + /*196*/ "Ein binokularer Langstrecken-Scanner. Im Sichtfenster erscheint ein Bild, welches aus den beiden optischen Eingaben zusammengestellt wird. Zoom vorhanden.\n", + /*197*/ "Mit Hilfe dieses Ger舩s knnen nahezu alle Arten von gespeicherten Daten abgerufen und direkt an die Hacker des Instituts gesandt werden. Eine Variante dieser Maschine erlaubt den Hackern durch einen direkten Link den Zutritt zum lokalen System.\n", + /*198*/ "Ein ausgezeichnetes Suchger舩, das auf jegliche Parameter konfiguriert werden kann: Personen, Waffen, Gegenst舅de und Orte sind nur ein Bruchteil der Optionen, welche der Tracker anbietet.\n", + /*199*/ "Ein modifizierter medizinischer Scanner, der die aktuellen Vital-Werte des Pr舖identen anzeigt. Es werden auch 舁tere Daten und verschiedene Behandlungen archiviert. Der Scanner ist in der Lage, die entsprechenden Werte auch ber gr゚ere Entfernungen zu erfassen. Dies ist auch mglich, wenn sich das Ziel inmitten einer Menschenmenge befindet.\n", + /*200*/ "Ein einfacher, aber wirkungsvoller Safeknacker, der elektronisch codierte Schlsser normalerweise innerhalb von Sekunden knackt. Selbstverst舅dlich h舅gt dies auch vom jeweiligen Schloss ab.\n", + /*201*/ "Ein Wunder Maianischer Technologie. Diese Vorrichtung erstellt eine automatische Diagnose und fhrt die entsprechenden chirurgischen Eingriffe OHNE Einschnitte durch. Der Nachteil ist, dass es nur bei Maianern funktioniert.\n", + /*202*/ "Ein kleiner Plastik-Sprengsatz, dessen Timer durch ein Siegel vor Missbrauch geschtzt wird. Die Schrapnelle sind mit Teflon ummantelt. Sehr bse!\n", + /*203*/ "Hierbei handelt es sich um eine direktionale Fusionsbombe, die so platziert wird, dass die Entladung nach unten geht. Dadurch werden die dataDyne-Labors verwstet, und der Rest des Geb舫des strzt in das so entstandene Loch.\n", + /*204*/ "Eine kleine Wanze, die an jedem Kommunikations-Ger舩 angebracht werden kann. Diese Vorrichtung benutzt das Fremdsignal, um eine Verbindung zwischen dem Agenten und dem Institut herzustellen. Das Signal kann auch zurckverfolgt werden, um den Standort des Agenten zu bestimmen. Vor allem in Situationen hchster Bedr舅gnis hat sich der Einsatz hervorragend bew臧rt. Ein unverzichtbares Zubehr fr jeden Agenten.\n", + /*205*/ "Das Innenleben dieser Wanze ist ein gut gehtetes Geheimnis. Fest steht, dass der Selbstzerstrungsmechanismus ein wichtiger Bestandteil ist. Man vermutet, das die Wanze auf quantenmolekularer Kommunikation aufbaut, welche die ph舅omenale Verl舖slichkeit des Ger舩s erkl舐en wrde.\n", + /*206*/ "Quantenmolekulare Technologie ermglicht au゚erordentlich akkurate Zielerfassung fr Orbitalwaffen. Dadurch wird der Schadensradius auf den ntigen Umfang beschr舅kt. \n", + /*207*/ "Detaillierte Flugpl舅e, Kommunikationscodes und Frequenzen fr die Air Force One. Beinhaltet auch Dechiffrier-Codes.\n", + /*208*/ "Betrifft alle Daten der Forschungsarbeit, die durch dataDyne von der gekaperten Pelagic II am Meeresgrund durchgefhrt wurden. Der Inhalt besteht aus Sonar-Karten, geologischen Daten, Gewebeproben etc.\n", + /*209*/ "Die letzte Aufzeichnung der Persnlichkeit der knstlichen Intelligenz, die sich selbst Dr. Caroll nennt. Die Aufzeichnung wurde vor der Lschung und cerebralen Restrukturierung durchgefhrt. Kann zu Studienzwecken herangezogen worden. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Ein chemischer Cocktail, der die Realit舩swahrnehmung der Zielperson umkehrt. Gut wird zu Bse, Bse wird zu gut, Freund und Feind tauschen die Pl舩ze. Ein weiteres Forschungsergebnis, entwickelt von Trent Easton in der Area 51.\n", + /*211*/ "Tragen Sie diese Verkleidung, um unerkannt zu bleiben.\n", + /*212*/ "BEWEG\n", + /*213*/ "ZEIT\n", + /*214*/ "FERN\n", + /*215*/ "AUTO\n", + /*216*/ "SCHLAG\n", + /*217*/ "Big King-Rakete\n", + /*218*/ "Data Uplink\n", + /*219*/ "Presid舅ten-Scanner\n", + /*220*/ "Auto-Chirurg\n", + /*221*/ "Skedar-Bombe\n", + /*222*/ "Komm-Wanze\n", + /*223*/ "Wanze\n", + /*224*/ "Peilger舩\n", + /*225*/ "Flugpl舅e\n", + /*226*/ "Forschungsdaten\n", + /*227*/ "Sicherungsdiskette\n", + /*228*/ "Schlsselkarte\n", + /*229*/ "Aktentasche\n", + /*230*/ "Halskette\n", + /*231*/ "Pr舖identScan\n", + /*232*/ "Adr.\n", + /*233*/ "R-Scan.\n", + /*234*/ "H-Scan.\n", + /*235*/ "Ziel-Verst.\n", + /*236*/ "Bei dieser Version des CamSpy wurde die Aufzeichnungs-Funktion durch einen starken Plastik-Sprengsatz ersetzt.\n", + /*237*/ "Diese Version des CamSpy verfgt ber ein paralysierendes Nervengift, das die Zielperson fast augenblicklich in Katatonie versetzt.\n", + /*238*/ "Cassandra De Vries Halskette. Beinhaltet eine Ann臧erungs-Schlsselkarte, um Sperrzonen betreten zu knnen. Das MK3 Modell funktioniert nur, solange der Besitzer am Leben ist. Sicherheitsklasse AA-1 (gamma).", + /*239*/ "Cassandra De Vries Ersatzhalskette. Benuzername: %s Passwort: %s\n", + /*240*/ "Schild\n", + /*241*/ "Der Schild schtzt den Tr臠er, indem er automatisch Gefahren erkennt und ein tempor舐es Kraftfeld errichtet. Dadurch wird die Attacke neutralisiert. Der Schild verfgt ber einen begrenzten Energievorrat. Die Schutzfunktion kann also nur ber eine bestimmte Zeitspanne gew臧rleistet werden. Im Normalfall werden Schilde aktiv, sobald sie von jemandem getragen werden, auch wenn es so aussieht, als w舐e dieser spezielle Schild ein nicht-funktionabler Prototyp.\n", + /*242*/ "Adrenalin\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_i.c b/src/files/lang/pal-beta/gun_str_i.c new file mode 100644 index 000000000..cb0fa4a29 --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_i.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Vittime", + /* 2*/ "Morto una volta\n", + /* 3*/ "Morto", + /* 4*/ "volte", + /* 5*/ "Suicidi", + /* 6*/ "Corpo a corpo\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenz.)\n", + /* 9*/ "Falcon 2 (cannoc.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Vendetta\n", + /* 20*/ "Ciclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Pistola Laptop\n", + /* 25*/ "Pistola rotaz.\n", + /* 26*/ "Falciatore\n", + /* 27*/ "Lanciamissili\n", + /* 28*/ "Devastatore\n", + /* 29*/ "Killer\n", + /* 30*/ "Granata Maian\n", + /* 31*/ "TeleVista XR-20\n", + /* 32*/ "Fucile cecchino\n", + /* 33*/ "Balestra\n", + /* 34*/ "Sedativo\n", + /* 35*/ "Pugnale da lotta\n", + /* 36*/ "Granata\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina a orologeria\n", + /* 39*/ "Mina di prossimit濬n", + /* 40*/ "Mina a distanza\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Travestimento\n", + /* 44*/ "Missile\n", + /* 45*/ "Missile di ritorno\n", + /* 46*/ "Granata a giro\n", + /* 47*/ "Laser\n", + /* 48*/ "Dardo\n", + /* 49*/ "PsicoArma\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Vista Notturna\n", + /* 60*/ "TeleSpia\n", + /* 61*/ "CapsuSpia\n", + /* 62*/ "BombaSpia\n", + /* 63*/ "Decodificatore Porta\n", + /* 64*/ "Esplosivo\n", + /* 65*/ "Scanner a raggi X\n", + /* 66*/ "AutoChirurgo alieno\n", + /* 67*/ "Valigia\n", + /* 68*/ "Travestimento\n", + /* 69*/ "Scanner a infrarossi\n", + /* 70*/ "Puntatore-R\n", + /* 71*/ "Cartella\n", + /* 72*/ "Compressa suicidio\n", + /* 73*/ "Dispos. mimetico\n", + /* 74*/ "Booster lotta\n", + /* 75*/ "Connettore Dati\n", + /* 76*/ "TeleScanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "Televista\n", + /* 80*/ "Lanciamissili\n", + /* 81*/ "Mina pross\n", + /* 82*/ "PsicoArma\n", + /* 83*/ "Pugnale\n", + /* 84*/ "DY357\n", + /* 85*/ "Colpo singolo\n", + /* 86*/ "Fuoco rapido\n", + /* 87*/ "Fuoco a scoppio\n", + /* 88*/ "Falciata\n", + /* 89*/ "Fuoco a raffica\n", + /* 90*/ "Effetto rail-gun\n", + /* 91*/ "Lancio missili\n", + /* 92*/ "Missile guidato\n", + /* 93*/ "Missile filoguidato\n", + /* 94*/ "Botta col calcio\n", + /* 95*/ "Capsule esplosive\n", + /* 96*/ "Spari guidati\n", + /* 97*/ "Scarica del caricatore\n", + /* 98*/ "Lanciagranate\n", + /* 99*/ "Arpione\n", + /*100*/ "Pugno\n", + /*101*/ "Disarma\n", + /*102*/ "Segui l'obiettivo\n", + /*103*/ "Usa cannocchiale\n", + /*104*/ "Mezza scarica caricatore\n", + /*105*/ "Doppio scoppio\n", + /*106*/ "Macinatore\n", + /*107*/ "Sedativo\n", + /*108*/ "Iniezione letale\n", + /*109*/ "Pugnalata\n", + /*110*/ "Lancia lama avvelenata\n", + /*111*/ "LocalizzaObiettivo\n", + /*112*/ "Morte istantanea\n", + /*113*/ "Booster\n", + /*114*/ "Invertitore\n", + /*115*/ "Capsule a forte impatto\n", + /*116*/ "Mimesi\n", + /*117*/ "Impiega pistola sentinella\n", + /*118*/ "Autodistruzione di prossimit濬n", + /*119*/ "Rilevatore di minaccia\n", + /*120*/ "Esplosivo a orologeria\n", + /*121*/ "Esplosivo di prossimit濬n", + /*122*/ "Esplosivo a distanza\n", + /*123*/ "Detonazione\n", + /*124*/ "Miccia a 4 secondi\n", + /*125*/ "Ping-pong di prossimit濬n", + /*126*/ "Detonazione a orologieria\n", + /*127*/ "Detonazione di prossimit濬n", + /*128*/ "Triplice scoppio\n", + /*129*/ "Sparo a ricarica\n", + /*130*/ "Accucciarsi\n", + /*131*/ "Infettare\n", + /*132*/ "Fuoco a raffica\n", + /*133*/ "Corrente a breve raggio\n", + /*134*/ "Detonazione a impatto\n", + /*135*/ "Illuminatore\n", + /*136*/ "Telecamera mobile\n", + /*137*/ "Vista a raggi X\n", + /*138*/ "Immagine termica\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo disturbo\n", + /*141*/ "Connetti\n", + /*142*/ "Identifica obiettivi\n", + /*143*/ "Travestiti\n", + /*144*/ "Piazza esplosivo\n", + /*145*/ "Vista telescopica\n", + /*146*/ "Silenziatore\n", + /*147*/ "Estensione caricatore\n", + /*148*/ "Vista Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Anche disarmato sei ancora un temibile avversario. Usa il pugno per mandare KO o per disarmare i tuoi avversari e raccogli le loro armi.\n", + /*156*/ "Precisa e affidabile, questa l'arma comunemente usata nelle operazioni dell'istituto. Usa la vista laser per sparare pallottole letali o colpisci i nemici con il calcio della pistola.\n", + /*157*/ "Una Falcon 2 potenziata, dotata di silenziatore e comunque letale.\n", + /*158*/ "Una Falcon 2 potenziata, dotata di cannocchiale a due ingrandimenti per il massimo della precisione.\n", + /*159*/ "Una pistola militare all'avanguardia comunemente usata dalle forze di pace. ネ dotata di zoom e di modalit secondaria di sparo a triplice scoppio.\n", + /*160*/ "Di solito queste armi sono tipiche degli Skedar. Il capiente caricatore e la canna affilata rendono questa pistola un'arma formidabile, sebbene il colpo letale sia dovuto alla sua funzione secondaria: ricaricala per maggiore potenza a costo di qualche giro di munizioni.\n", + /*161*/ "La DY357 dataDyne la pistola pi potente che esista. Ogni colpo ha un impressionante fattore di penetrazione e colpisce l'obiettivo con tutto il peso e la potenza dello sparo. Se ne producono modelli personalizzati su commissione. Pare che Trent Easton ne abbia una placcata d'oro.\n", + /*162*/ "La DY357-LX stata creata per il direttore della NSA, Trent Easton. Oltre al calcio ricoperto in pelle di tigre, quest'arma dorata vanta anche una canna speciale che conferisce al proiettile incredibile velocit e forza.\n", + /*163*/ "ネ la dotazione Maian standard: una pistola versatile per colpi normali o esplosivi senza ripercussioni sul resto del caricatore.\n", + /*164*/ "Questo classico prodotto dataDyne il fucile mitragliatore pi venduto: vanta un caricatore a 32 colpi e la speciale caratteristica di identificare e mirare sul bersaglio nell'intero campo visivo. Trasforma un tiratore scelto medio in uno eccellente, sempre che sia in grado di manovrare l'arma. Velocit media di fuoco: 900 giri/min.\n", + /*165*/ "Il principale fucile d'assalto del Carrington Institute, dotato di gittata e caricatore ottimi. La modalit secondaria permette a chi lo usa di spostarsi mentre zooma sul bersaglio. Velocit media di fuoco: 750 giri/min.\n", + /*166*/ "Un fucile d'assalto standard con un'innovazione micidiale: nella modalit secondaria diventa una mina di prossimit molto simile ad una pistola. Velocit media di fuoco: 700 giri/min.\n", + /*167*/ "Una variante del fucile d'assalto Dragon: invece dell'esplosivo di prossimit dotato un piccolo lanciagranate. Eccellente arma d'appoggio. Velocit media di fuoco: 700 giri/min.\n", + /*168*/ "Altro esempio di alta tecnologia della dataDyne. Solitamente un fucile d'assalto con un caricatore ridotto e perforazione potente, dotato di rilevatore di minaccia per identificare esplosivi, pistole a muro e altro.Velocit media di fuoco: 950 giri/min.\n", + /*169*/ "Progettata per le guardie del corpo, la Ciclone stata adottata dalle Forze di Sicurezza del Presidente per gli eccezionali risultati in caso di soppressione. In estreme circostanze, la velocit di fuoco pu essere raddoppiata, scaricando il caricatore in un secondo. Velocit media di fuoco: 900 giri/min. Scarica a 2000 giri/min.\n", + /*170*/ "L'arma segreta del Carrington Institute. Velocit di fuoco fenomenale e straordinaria capacit del caricatore. La modalit secondaria una funzione nascosta che esaurisce le munizioni nel caricatore. Un'arma distruttiva. Velocit media di fuoco: 1100 giri/min.\n", + /*171*/ "Un altro eccellente esempio di arma Maian. Pu sparare colpi ordinari alla velocit degli altri fucili mitragliatori, ma anche scariche ad alta velocit in grado di perforare oggetti e trovare obiettivi nascosti. Gli unici svantaggi della modalit secondaria sono la ridotta velocit di fuoco e la mancanza di precisione a causa della potenza dello sparo. Velocit media di fuoco: 900 giri/min. (m/s:300 giri/min.).\n", + /*172*/ "Un fucile mitragliatore dalle sembianze di un computer portatile. Quando chiuso, non pu sparare, ma attivandolo assume la sua forma micidiale. Se ispezionato a fondo pu essere scoperto: il PC si avvia, ma la sua memoria solo un quarto del normale.Velocit media di fuoco: 1000 giri/min.\n", + /*173*/ "Un'arma dataDyne realizzata per le forze di sicurezza. Il caricatore a nove cartucce assieme alla modalit di sparo semplice o doppia ne fanno un'arma pericolosa a distanze ravvicinate.\n", + /*174*/ "Un'arma terrificante se nelle mani di qualcuno abbastanza robusto da resistere al forte contraccolpo; altrimenti molto difficile da controllare ma comunque capace di aprire utili corridoi. Velocit massima di fuoco: 1800 giri/min.\n", + /*175*/ "Un'arma ingombrante capace di sparare un missile standard o uno pi lento che rientra alla base dopo aver seguito lo sfortunato obiettivo.\n", + /*176*/ "Un sistema a lunga gittata per il lancio di granate realizzato dalla dataDyne. La modalit secondaria ricopre gli ordigni di una sostanza collosa: quando viene sparata, la granata si attacca alle pareti e ai soffitti. Dopo pochi secondi si stacca e cade a terra, esplodendo.\n", + /*177*/ "Gli Skedar godono nel vedere i nemici tremare di terrore. ネ dunque ovvio che sul loro lanciamissili standard abbiano un missile telecomandato nella modalit secondaria, in modo che possano divertirsi guardando la preda che cerca inutilmente di scappare al proiettile che si avvicina.\n", + /*178*/ "Il fucile TeleVista un'arma Maian risultante dall'unione di un sistema di scansione a raggi X e un fucile capace di perforare oggetti solidi. Il dispositivo pu puntare e seguire le forme di vita, sebbene non raggiunga la stessa velocit del nemico in corsa.\n", + /*179*/ "Grazie al potente zoom e alla pallottola ad elevata velocit, quest'arma del Carrington Institute uno dei migliori fucili cecchino mai prodotti. Accucciandosi si ottiene la massima precisione.\n", + /*180*/ "Questa balestra un esempio di 'pistola' di piccole dimensioni, portata al polso di un agente del Carrington Institute. Si pu ripiegare per nasconderla e pu sparare fino a cinque colpi dall'effetto narcotico o letale.\n", + /*181*/ "Un dispositivo per attacchi serrati che in casi di emergenza pu essere usato anche come arma bench progettato come spray dermico per la somministrazione di sedativi. ネ bene ricordare che scaricare l'intero serbatoio pu avere conseguenze fatali.\n", + /*182*/ "Un pugnale da combattimento dalle grandi dimensioni contenente una fiala di veleno che si frantuma al lancio, eliminando la vittima in sei secondi al massimo. Una tipica arma dataDyne.\n", + /*183*/ "Una versione aggiornata della tradizionale granata. Pu essere lanciata con una miccia a quattro secondi o usata quale bomba di prossimit.\n", + /*184*/ "Una bomba a mano al neutrone dal raggio d'azione limitato. Pu essere fatta esplodere al momento dell'impatto o con esplosione di prossimit.\n", + /*185*/ "Una mina con miccia a breve tempo. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalit secondaria.\n", + /*186*/ "Una mina con miccia di prossimit. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalit secondaria.\n", + /*187*/ "Una mina da fare esplodere a distanza. Il comando di attivazione la sua modalit secondaria.\n", + /*188*/ "Un dispositivo di disturbo intenzionale di alta precisione, capace di simulare un comune guasto elettrico nel sistema a cui applicato.\n", + /*189*/ "Il laser viene portato al polso ed estremamente preciso. Pu emettere impulsi a lunga gittata o un fascio di energia costante e concentrata per breve gittata.\n", + /*190*/ "Stimolanti genetici realizzati per il combattimento. Quando vengono somministrati, sembrano rallentare lo scorrere del tempo per consentire una finestra di reazione.\n", + /*191*/ "La versione pi recente di una serie di sonde a 'luce lunare' che migliora l'illuminazione per produrre un'immagine pi chiara dell' ambiente circostante. Utilizza un algoritmo basato sullo spostamento dell'obiettivo per rilevare le possibili minacce.\n", + /*192*/ "Pur utilizzando la minima applicazione della tecnologia antigravitazionale, questo il pi avanzato dispositivo di spionaggio. Dotato di collegamento audio/video con funzione di registrazione e strumentazione di bordo per l'olografia spettroscopica.\n", + /*193*/ "Una sonda a breve raggio d'azione capace di vedere attraverso ogni materiale, persino il piombo, che produce una raffigurazione cromatica semplificata dell'ambiente.\n", + /*194*/ "Questa sonda utilizza la tecnica di scansione a raggi rossi modulati con dati ultrasonici per fornire un'immagine pi chiara dell'area circostante e identificare qualsiasi irregolarit strutturale. Inoltre pu localizzare i nemici grazie alla tecnologia di mimetizzazione o altre illusioni ottiche.\n", + /*195*/ "Utilizza le qualit di distorsione della luce di un cristallo alieno per creare un campo di riflesso attorno a chi lo indossa. Funziona solo se i disturbi cinetici entro il campo delimitato sono ridotti: basta sparare con una pistola per ristabilire la piena visibilit.\n", + /*196*/ "Un dispositivo di scansione visiva binoculare a lungo raggio. Viene mostrata un'immagine composita delle due fonti visive. Dotato di zoom.\n", + /*197*/ "Capace di eseguire l'interrogazione a distanza dei dati memorizzati, rispediti direttamente agli hacker dei computer dell'istituto. Una variante di questo dispositivo fornisce agli hacker un collegamento diretto al sistema locale.\n", + /*198*/ "Un potente sistema in grado di puntare qualsiasi cosa sia impostata nei parametri: persone, armi, oggetti e luoghi sono solo alcune delle innumerevoli possibilit.\n", + /*199*/ "Un apparecchio di scansione medica modificato che contiene i record pi aggiornati relativo allo stato di salute del Presidente, l'anamnesi e le terapie precedenti. ネ in grado di rilevare a distanza le funzioni vitali del Presidente, anche quando questi in mezzo alla folla.\n", + /*200*/ "Un puro e semplice scassinatore di casseforti. Apre le chiusure a codice elettronico generalmente in pochi secondi, sebbene la velocit vari da serratura a serratura.\n", + /*201*/ "Meraviglia della medicina Maian, capace di effettuare autodiagnosi e operazioni chirurgiche senza dover incidere. Uno svantaggio che funziona solo sui Maian; l'altro la mancanza di assistenza postoperatoria.\n", + /*202*/ "Una piccola carica di esplosivo al plastico, completa di temporizzatore sigillato a prova di manomissione e schegge rivestite di teflon. Molto pericoloso.\n", + /*203*/ "Come noto, si tratta di una bomba direzionale a fusione da piazzare in modo che la carica sia diretta verso il basso e possa sventrare i laboratori di ricerca della dataDyne. L'intero edificio sar inghiottito dalla voragine. \n", + /*204*/ "Una piccola cimice applicata al sistema di comunicazione. Trasporta il segnale ufficiale, permettendo il mantenimento del collegamento tra l'istituto e l'agente grazie a intense contromisure locali; parte integrante del sistema di comunicazione per la localizzazione dell'obiettivo.\n", + /*205*/ "Il funzionamento interno di questa cimice di estrema segretezza: il meccanismo di autodistruzione costituisce gran parte del dispositivo. Si dice che sia un esempio di comunicazione quantica molecolare, che spiega la fenomenale affidabilit del dispositivo usato sul campo.\n", + /*206*/ "Usa la tecnologia di comunicazione quantica per fornire informazioni accurate sugli obiettivi delle armi orbitanti, minimizzando cos i danni collaterali. La stessa tecnologia usata dalle cimici del Carrington Institute.\n", + /*207*/ "Dettagli della traiettoria di volo e dei codici di comunicazione e frequenze per l'Air Force One: anche la chiave attuale di decodifica.\n", + /*208*/ "Tutti i dati pertinenti alla ricerca sul fondo oceanico condotta da dataDyne sulle operazioni del vascello Pelagic II. I contenuti comprendono mappatura sonar, dati geologici, dati sui prodotti alieni, campioni da scafo, ecc.\n", + /*209*/ "L'ultima registrazione della personalit dell'intelligenza artificiale, autodefinita Dr. Caroll, prima della cancellazione della memoria e della ristrutturazione cerebrale. Uso per studi casistici e teorici. Moralmente incorrotto e dunque pericoloso. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un cocktail chimico che distorce la realt percepita dell'obiettivo. Il bene diventa male e viceversa; i nemici si confondono con gli amici. Un altro oscuro progetto di ricerca dell'Area 51 di Trent Easton.\n", + /*211*/ "Non il tuo normale abbigliamento. Indossalo per camuffarti.\n", + /*212*/ "PROSSIM.\n", + /*213*/ "A OROLOG.\n", + /*214*/ "TELECOM.\n", + /*215*/ "AUTOMATIC\n", + /*216*/ "IMPATTO\n", + /*217*/ "Missile Big King\n", + /*218*/ "Connettore Dati\n", + /*219*/ "Scanner Presidente\n", + /*220*/ "AutoChirurgo\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Ponte Com.\n", + /*223*/ "Microspia\n", + /*224*/ "Bersaglio\n", + /*225*/ "Piani Volo\n", + /*226*/ "Nastro Ricerca\n", + /*227*/ "Disco Backup\n", + /*228*/ "Tessera Magnetica\n", + /*229*/ "Cartella\n", + /*230*/ "Collana\n", + /*231*/ "ScanPresidente\n", + /*232*/ "Booster\n", + /*233*/ "ScannerX\n", + /*234*/ "HorizonScan\n", + /*235*/ "AmplObiett\n", + /*236*/ "In questa versione della TeleSpia il dispositivo di registrazione stato sostituito da un potente esplosivo plastico.\n", + /*237*/ "Questa versione della TeleSpia utilizza una tossina paralizzante del sistema nervoso per provocare una catatonia quasi istantanea.\n", + /*238*/ "La collana di Cassandra De Vries. Dotata di una chiave magnetica per accedere ad aree riservate. Il modello Mk3 funziona solo se Cassandra ancora viva. Classe di sicurezza AA-1 (gamma).", + /*239*/ "Collana sostitutiva di Cassandra De Vries. Utente: %s Password: %s\n", + /*240*/ "Scudo\n", + /*241*/ "Lo scudo protegge chi lo usa riconoscendo l'attacco e creando temporaneamente un campo magnetico concentrato per respingerlo. ネ dotato di riserva energetica limitata, quindi pu proteggere solo fino ad un certo punto. Normalmente gli scudi sono sempre attivi, sebbene questo scudo in particolare sembri un prototipo non funzionale semifinito.\n", + /*242*/ "Booster lotta\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_s.c b/src/files/lang/pal-beta/gun_str_s.c new file mode 100644 index 000000000..f228205c3 --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_s.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Cuenta de muertes", + /* 2*/ "Muerto una vez\n", + /* 3*/ "Muerto", + /* 4*/ "veces", + /* 5*/ "Cuenta de suicidios", + /* 6*/ "Desarmado\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (mirilla)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragn\n", + /* 18*/ "SuperDragn\n", + /* 19*/ "Vengador K7\n", + /* 20*/ "Cicln\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Calisto NTG\n", + /* 24*/ "Arma PC\n", + /* 25*/ "Escopeta\n", + /* 26*/ "Segadora\n", + /* 27*/ "Lanzacohetes\n", + /* 28*/ "Devastador\n", + /* 29*/ "Slayer\n", + /* 30*/ "Granada Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "R. Francotirador\n", + /* 33*/ "Ballesta\n", + /* 34*/ "Tranquilizador\n", + /* 35*/ "Cuchillo de combate\n", + /* 36*/ "Granada\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina de Tiempo\n", + /* 39*/ "Mina de Proximidad\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disfraz\n", + /* 44*/ "Cohete\n", + /* 45*/ "Cohete Buscador\n", + /* 46*/ "Cinto de Granadas\n", + /* 47*/ "L疽er\n", + /* 48*/ "Rayo\n", + /* 49*/ "Psicosis\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Especial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Testeador\n", + /* 59*/ "Visin Nocturna\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Decodificador\n", + /* 64*/ "Explosivos\n", + /* 65*/ "Esc疣er Rayos-X\n", + /* 66*/ "Paquete M馘ico\n", + /* 67*/ "Maleta\n", + /* 68*/ "Disfraz\n", + /* 69*/ "Esc疣er IR\n", + /* 70*/ "Rastreador-R\n", + /* 71*/ "Maletn\n", + /* 72*/ "Pildora Suicidio\n", + /* 73*/ "Disp. Ocultacin\n", + /* 74*/ "Reforzador\n", + /* 75*/ "C. Datos\n", + /* 76*/ "Esc. Horizonte\n", + /* 77*/ "Falcon 2 (+)\n", + /* 78*/ "Falcon 2 (s)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L.Cohetes\n", + /* 81*/ "Mina Prox.\n", + /* 82*/ "Psicosis\n", + /* 83*/ "Cuchillo\n", + /* 84*/ "DY357\n", + /* 85*/ "Disparo nico\n", + /* 86*/ "Fuego r疳ido\n", + /* 87*/ "Fuego en r畴aga\n", + /* 88*/ "Cosechar\n", + /* 89*/ "Fuego de escopeta\n", + /* 90*/ "Efecto carrete\n", + /* 91*/ "Lanzacohetes\n", + /* 92*/ "Cohete Dirigido\n", + /* 93*/ "Cohete Teledirigido\n", + /* 94*/ "Culatazo\n", + /* 95*/ "Cartuchos Explosivos\n", + /* 96*/ "Disparos Guiados\n", + /* 97*/ "Descarga de Cartucho\n", + /* 98*/ "Lanzagranadas\n", + /* 99*/ "Mina Lapa\n", + /*100*/ "Puetazo\n", + /*101*/ "Desarmar\n", + /*102*/ "Seguir Objetivo\n", + /*103*/ "Usar Mirilla\n", + /*104*/ "Descarga Medio Cartucho\n", + /*105*/ "Doble Explosin\n", + /*106*/ "Trituradora\n", + /*107*/ "Sedante\n", + /*108*/ "Inyeccin Letal\n", + /*109*/ "Cuchillada\n", + /*110*/ "Cuchillo Envenenado\n", + /*111*/ "Localizador de Objetivos\n", + /*112*/ "Muerte Instant疣ea\n", + /*113*/ "Reforzador\n", + /*114*/ "Revertir\n", + /*115*/ "Cartuchos Alto-Impacto\n", + /*116*/ "Ocultacin\n", + /*117*/ "Dejar como Centinela\n", + /*118*/ "Autodestruccin Proximidad\n", + /*119*/ "Detector de Trampas\n", + /*120*/ "Explosivo de Tiempo\n", + /*121*/ "Explosivo de Proximidad\n", + /*122*/ "Explosivo Remoto\n", + /*123*/ "Detonacin\n", + /*124*/ "Fusible 4 segundos\n", + /*125*/ "Pinball Proximidad\n", + /*126*/ "Detonacin temporal\n", + /*127*/ "Detonacin Proximidad\n", + /*128*/ "R畴aga 3 Cartuchos\n", + /*129*/ "Disparo Cargado\n", + /*130*/ "Agacharse\n", + /*131*/ "Infectar\n", + /*132*/ "Disparo con Ritmo\n", + /*133*/ "Descarga de Bajo Alcance\n", + /*134*/ "Detonacin por Impacto\n", + /*135*/ "Amplificador de Luz\n", + /*136*/ "C疥ara Mvil\n", + /*137*/ "Visin de Rayos-X\n", + /*138*/ "Imagen Termal\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo de Bloqueo\n", + /*141*/ "Conectar\n", + /*142*/ "Identificar Objetivos\n", + /*143*/ "Llevar Disfraz\n", + /*144*/ "Colocar Explosivos\n", + /*145*/ "Mira Telescpica\n", + /*146*/ "Silenciador\n", + /*147*/ "Extensin de Cartucho\n", + /*148*/ "Mira L疽er\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Industrias Chesluk\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Incluso desarmado, eres un adversario respetable. Usa tus puos para noquear a tus oponentes o desarmarles para usar sus armas contra ellos.\n", + /*156*/ "Precisa y digna de confianza, esta arma es el caballo de batalla de las operaciones del Instituto. Usa la mira l疽er para situar las balas con un efecto mortal, o golpea a los adversarios para noquearles.\n", + /*157*/ "Una Falcon 2 mejorada, con la ventaja aadida de que es silenciosa, pero mortal.\n", + /*158*/ "Una Falcon 2 mejorada, que cuenta con una mirilla duplicadora que te permite beneficiarte de la superior precisin de la Falcon.\n", + /*159*/ "Una pistola de tecnologa militar punta, usada en gran parte por fuerzas de paz. Cuenta con una ligera capacidad de zoom, y tiene un modo secundario de disparo de r畴aga de tres cartuchos.\n", + /*160*/ "Si ves a un Skedar viniendo hacia ti, es m疽 que posible que lleve una de 駸tas. Un amplio cargador y su can rayado hacen de esta pistola una formidable arma de mano, pero la descarga asesina viene del modo secundario: carga el disparo para fuerza extra al coste de unos cuantos cartuchos.\n", + /*161*/ "La DY357 de dataDyne es la m疽 poderosa arma de mano del mundo. Cada cartucho tiene un factor de penetracin increble y noquea al objetivo con el peso y fuerza del disparo. Se han hecho modelos de encargo para clientes importantes; se rumorea que el director de ANS, Trent Easton, tiene una variante baada en oro.\n", + /*162*/ "La DY357-LX fue diseada especialmente para el director de la ANS, Trent Easton. Adem疽 de tener una atractiva empuadura de genuina piel de tigre, este arma dorada incluye un can optimizado, lo que significa que cada bala siempre encuentra su objetivo con una fuerza mortfera.\n", + /*163*/ "El arma Maian est疣dar. Se trata de un arma flexible, una pistola que dispara tiros est疣dar o tiros explosivos sin que afecte a la capacidad del cargador.\n", + /*164*/ "Un cl疽ico de dataDyne, y excelentemente vendida, esta metralleta cuenta con un cargador de 32 cartuchos y una caracterstica especial: la habilidad de designar y fijar objetivos en la lnea de fuego. Convierte a un tirador medio en uno excelente, siempre que sea inteligente para manejar el arma. Ratio de disparo normal: 900 rpm.\n", + /*165*/ "El principal rifle de asalto del Instituto Carrington. Su gran alcance y el tamao de su cargador hacen de ella un arma muy til; el modo secundario permite al usuario moverse mientras hace zoom sobre un adversario. Ratio de disparo normal: 750 rpm.\n", + /*166*/ "Un rifle de asalto est疣dar con un giro diablico: cuando se activa el modo secundario, se convierte en una mina activada por proximidad que parece un arma. Ratio de disparo normal: 700 rpm.\n", + /*167*/ "Es una variante del rifle de asalto Dragn: en vez de un explosivo de proximidad, es un pequeo lanzagranadas. Es una excelente arma de apoyo. Ratio de disparo normal: 700 rpm.\n", + /*168*/ "Es otra pieza de alta tecnologa de dataDyne. Ordinariamente es un rifle de asalto con un cargador m疽 bien pequeo y una descarga poderosa, cuenta con un modo detector de trampas que muestra explosivos, armas de pared y peligros similares. Ratio de disparo normal: 950 rpm.\n", + /*169*/ "Diseado para ser usado por guardaespaldas, el Cicln ha sido adoptado por la Seguridad Presidencial debido a su excelente capacidad cuando es usado para 'suprimir'. En circunstancias extremas, puede m疽 que doblar el ritmo de disparo, descargando el cargador completo en un segundo. Ratio de disparo normal: 900 rpm. Descarga a 2000 rpm.\n", + /*170*/ "El arma secreta del Instituto Carrington. Dispara a un ritmo fenomenal y cuenta con una capacidad de cargador gigantesca. El modo secundario es un dispositivo de ocultacin que funciona con la municin del cargador. Es un arma devastadora. Ratio de disparo normal: 1100 rpm.\n", + /*171*/ "Se trata de otro ejemplo del excelente diseo de armas de fuego Maian. Puede disparar tiros est疣dar tan r疳ido como cualquier otro SMG, o puede disparar cartuchos de alta velocidad que pueden penetrar f當ilmente en objetos para encontrar al objetivo al otro lado. La nica desventaja con el modo de disparo secundario es que el ritmo de disparo es lento y la precisin sufre con la potencia del disparo. Ratio de disparo normal: 950 rpm., (s/f:300 rpm).\n", + /*172*/ "Una ametralladora diseada para parecer un PC port疸il. Disimulada, el arma no puede disparar, pero una vez activada, se despliega. El Arma PC no permite inspecciones detalladas; puede arrancar, pero la memoria es un cuarto de lo que se supone que es. Ratio de disparo normal: 1000 rpm.\n", + /*173*/ "Es un arma de dataDyne fabricada para fuerzas de seguridad. Su cargador de nueve cartuchos combinado con modos de disparo simple o doble hacen que se trate de una peligrosa arma de cerca.\n", + /*174*/ "Es un arma realmente aterradora en manos de alguien lo suficientemente fuerte para controlar su gran retroceso; para el resto, un arma difcil de manejar pero efectiva para despejar pasillos. Ratio de disparo normal: 1800 rpm.\n", + /*175*/ "Es un arma incmoda. Dispara tanto un cohete est疣dar como un cohete m疽 lento dirigido cuando se centra en el desafortunado objetivo.\n", + /*176*/ "Se trata de un sistema lanzador de granadas de largo alcance fabricado por dataDyne. El modo de disparo secundario recubre las granadas con una sustancia pegajosa; cuando se dispara la bomba, 駸ta se pega en las paredes o el techo. Tras unos cuantos segundos, se suelta para caer al suelo, donde detona.\n", + /*177*/ "Los Skedar disfrutan viendo a sus enemigos aterrorizados. Parece natural que cuenten con un cohete a control remoto como modo secundario de fuego en su lanzacohetes b疽ico, as pueden tener el placer de sentir los vanos intentos de escapar de su presa del proyectil que se acerca.\n", + /*178*/ "El rifle FarSight es un hbrido Maian de un dispositivo de esc疣er de Rayos-Xemparejado con un rifle que puede disparar a trav駸 de objetos. La mira puede centrarse en formas de vida, aunque el dispositivo no puede centrar tan r疳ido como se mueve el enemigo.\n", + /*179*/ "Con su poderoso zoom y sus balas de alta velocidad, este arma del Instituto Carrington es uno de los mejores rifles de francotirador jam疽 hechos. Ag當hate para una mayor precisin.\n", + /*180*/ "Esta ballesta es un ejemplo de 'pistola' de corto alcance, montada en la mueca de un agente del Instituto Carrington. Se pliega para ocultarla y puede disparar hasta cinco flechas, entre los m疽 usuales tiros sedantes o los dardos mortales.\n", + /*181*/ "Es un dispositivo de fuego r疳ido, que puede ser usado como arma en un caso de emergencia, pero que est diseado en principio como un inyector d駻mico de sedantes. Los usuarios son advertidos que una descarga completa de la reserva de droga puede ser fatal.\n", + /*182*/ "Es una versin ampliada del cuchillo de combate. Contiene una ampolla de veneno que se hace aicos cuando se lanza, dando al enemigo unos seis segundos de vida. Un arma que slo poda haber sido creada por dataDyne.\n", + /*183*/ "Es una versin mejorada de la fiel granada. Puede ser lanzada con un fusible de cuatro segundos, o ser usada como una bomba de proximidad que rebota.\n", + /*184*/ "Es una bomba de neutrones de mano que afecta a un 疵ea muy pequea. Puede detonar por impacto o ser fijada en detonacin por proximidad.\n", + /*185*/ "Es una mina con un corto fusible de tiempo. Tiene un sensor de deteccin/evaluacin que puede ser activado como modo secundario.\n", + /*186*/ "Es una mina con un sensor de proximidad. Tiene un sensor de deteccin/evaluacin que puede ser activado como modo secundario.\n", + /*187*/ "Es una mina que puede ser activada remotamente. El comando de activacin es el modo secundario.\n", + /*188*/ "Se trata de un dispositivo de bloqueo de 'ruido-blanco', capaz de simular alguno de los fallos el馗tricos m疽 comunes en cualquier sistema donde sea directamente colocado.\n", + /*189*/ "El l疽er est montado en la mueca y su precisin es mortal. Puede disparar 'pulsos' de larga distancia, o puede mantener una constante y concentrada corriente de energa en corto alcance.\n", + /*190*/ "Son estimulantes gen騁icos diseados para aplicar en combate. Cuando son administrados, parecen frenar el paso del tiempo para abrir una 'ventana de reaccin'.\n", + /*191*/ "Lo ltimo en la lnea de miras 'starlight' que mejoran la luz visible para producir una imagen clara del ambiente que la rodea. Usa un algoritmo de movimiento de objetivo para mostrar posibles trampas.\n", + /*192*/ "Usando la aplicacin m疽 pequea de la tecnologa anti-gravedad, esto es lo ltimo en dispositivos para fisgar. Tiene una conexin de audio/vdeo con funcin de grabacin y la posibilidad interna de holografiar espectroscpicamente.\n", + /*193*/ "Una mira de corto alcance que puede ver a trav駸 de algunos materiales, incluso el acero, produciendo una representacin crom疸ica simplificada del entorno.\n", + /*194*/ "Esta mira usa escaneo de infrarrojos modulados con datos ultrasnicos para ofrecer no slo una imagen clara del 疵ea colindante, sino tambi駭 la ubicacin de irregularidades estructurales. Tambi駭 puede localizar enemigos que empleen tecnologa de ocultacin u otros desconciertos pticos.\n", + /*195*/ "Usa las cualidades de 'salto de luz' de cristales aliengenas para crear un campo refractivo alrededor del portador. Funciona mientras slo existan pequeas perturbaciones kin騁icas en el campo lmite; el acto de disparar un arma es suficiente para causar que vuelva la visibilidad.\n", + /*196*/ "Es un esc疣er binocular de largo alcance. El visor muestra una imagen compuesta por las dos fuentes recibidas. Tambi駭 cuenta con funcin zoom.\n", + /*197*/ "Es capaz de consultar remotamente casi cualquier tipo de datos guardados, los cuales son directamente enviados a los 'hackers' del Instituto. Una variante de este dispositivo provee a los 'hackers' de conexin directa con los sistemas locales.\n", + /*198*/ "Es un poderoso sistema de rastreo que puede ser preparado para encajar con cualquier tipo de par疥etros: gente, armas, objetos y lugares son algunas de las posibilidades.\n", + /*199*/ "Se trata de un esc疣er m馘ico modificado que contiene la m疽 moderna informacin acerca del estado de salud del Presidente y una biblioteca de pasadas condiciones y tratamientos. Puede detectar las funciones vitales del Presidente a gran distancia, incluso cuando el objetivo est en medio de una multitud.\n", + /*200*/ "Abre cajas fuertes, simple y llanamente. Rompe cierres codificados electrnicamente, habitualmente en cuestin de segundos, aunque esto, por supuesto, depende de cada cerradura.\n", + /*201*/ "Esta maravilla m馘ica Maian puede auto-diagnosticar y realizar operaciones quirrgicas sin necesidad de cortes. Una desventaja es que slo funciona en Maian; la otra desventaja es que no tiene habilidad en el trato a los pacientes.\n", + /*202*/ "Se trata de una pequea carga de explosivo pl疽tico, completada con un temporizador sellado, e incrustada dentro de una capa de tefln con metralla. Muy desagradable.\n", + /*203*/ "Como ya eres consciente, se trata de una bomba de fusin direccional, que se coloca para que la carga se dirija hacia abajo. Esto arrasar los laboratorios de investigacin de dataDyne y causar que el resto del edificio se colapse y caiga al agujero.\n", + /*204*/ "Es un pequeo 'bicho' que se coloca en cualquier parte de un transmisor de comunicaciones. Se oculta en la seal oficial, permitiendo la conexin entre el Instituto y el agente aunque haya importantes contramedidas locales; para todas las posibilidades y propsitos, es parte de la localizacin de las comunicaciones de los objetivos.\n", + /*205*/ "El funcionamiento interno de este 'bicho' es alto secreto: gran parte del dispositivo pertenece al mecanismo de autodestruccin. Se especula que esto es un ejemplo de comunicacin molecular cu疣tica, lo cual explica la fenomenal fiabilidad del dispositivo cuando se usa.\n", + /*206*/ "Usa tecnologa de comunicacin cu疣tica para proveer informacin precisa de los objetivos a las armas orbitales, ayud疣dolas a minimizar los daos colaterales. La misma tecnologa es usada en los rastreadores del Instituto Carrington.\n", + /*207*/ "Son detalles de la trayectoria de vuelo y los cdigos de comunicacin y frecuencias del Air Force One: incluso las claves actuales de encriptacin.\n", + /*208*/ "Todos los datos relacionados con la investigacin en el fondo oce疣ico desarrollada por dataDyne con el navo de operaciones submarinas Pelagic II. El contenido incluye mapeados de snar, datos geolgicos, datos del artefacto aliengena, muestras del casco, etc.\n", + /*209*/ "Es la ltima grabacin del estado de personalidad de la inteligencia artificial, que se llama a s misma Dr. Caroll, antes de su lavado de cerebro y reestructura cerebral. Usada para el estudio del caso, contiene slo proyecciones tericas. Moralmente incorrupta, y por lo tanto peligrosa. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Se trata de un cctel qumico que cambia la realidad que el objetivo percibe. Lo bueno es malo, lo malo es bueno; enemigos y amigos intercambian sus lugares. Se trata de otra de las investigaciones 'oscuras' del チrea 51 de Trent Easton.\n", + /*211*/ "No es tu vestimenta habitual. Ll騅alo para pretender no ser t.\n", + /*212*/ "PROX.\n", + /*213*/ "TIEMPO\n", + /*214*/ "REMOTO\n", + /*215*/ "AUTOARMA\n", + /*216*/ "IMPACTO\n", + /*217*/ "Cohete Big King\n", + /*218*/ "Conector de Datos\n", + /*219*/ "Esc. Presidencial\n", + /*220*/ "AutoCirujano\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Contr. Comunicaciones\n", + /*223*/ "'Bicho' Rastreador\n", + /*224*/ "Amplificador\n", + /*225*/ "Planes de Vuelo\n", + /*226*/ "Cinta Investigacin\n", + /*227*/ "Copia de Seguridad\n", + /*228*/ "Llave Magn騁ica\n", + /*229*/ "Maletn\n", + /*230*/ "Collar\n", + /*231*/ "Esc疣er Pres.\n", + /*232*/ "Reforzador\n", + /*233*/ "Esc. R-X\n", + /*234*/ "Esc. Horiz.\n", + /*235*/ "Amplific.\n", + /*236*/ "En este modelo de la C疥ara Espa el dispositivo de grabacin ha sido reemplazado por un poderoso explosivo pl疽tico.\n", + /*237*/ "Este modelo de la C疥ara Espa usa una toxina nerviosa paralizadora para que los blancos queden en estado catatnico.\n", + /*238*/ "Es el collar de Cassandra De Vries. Est equipado con una llave de proximidad que permite el acceso a 疵eas restringidas. El modelo Mk3 slo funciona si el propietario est vivo. Clase de Seguridad AA-1 (gamma).", + /*239*/ "Collar de repuesto de Cassandra De Vries. Usuario: %s Clave: %s\n", + /*240*/ "Escudo\n", + /*241*/ "El escudo protege al usuario detectando un ataque y generando moment疣eamente un campo de fuerza concentrado para repeler el ataque. El escudo tiene una reserva de energa limitada, as que slo puede proteger al usuario hasta cierto punto. Los escudos suelen permanecer activos cuando el usuario los lleva, aunque este escudo en particular parece no ser funcional, como un prototipo no finalizado.\n", + /*242*/ "Reforzadores\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/impE.c b/src/files/lang/pal-beta/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-beta/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/impJ.c b/src/files/lang/pal-beta/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/pal-beta/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/impP.c b/src/files/lang/pal-beta/impP.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-beta/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_f.c b/src/files/lang/pal-beta/imp_str_f.c new file mode 100644 index 000000000..5890c8005 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - R饌ctiver les d馭enses automatiques\n\nIl y a des fusils automatiques situ駸 des points strat馮iques de l'Institut Carrington. Ils sont en ce moment d駸activ駸 mais si vous acc馘ez au panneau de contrle pour les brancher, ilsd駻outeront bon nombre d'ennemis.\n\n|Objectif 2: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 3: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.'\n\n|Objectif 4: - D騁ruire les informations sensibles\n\nLe coffre du bureau de Daniel contient un algorithme utilis il y a des ann馥s pour briser les codes de communications Maian. Il doit 黎re d騁ruit tout prix avant que la dataDyne ou les Skedars s'en emparent. Utilisez le laser pour percer la porte.\n\n|Objectif 5: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut.La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 1*/ "INSTITUT CARRINGTON\n", + /* 2*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - R饌ctiver les d馭enses automatiques\n\nIl y a des fusils automatiques situ駸 des points strat馮iques de l'Institut Carrington. Ils sont en ce moment d駸activ駸 mais si vous acc馘ez au panneau de contrle pour les brancher, ilsd駻outeront bon nombre d'ennemis.\n\n|Objectif 2: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 3: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.'\n\n|Objectif 4: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut.La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 2: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.'\n\n|Objectif 3: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut.La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R饌ctiver les d馭enses automatiques\n", + /* 6*/ "Lib駻er les otages\n", + /* 7*/ "R馗up駻er l'arme exp駻imentale\n", + /* 8*/ "D騁ruire les informations sensibles\n", + /* 9*/ "D駸activer la bombe\n", + /* 10*/ "Obtenir infos sensibles.\n", + /* 11*/ "Garde: \n", + /* 12*/ "Infos sensibles\n", + /* 13*/ "Infos sensibles\n", + /* 14*/ "Infos sensibles obtenues.\n", + /* 15*/ "Fusils automatiques activ駸.\n", + /* 16*/ "Trop d'otages abattus.\n", + /* 17*/ "Otages sauv駸.\n", + /* 18*/ "Informations sensibles d騁ruites.\n", + /* 19*/ "Carrington abattu.\n", + /* 20*/ "Joanna - nous sommes attaqu駸.\n", + /* 21*/ "Branchez les fusils - vite.\n", + /* 22*/ "Les Skedars ont pris des otages.\n", + /* 23*/ "Montez aux bureaux et sauvez-les.\n", + /* 24*/ "Ils utilisent un nouveau syst鑪e de bouclier.\n", + /* 25*/ "Foster travaillait sur une nouvelle arme qui \npeut 黎re utile.\n", + /* 26*/ "Bon sang. Mon bureau... S'ils y ont acc鑚...\n", + /* 27*/ "Allez-y en premier, Joanna, et d騁ruisez les fichiers.\n", + /* 28*/ "Il y a urgence. Ils ont plac une bombe.\n", + /* 29*/ "Trouvez-la et sortez de l'immeuble.\n", + /* 30*/ "Acc鑚 refus - Echec autorisation.\n", + /* 31*/ "Mesures d'urgences lanc馥s.\n", + /* 32*/ "Beau boulot, Joanna. C'est presque fini...\n", + /* 33*/ "La derni鑽e navette vous attend. Faites vite.\n", + /* 34*/ "Objet crucial d騁ruit.\n", + /* 35*/ "Les d馭enses automatiques vont m'aider.\n", + /* 36*/ "Voil sur quoi Foster travaillait.\n", + /* 37*/ "Je dois y aller doucement... Les otages\ncomptent sur moi.\n", + /* 38*/ "Au moins je ne saurai pas s'y je m'y\nprends mal.\n", + /* 39*/ "La bombe a explos...\n", + /* 40*/ "Vous recevez un Devastator.\n", + /* 41*/ "Pr黎e, Joanna? Nous ne pouvons pas faire attendre la d駘馮ation maian. Le Pr駸ident non plus, bien sr.\n", + /* 42*/ "Moi pr黎e? Pardon? Je suis pr黎e depuis une demi-heure! C'est moi qui vous attends!\n", + /* 43*/ "Vous savez ce que c'est, Joanna: il fallait que je me coiffe, que j'arrange mon costume...\n", + /* 44*/ "Vous avez combien de miroirs chez vous? Nerveux?\n", + /* 45*/ "Tr鑚. J'attends ce moment depuis si longtemps. L'Institut a 騁 fond pour faciliter les contacts entre humains et Maians. Et dans quelques minutes nous serons la Maison Blanche... Le r黐e deviendra alors r饌lit...\n", + /* 46*/ "D'o cela venait-il?\n", + /* 47*/ "Du rez-de-chauss馥...\n", + /* 48*/ "Il y en a qui ne savent pas s'arr黎er. Tout le monde doit 騅acuer!\n", + /* 49*/ "Mettez-vous l'abri! Je vais les retenir! Venez me chercher plus tard!\n", + /* 50*/ "J'esp鑽e juste que vous le pourrez.\n", + /* 51*/ "Il vous faut le r馗epteur.\n", + /* 52*/ "Connexion 騁ablie.\n", + /* 53*/ "D駻ivation syst鑪es de s馗urit.\n", + /* 54*/ "Virus t駘馗harg avec succ鑚.\n", + /* 55*/ "Moteurs du vaisseau activ駸.\n", + /* 56*/ "Connexion au vaisseau perdue.\n", + /* 57*/ "Obtenir r馗epteur.\n", + /* 58*/ "\n", + /* 59*/ "R馗epteur\n", + /* 60*/ "Un r馗epteur\n", + /* 61*/ "R馗epteur obtenu.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_g.c b/src/files/lang/pal-beta/imp_str_g.c new file mode 100644 index 000000000..97ed46123 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Geb舫de sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgednnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-Maschinengewehrs.Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Vernichten Sie die geheimen Informationen!\n\nIn Daniels Bro steht ein Safe, in dem der Algorithmus aufbewahrt wird, mit dem vor Jahren der Maianische Kommunikations-Code geknackt wurde. Diese Information muss vernichtet werden, bevor dataDyne oder die Skedar darauf zugreifen knnen. Setzen Sie den Laser ein, um sich den Weg durch die Trzu bahnen.\n\n|5. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 1*/ "CARRINGTON INSTITUT\n", + /* 2*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Geb舫de sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgednnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-Maschinengewehrs.Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|2. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-Maschinengewehrs.Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|3. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Aktivieren Sie die Verteidigungsanlagen!\n", + /* 6*/ "Befreien Sie die Geiseln!\n", + /* 7*/ "Finden Sie die experimentelle Waffe!\n", + /* 8*/ "Vernichten Sie die Informationen!\n", + /* 9*/ "Reprogrammieren Sie die Bombe!\n", + /* 10*/ "Vernichten Sie die Informationen!\n", + /* 11*/ "Geheime Informationen\n", + /* 12*/ "der Wache\n", + /* 13*/ "Geheime Informationen\n", + /* 14*/ "Geheime Informationen aufgenommen.\n", + /* 15*/ "Selbstschussanlage aktiviert.\n", + /* 16*/ "Es sind zu viele Opfer zu beklagen.\n", + /* 17*/ "Geiseln wurden gerettet.\n", + /* 18*/ "Die geheimen Informationen wurden zerstrt.\n", + /* 19*/ "Carrington wurde eliminiert.\n", + /* 20*/ "Joanna - Wir werden angegriffen!\n", + /* 21*/ "Aktivieren Sie die Selbstschussanlagen - RASCH!\n", + /* 22*/ "Die Skedar haben Geiseln genommen.\n", + /* 23*/ "Dringen Sie zu den Bros vor und retten Sie sie!\n", + /* 24*/ "Sie verwenden eine neuartige Form der Schildtechnologie.\n", + /* 25*/ "Foster hat an einer Waffe gearbeitet, die sich als \nntzlich erweisen knnte.\n", + /* 26*/ "Verdammt! Mein Bro... Wenn Sie die Daten finden...\n", + /* 27*/ "Gehen Sie zuerst dorthin und vernichten Sie die Daten, Jo.\n", + /* 28*/ "Die Dinge berstrzen sich. Sie haben eine Bombe versteckt.\n", + /* 29*/ "Finden Sie sie und schaffen Sie sie aus dem Geb舫de raus!\n", + /* 30*/ "Zugriff verweigert - Keine Zugriffsberechtigung.\n", + /* 31*/ "Notfallprogramm wurde initiiert.\n", + /* 32*/ "Ausgezeichnet, Joanna. Wir haben es fast geschafft...\n", + /* 33*/ "Das letzte Schiff wartet auf Sie. Beeilung!\n", + /* 34*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 35*/ "Die Selbstschussanlagen werden sehr hilfreich sein.\n", + /* 36*/ "Daran hat Foster also gearbeitet.\n", + /* 37*/ "Ich muss vorsichtig sein... Die Geiseln \nverlassen sich auf mich.\n", + /* 38*/ "Wenigstens werde ich es nie erfahren, \nwenn ich einen Fehler gemacht habe.\n", + /* 39*/ "Die Bombe ist detoniert...\n", + /* 40*/ "Sie haben einen Devastator erhalten.\n", + /* 41*/ "Sind Sie fertig, Joanna? Wir knnen die Maianische Delegation nicht warten lassen. Den Pr舖identen natrlich auch nicht.\n", + /* 42*/ "Ob ich fertig bin? Wovon reden Sie? Ich war schon vor einer halben Stunde fertig. SIE haben uns aufgehalten!\n", + /* 43*/ "Sie wissen ja, Joanna; Ich musste mich noch frisieren, und dann musste ich auch noch den passenden Anzug ausw臧len...\n", + /* 44*/ "Man sollte Sie von Spiegeln fernhalten. Nervs?\n", + /* 45*/ "Sehr sogar. Auf diesen Moment habe ich schon seit Jahren gewartet. Kontakt, friedlicher Kontakt zwischen Menschen und Maianern. Fr diesen Zweck wurde das Institut gegrndet. In wenigen Minuten sind wir im Wei゚en Haus, und die Zusammenkunft wird endlich stattfinden...\n", + /* 46*/ "Woher kam das?\n", + /* 47*/ "Es war im Erdgeschoss...\n", + /* 48*/ "Sieht so aus, als wsste jemand nicht, wann er genug hat. Wir mssen die Leute hier rausschaffen!\n", + /* 49*/ "Bringen Sie sich in Sicherheit! Ich halte sie auf; Sie knnen sp舩er zurckkommen und mich abholen!\n", + /* 50*/ "Zumindest hoffe ich, dass Sie das knnen.\n", + /* 51*/ "Sie bentigen das Data Uplink-Ger舩.\n", + /* 52*/ "Verbindung wurde hergestellt.\n", + /* 53*/ "Sicherheitssystem wird umgangen.\n", + /* 54*/ "Virus wurde erfolgreich kopiert.\n", + /* 55*/ "Der Antrieb des Schiffs wurde aktiviert.\n", + /* 56*/ "Verbindung zum Schiff wurde unterbrochen.\n", + /* 57*/ "Erlangen Sie das Data Uplink-Ger舩.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink-Ger舩\n", + /* 60*/ "Ein Data Uplink-Ger舩\n", + /* 61*/ "Data Uplink-Ger舩 aufgenommen.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_i.c b/src/files/lang/pal-beta/imp_str_i.c new file mode 100644 index 000000000..c57fe4024 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington - \n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Distruggi le informazioni riservate\n\nNell'ufficio di Daniel si trova una cassaforte che custodisce l'algoritmo che a suo tempo lui stesso us per decifrare il codice di comunicazione Maian. Devi distruggerlo prima che cada nelle mani della dataDyne o degli Skedar. Usa il laser per aprire un varco attraverso la porta.\n\n|Obiettivo 5: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanandosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Situazione - \n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington - \n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanadosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington - \n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 2: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 3: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanadosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva le difese automatiche\n", + /* 6*/ "Libera gli ostaggi\n", + /* 7*/ "Recupera l'arma sperimentale\n", + /* 8*/ "Distruggi le informazioni riservate\n", + /* 9*/ "Disattiva la bomba\n", + /* 10*/ "Procurati informazioni riservate\n", + /* 11*/ "Guardia:\n", + /* 12*/ "Informazioni riservate \n", + /* 13*/ "Informazioni riservate\n", + /* 14*/ "Prese informazioni riservate\n", + /* 15*/ "Attivate armi automatiche\n", + /* 16*/ "Uccisi troppi ostaggi\n", + /* 17*/ "Salvati gli ostaggi\n", + /* 18*/ "Distrutte informazioni riservate\n", + /* 19*/ "Carrington stato ucciso\n", + /* 20*/ "Joanna! Ci attaccano!\n", + /* 21*/ "Riattiva le armi! Presto!\n", + /* 22*/ "Gli Skedar hanno degli ostaggi!\n", + /* 23*/ "Corri negli uffici e salvali!\n", + /* 24*/ "Usano una nuova forma di tecnologia scudo.\n", + /* 25*/ "Foster lavorava ad una nuova arma \nche potrebbe tornare utile.\n", + /* 26*/ "Dannazione! Il mio ufficio... se entrano...\n", + /* 27*/ "Jo, va sul luogo e distruggi i file!\n", + /* 28*/ "La situazione disperata! Hanno messo una bomba!\n", + /* 29*/ "Trovala e allontanala dall'edificio!\n", + /* 30*/ "ACCESSO NEGATO - Autorizzazione non concessa\n", + /* 31*/ "Sono state adottate misure d'emergenza.\n", + /* 32*/ "Bel lavoro, Joanna. Ce l'abbiamo quasi fatta!\n", + /* 33*/ "L'ultima navetta ti sta aspettando! Presto!\n", + /* 34*/ "Distrutto strumento essenziale alla missione.\n", + /* 35*/ "La difesa automatica mi aiuter a venirne fuori!\n", + /* 36*/ "Ecco a cosa stava lavorando Foster!\n", + /* 37*/ "Devo andarci piano... Gli ostaggi \ncontano su di me.\n", + /* 38*/ "Cos almeno non sapr se sto facendo \nqualcosa che non va.\n", + /* 39*/ "La bomba esplosa...\n", + /* 40*/ "Hai trovato un Devastatore.\n", + /* 41*/ "Sei pronta, Joanna? Non possiamo far aspettare la delegazione Maian o il Presidente, naturalmente!\n", + /* 42*/ "Se sono pronta?! Sta scherzando? Ero gi pronta mezz'ora fa. Ci ha trattenuto lei!\n", + /* 43*/ "Ma lo sai com', Joanna... Dovevo assicurarmi di avere i capelli in ordine e poi... il vestito...\n", + /* 44*/ "Dovrebbero tenerla lontana dallo specchio! Nervoso?\n", + /* 45*/ "S, molto. Sono anni che aspetto questo momento. L'istituto stato fondato proprio per i contatti, i rapporti d'amicizia tra gli umani e i Maian... e tra pochi minuti saremo alla Casa Bianca... e finalmente arriver il grande momento...\n", + /* 46*/ "Da dove sono sbucati?\n", + /* 47*/ "Dal pianterreno... Sicuro!\n", + /* 48*/ "C' qualcuno che non capisce quando ora di finirla. Dobbiamo tirar fuori tutti di qui!\n", + /* 49*/ "Si metta in salvo! Me ne occupo io! Pu tornare a prendermi pi tardi!\n", + /* 50*/ "O almeno, lo spero!\n", + /* 51*/ "Ti serve il Connettore Dati!\n", + /* 52*/ "Connessione avvenuta\n", + /* 53*/ "Sistemi di sicurezza superati\n", + /* 54*/ "Il virus stato scaricato.\n", + /* 55*/ "I motori della navetta si sono accesi.\n", + /* 56*/ "Connessione alla navetta interrotta.\n", + /* 57*/ "Procurati Connettore Dati.\n", + /* 58*/ "\n", + /* 59*/ "C. Dati\n", + /* 60*/ "Connettore Dati\n", + /* 61*/ "Preso Connettore Dati.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_s.c b/src/files/lang/pal-beta/imp_str_s.c new file mode 100644 index 000000000..cbfef1d67 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Autom疸icas\n\nHay armas autom疸icas situadas en lugares estrat馮icos por todo el Instituto Carrington. En este momento est疣 inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudar疣 a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Cuatro: - Destruir Informacin Sensible\n\nEn la oficina de Daniel hay una caja fuerte donde se guardan los algoritmos que us para descifrar los cdigos de comunicacin Maian hace unos aos. Deben ser destruidos antes de que dataDyne o los Skedar se hagan con ellos. Usa el l疽er para abrir la puerta.\n\n|Objetivo Cinco: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 1*/ "INSTITUTO CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Autom疸icas\n\nHay armas autom疸icas situadas en lugares estrat馮icos por todo el Instituto Carrington. En este momento est疣 inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudar疣 a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Cuatro: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Dos: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Tres: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar defensas autom疸icas\n", + /* 6*/ "Liberar a los rehenes\n", + /* 7*/ "Recuperar arma experimental\n", + /* 8*/ "Destruir informacin sensible\n", + /* 9*/ "Desactivar bomba\n", + /* 10*/ "Obt駭 informacin sensible.\n", + /* 11*/ "Guarda:\n", + /* 12*/ "Informacin sensible\n", + /* 13*/ "Informacin sensible\n", + /* 14*/ "Informacin sensible obtenida.\n", + /* 15*/ "Arma autom疸ica activada.\n", + /* 16*/ "Demasiados rehenes muertos.\n", + /* 17*/ "Los rehenes han sido salvados.\n", + /* 18*/ "La informacin sensible ha sido destruida.\n", + /* 19*/ "Carrington ha muerto.\n", + /* 20*/ "Joanna, nos atacan.\n", + /* 21*/ "Activa las armas, deprisa.\n", + /* 22*/ "Los Skedar han tomado rehenes.\n", + /* 23*/ "Sube a las oficinas y s疝valos.\n", + /* 24*/ "Est疣 usando una nueva forma de tecnologa de escudo.\n", + /* 25*/ "Foster estaba trabajando en una nueva arma que \npodra ser til.\n", + /* 26*/ "Maldicin. Mi oficina... Si logran acceder...\n", + /* 27*/ "Ve all primero, Joanna, y destruye los ficheros.\n", + /* 28*/ "Las cosas van muy mal. Han puesto una bomba.\n", + /* 29*/ "Encu駭trala y s當ala del edificio.\n", + /* 30*/ "Acceso denegado: autorizacin fallida.\n", + /* 31*/ "Las medidas de emergencia se han activado.\n", + /* 32*/ "Bien hecho, Joanna. Estamos casi a salvo...\n", + /* 33*/ "La ltima nave te est esperando. Deprisa.\n", + /* 34*/ "Objeto crtico de la misin destruido.\n", + /* 35*/ "Las autodefensas me ayudar疣 de veras.\n", + /* 36*/ "As que esto es en lo que Foster estaba trabajando.\n", + /* 37*/ "Debo de ir con cuidado... Los prisioneros \ncuentan conmigo.\n", + /* 38*/ "Bien, al menos no sabr si estoy \nhaciendo algo mal.\n", + /* 39*/ "La bomba ha sido detonada...\n", + /* 40*/ "Has obtenido un Devastador.\n", + /* 41*/ "ソPreparada, Joanna? No podemos hacer esperar a la delegacin Maian. Ni al Presidente, por supuesto.\n", + /* 42*/ "ソPreparada? ソQu quieres decir? Llevo preparada desde hace media hora. \n。T nos has entretenido!\n", + /* 43*/ "Pero ya sabes cmo va, Joanna... Tengo que estar seguro de que mi pelo est bien, y tambi駭 estaba el traje...\n", + /* 44*/ "Deberan alejarte de los espejos. ソNervioso?\n", + /* 45*/ "Mucho. Llevo esperando este momento desde hace bastantes aos. El contacto, amigable, entre Humanos y Maian es para lo que se fund el Instituto. Y en unos minutos estaremos en la Casa Blanca, y ocurrir finalmente...\n", + /* 46*/ "ソDe dnde proviene ese ruido?\n", + /* 47*/ "Parece la planta baja...\n", + /* 48*/ "Parece que alguien no sabe cu疣do retirarse. 。Tenemos que sacar a todo el mundo fuera!\n", + /* 49*/ "。Largo! Les mantendr alejados... 。Puedes volver y recogerme luego!\n", + /* 50*/ "Al menos, espero que puedas.\n", + /* 51*/ "Necesitas el Conector de Datos.\n", + /* 52*/ "Se ha realizado la conexin.\n", + /* 53*/ "Saltando sistemas de seguridad.\n", + /* 54*/ "El virus ha sido descargado con 騙ito.\n", + /* 55*/ "Los motores de la nave han sido activados.\n", + /* 56*/ "La conexin con la nave se ha cortado.\n", + /* 57*/ "Obt駭 el Conector de Datos.\n", + /* 58*/ "\n", + /* 59*/ "Conector de Datos\n", + /* 60*/ "Un Conector de Datos\n", + /* 61*/ "Conector de Datos obtenido.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/junE.c b/src/files/lang/pal-beta/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/junJ.c b/src/files/lang/pal-beta/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/junP.c b/src/files/lang/pal-beta/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_f.c b/src/files/lang/pal-beta/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_g.c b/src/files/lang/pal-beta/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_i.c b/src/files/lang/pal-beta/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_s.c b/src/files/lang/pal-beta/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lamE.c b/src/files/lang/pal-beta/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lamJ.c b/src/files/lang/pal-beta/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lamP.c b/src/files/lang/pal-beta/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_f.c b/src/files/lang/pal-beta/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_g.c b/src/files/lang/pal-beta/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_i.c b/src/files/lang/pal-beta/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_s.c b/src/files/lang/pal-beta/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/leeE.c b/src/files/lang/pal-beta/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-beta/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/leeJ.c b/src/files/lang/pal-beta/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/pal-beta/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/leeP.c b/src/files/lang/pal-beta/leeP.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-beta/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_f.c b/src/files/lang/pal-beta/lee_str_f.c new file mode 100644 index 000000000..3e756fe4c --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs Maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Ouvrir les portes du hangar\n\nLe syst鑪e d'accostage est d'habitude contrl automatiquement: il a d 黎re d騅i depuis le pont. Ouvrez les portes en vous servant des commandes au-dessus du hangar et Elvis pourra accomplir son accostage.\n\n|Objectif 3: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte Maian, en vue d'une possible attaque.\n\n|Objectif 4: - Saboter les syst鑪es de propulsion\n\nLe plan d'assaut du croiseur risque d'馗houer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arr黎e.\n\n|Objectif 5: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs Maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte Maian, en vue d'une possible attaque.\n\n|Objectif 3: - Saboter les syst鑪es de propulsion\n\nLe plan d'assaut du croiseur risque d'馗houer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arr黎e.\n\n|Objectif 4: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs Maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez-le boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte Maian, en vue d'une possible attaque.\n\n|Objectif 3: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Annuler le syst鑪e de bouclier\n", + /* 6*/ "Ouvrir les portes du hangar\n", + /* 7*/ "Acc馘er aux syst鑪es de navigation\n", + /* 8*/ "Saboter les syst鑪es de propulsion\n", + /* 9*/ "Contrler le pont\n", + /* 10*/ "Boucliers du vaisseau baiss駸.\n", + /* 11*/ "Portes du hangar ouvertes.\n", + /* 12*/ "Elvis abattu.\n", + /* 13*/ "Infos de navigation r馗up駻馥s.\n", + /* 14*/ "Ascenseur activ.\n", + /* 15*/ "Skedars du hangar abattus.\n", + /* 16*/ "Joanna! Baisse les boucliers\net nous t'aiderons.\n", + /* 17*/ "Ouvre les portes du hangar pour que l'on puisse accoster.\n", + /* 18*/ "OK. Nous y sommes. Je te retrouve dans le hangar.\n", + /* 19*/ "Ca me fait plaisir de te voir, Joanna.\n", + /* 20*/ "Prends 軋. C'est utile, tu verras...\n", + /* 21*/ "Fusil d'assaut AR34 obtenu.\n", + /* 22*/ "Il faut monter. Je prends cet ascenseur.\nPrends l'autre.\n", + /* 23*/ "Moteurs coup駸.\n", + /* 24*/ "Attention Joanna! Ils sont en col鑽e je crois...\n", + /* 25*/ "Pont captur.\n", + /* 26*/ "Vas-y, Joanna. Je s馗urise le p駻im鑼re.\nOn se retrouve plus tard.\n", + /* 27*/ "Je dois abaisser les boucliers pour faire entrer\nElvis. J'ai besoin d'aide...\n", + /* 28*/ "Seules les portes de hangar sont sur le chemin.\n", + /* 29*/ "Cette machine contient les cartes stellaires Skedars.\n", + /* 30*/ "Si nous contrlons le pont, le vaisseau sera notre merci.\n", + /* 31*/ "Il est temps de monter...\n", + /* 32*/ "Oohhh... Dites-moi que ce n'est pas vrai.\n", + /* 33*/ "Et si. Regardez donc qui est avec vous, ma ch鑽e.\n", + /* 34*/ "Vous! Vous ne vous 黎es pas enfuie? Nous avions perdu votre trace...\n", + /* 35*/ "Leurrer les Skedars 騁ait plus difficile. Vous et Mr. Carrington avez pu vous en rendre compte.\n", + /* 36*/ "Attendez ici! Je vais cr馥r une diversion. Cela vous donnera l'occasion de partir. Faites vite ou nous mourrons.\n", + /* 37*/ "Pourquoi faites-vous tout 軋, Cassandra?\n", + /* 38*/ "Les Skedars m'ont utilis馥. Vous 黎es ma seule chance de me venger.\n", + /* 39*/ "Aaaaaahhhhhhh!!!\n", + /* 40*/ "C'est la premi鑽e fois que je vois une plan鑼e depuis l'espace... C'est magnifique.\n", + /* 41*/ "Hein?\n", + /* 42*/ "Je... Je ne le crois pas!\n", + /* 43*/ "Elvis? Qu'est-ce qu'il y a?\n", + /* 44*/ "O vas-tu?\n", + /* 45*/ "Nous devons descendre la surface! Suis-moi!\n", + /* 46*/ "Il faut sortir d'ici!\n", + /* 47*/ "Portes hangar ferm馥s - boucliers actifs.\n", + /* 48*/ "Objet crucial d騁ruit.\n", + /* 49*/ "Munitions 駱uis馥s - panneaux ne peuvent 黎re d騁ruits.\n", + /* 50*/ "Obtenir collier de De Vries.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Collier\n", + /* 53*/ "Collier de De Vries\n", + /* 54*/ "Collier de De Vries obtenu.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_g.c b/src/files/lang/pal-beta/lee_str_g.c new file mode 100644 index 000000000..3c1211581 --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zweider Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - ヨffnen Sie die Hangartore!\n\nDas Andock-System wird im Normalfall automatisch gesteuert. Es muss von der Brcke aus auf manuelle Bedienung umgestellt worden sein. ヨffnen Sie die Tore mit Hilfe der lokalen Kontrollinstrumente, um Elvis das Andocken zu ermglichen.\n\n|3. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|4. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu bernehmen, knnte schief gehen, wenn der Kommandant den vorgegebenen Kurs 舅dert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|5. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHIFF\n", + /* 2*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zweider Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|3. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu bernehmen, knnte schief gehen, wenn der Kommandant den vorgegebenen Kurs 舅dert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|4. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zweider Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|3. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Setzen Sie den Schild au゚er Betrieb!\n", + /* 6*/ "ヨffnen Sie die Hangartore!\n", + /* 7*/ "Nehmen Sie Einblick in die Sternenkarte!\n", + /* 8*/ "Sabotieren Sie die Antriebssysteme!\n", + /* 9*/ "Entern Sie die Brcke!\n", + /* 10*/ "Die Schilde wurden heruntergefahren.\n", + /* 11*/ "Die Hangartore wurden geffnet.\n", + /* 12*/ "Elvis wurde eliminiert.\n", + /* 13*/ "Navigationsinformation wurde erlangt.\n", + /* 14*/ "Aufzug wurde aktiviert.\n", + /* 15*/ "Alle Skedar im Hangarbereich wurden eliminiert.\n", + /* 16*/ "Joanna! Fahr die Schilde runter! Dann \nknnen wir dir helfen.\n", + /* 17*/ "Du musst die Hangartore ffnen, sonst knnen wir nicht andocken!\n", + /* 18*/ "Okay, wir sind drin. Wir treffen uns im Hangar.\n", + /* 19*/ "Es ist schn dich zu sehen, Joanna.\n", + /* 20*/ "Nimm das - das kannst du sicher gut gebrauchen...\n", + /* 21*/ "AR34 erhalten.\n", + /* 22*/ "Wir sollten nach oben gehen. Ich nehme diesen Aufzug; \nnimm du den anderen.\n", + /* 23*/ "Die Maschinen wurden unbrauchbar gemacht.\n", + /* 24*/ "Vorsicht Joanna! Ich glaube, sie sind jetzt sauer...\n", + /* 25*/ "Die Brcke wurde eingenommen.\n", + /* 26*/ "Du gehst voraus, Jo. Ich sichere diesen Teil des Schiffes. \nWir treffen uns sp舩er.\n", + /* 27*/ "Ich muss die Schilde runterfahren, damit Elvis \nlanden kann. Ich brauche jede Hilfe, die ich kriegen kann.\n", + /* 28*/ "Jetzt sind nur noch die Hangartore im Weg.\n", + /* 29*/ "In dieser Maschine werden die Sternenkarten gespeichert.\n", + /* 30*/ "Wenn wir die Brcke einnehmen, gehrt das Schiff uns.\n", + /* 31*/ "Wir sollten nach oben gehen...\n", + /* 32*/ "Oohhh... Ich hoffe, ich bin nicht da, wo ich befrchte zu sein.\n", + /* 33*/ "Es ist sogar noch schlimmer als das, Sch舩zchen. Und sieh nur, wer dir Gesellschaft leistet.\n", + /* 34*/ "Sie! Ich dachte, Sie w舐en entkommen. Wir konnten keine Spur von Ihnen finden.\n", + /* 35*/ "Ihr konntet mich zwar nicht finden, die Skedar konnten es sehr wohl. Das drfte dir und Mr. Carrington auch aufgefallen sein.\n", + /* 36*/ "Bleib da stehen! Ich werde sie ablenken. Das verschafft dir eine Chance, um hier rauszukommen. Nimm sie wahr, oder...\n", + /* 37*/ "Warum tun Sie das, Cassandra?\n", + /* 38*/ "Die Skedar haben mich benutzt. Du bietest mir die Mglichkeit, Rache zu nehmen.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. Das ist das erste Mal, dass ich einen anderen Planeten vom Weltall aus sehe. Wunderschn!\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "Ich... Ich glaube das nicht!\n", + /* 43*/ "Elvis? Was ist das?\n", + /* 44*/ "Wohin gehst du?\n", + /* 45*/ "Wir mssen die Oberfl臘he erreichen! Folge mir!\n", + /* 46*/ "Wir mssen hier raus!\n", + /* 47*/ "Hangartore verriegelt - Schilde sind noch aktiv.\n", + /* 48*/ "Wichtiges Objekt zerstrt.\n", + /* 49*/ "Die Konsolen knnen ohne Munition nicht zerstrt werden.\n", + /* 50*/ "Erlangen Sie De Vries Halskette!\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Halskette\n", + /* 53*/ "Cassandra De Vries Halskette\n", + /* 54*/ "De Vries Halskette aufgenommen.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_i.c b/src/files/lang/pal-beta/lee_str_i.c new file mode 100644 index 000000000..6840bbb1c --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Apri le porte dell'hangar\n\nIl sistema di attracco normalmente comandato in automatico e deve quindi essere disattivato dal ponte. Apri le porte azionando i comandi collocati sopra all'hangar, in modo che Elvis possa portare a termine la manovra di atterraggio.\n\n|Obiettivo 3: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 4: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave pu fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 5: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 1*/ "ASTRONAVE D'ASSALTO SKEDAR\n", + /* 2*/ "|Situazione - \n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave pu fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 4: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il sistema scudo\n", + /* 6*/ "Apri le porte dell'hangar\n", + /* 7*/ "Accedi al sistema di navigazione\n", + /* 8*/ "Sabotaggio al sistema motore\n", + /* 9*/ "Assumi il controllo del ponte\n", + /* 10*/ "Abbassati gli scudi dell'astronave.\n", + /* 11*/ "Aperte le porte dell'hangar.\n", + /* 12*/ "Elvis stato ucciso.\n", + /* 13*/ "Recuperate informazioni di navigazione.\n", + /* 14*/ "Attivato l'ascensore.\n", + /* 15*/ "Uccisi tutti gli Skedar nell'hangar.\n", + /* 16*/ "Avanti, Joanna! Disattiva gli scudi \ncos potremo aiutarti!\n", + /* 17*/ "Devi aprire le porte dell'hangar affinch possiamo attraccare!\n", + /* 18*/ "Bene, ci siamo! Ci vediamo nell'hangar.\n", + /* 19*/ "Vedo che stai bene, Joanna!\n", + /* 20*/ "Ecco, tieni! Ti sar utile!\n", + /* 21*/ "Preso il fucile d'assalto AR34.\n", + /* 22*/ "ネ ora di salire, forza! Io prendo quest'ascensore, \ntu prendi quell'altro.\n", + /* 23*/ "I motori sono stati disattivati.\n", + /* 24*/ "Attenta, Joanna! Mi sembrano leggermente irritati...\n", + /* 25*/ "Assunto controllo del ponte.\n", + /* 26*/ "Va avanti tu, Jo! Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 27*/ "Devo disattivare quegli scudi per far entrare Elvis. \nMi serve aiuto!\n", + /* 28*/ "Ora mi restano solo le porte dell'hangar.\n", + /* 29*/ "Questa macchina contiene la mappa astronomica Skedar.\n", + /* 30*/ "Se riusciamo a prendere il controllo del ponte, \nl'astronave sar nostra.\n", + /* 31*/ "ネ ora di salire...\n", + /* 32*/ "Ops... Sono sicuramente nel posto sbagliato al momento sbagliato.\n", + /* 33*/ "E c' di peggio, immagino! Guarda un po' chi c' qui!!!\n", + /* 34*/ "Lei! Pensavo che fosse riuscita a squagliarsela. ネ sparita senza lasciare traccia!!!\n", + /* 35*/ "Non mi avete trovato VOI! Ma dagli Skedar non si scappa, come avrete sicuramente notato tu e Carrington!\n", + /* 36*/ "Prendi questo e aspetta l! Se riesco a distrarli, avrai la possibilit di uscire di qua! Forza, usalo o moriremo entrambe!\n", + /* 37*/ "Perch lo fa, Cassandra?\n", + /* 38*/ "Gli Skedar mi hanno usata, Joanna e tu sei la mia unica possibilit di vendetta!\n", + /* 39*/ "Aaaaargh!!!\n", + /* 40*/ "Ehi! ネ la prima volta che vedo un altro pianeta dallo spazio! ネ fantastico!\n", + /* 41*/ "Eeeeeh?\n", + /* 42*/ "Non... non ci posso credere!\n", + /* 43*/ "Elvis? Che roba ?\n", + /* 44*/ "Che fai? Dove vai?\n", + /* 45*/ "Dobbiamo raggiungere la superficie! Dai, vieni!\n", + /* 46*/ "Dobbiamo uscire di qua!\n", + /* 47*/ "Porte hangar bloccate - Scudi ancora attivi.\n", + /* 48*/ "Distrutto strumento essenziale alla missione.\n", + /* 49*/ "Finite le munizioni - Impossibile distruggere quadro comandi.\n", + /* 50*/ "Collana di De Vries.\n", + /* 51*/ "Collana di\n", + /* 52*/ "Cassandra De Vries\n", + /* 53*/ "Collana di De Vries\n", + /* 54*/ "Presa collana di De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_s.c b/src/files/lang/pal-beta/lee_str_s.c new file mode 100644 index 000000000..cce07ea1e --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Abrir Puertas del Hangar\n\nNormalmente el sistema de atraque se controla de forma autom疸ica: debe ser anulado desde el puente. Abre las puertas usando los controles locales sin tener en cuenta el hangar, y Elvis podr terminar el ciclo de aterrizaje.\n\n|Objetivo Tres: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Cuatro: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debera salir mal si el Comandante altera el curso establecido. Manipula los motores para que as la nave se pare.\n\n|Objetivo Cinco: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 1*/ "NAVE DE ASALTO SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debera salir mal si el Comandante altera el curso establecido. Manipula los motores para que as la nave se pare.\n\n|Objetivo Cuatro: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar sistemas de escudo\n", + /* 6*/ "Abrir puertas del hangar\n", + /* 7*/ "Acceder a los sistemas de navegacin\n", + /* 8*/ "Sabotear los motores\n", + /* 9*/ "Ganar el control del puente\n", + /* 10*/ "Los escudos de la nave han sido bajados.\n", + /* 11*/ "Las puertas del hangar han sido abiertas.\n", + /* 12*/ "Elvis ha muerto.\n", + /* 13*/ "La informacin de navegacin ha sido recuperada.\n", + /* 14*/ "El ascensor ha sido activado.\n", + /* 15*/ "Todos los Skedar del hangar han muerto.\n", + /* 16*/ "Espera, Joanna. Baja los escudos y \nte podremos ayudar.\n", + /* 17*/ "Tienes que abrir las puertas del hangar\npara que podamos atracar.\n", + /* 18*/ "Vale, estamos dentro. Te ver en el hangar.\n", + /* 19*/ "Me alegro de verte, Joanna.\n", + /* 20*/ "Toma esto: lo encontrar疽 til...\n", + /* 21*/ "Rifle de asalto AR34 recibido.\n", + /* 22*/ "Es hora de avanzar. Yo tomar este ascensor; \nt toma el otro.\n", + /* 23*/ "Los motores han sido desactivados.\n", + /* 24*/ "。Cuidado, Joanna! Creo que les hemos hecho enfadar...\n", + /* 25*/ "El puente ha sido capturado.\n", + /* 26*/ "Ve delante, Joanna. Asegurar el permetro. \nNos vemos luego.\n", + /* 27*/ "Tengo que conseguir bajar esos escudos para \nmeter a Elvis. Necesito toda la ayuda que pueda obtener.\n", + /* 28*/ "Ahora slo las puertas del hangar nos molestan.\n", + /* 29*/ "Esta m痃uina contiene los mapas estelares Skedar.\n", + /* 30*/ "Si controlamos el puente, entonces la nave ser nuestra.\n", + /* 31*/ "Es hora de avanzar...\n", + /* 32*/ "Oohhh... Preferira no estar donde creo que estoy.\n", + /* 33*/ "Y es peor que eso, querida. Slo mira a qui駭 tienes por compaa.\n", + /* 34*/ "。T! Crea que habas escapado. No encontramos ningn rastro tuyo.\n", + /* 35*/ "No pudisteis encontrarme. Pero no me esconda de los Skedar, como t y el Sr. Carrington descubristeis.\n", + /* 36*/ "Eso es. 。Espera aqu! Crear una distraccin; te dar la oportunidad de escapar. レsala o moriremos ambas.\n", + /* 37*/ "ソPor qu haces esto, Cassandra?\n", + /* 38*/ "Los Skedar me usaron, Joanna. T eres mi mejor baza para vengarme.\n", + /* 39*/ "。。。Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Guau. ノsta es la primera vez que veo otro planeta desde el espacio. Es precioso.\n", + /* 41*/ "ソHmmmm?\n", + /* 42*/ "No... 。No puedo creerlo!\n", + /* 43*/ "ソElvis? ソQu pasa?\n", + /* 44*/ "ソDnde vas?\n", + /* 45*/ "。Tenemos que bajar a la superficie! 。Sgueme!\n", + /* 46*/ "。Tenemos que salir de aqu!\n", + /* 47*/ "Puertas del hangar cerradas - escudos todava activos.\n", + /* 48*/ "Objeto crtico de la misin destruido.\n", + /* 49*/ "Municin agotada - las consolas no pueden ser destruidas.\n", + /* 50*/ "Obt駭 el collar de De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collar\n", + /* 53*/ "Collar de De Vries\n", + /* 54*/ "Recogiste el collar de De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lenE.c b/src/files/lang/pal-beta/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lenJ.c b/src/files/lang/pal-beta/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lenP.c b/src/files/lang/pal-beta/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_f.c b/src/files/lang/pal-beta/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_g.c b/src/files/lang/pal-beta/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_i.c b/src/files/lang/pal-beta/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_s.c b/src/files/lang/pal-beta/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lipE.c b/src/files/lang/pal-beta/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-beta/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lipJ.c b/src/files/lang/pal-beta/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/pal-beta/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lipP.c b/src/files/lang/pal-beta/lipP.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-beta/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_f.c b/src/files/lang/pal-beta/lip_str_f.c new file mode 100644 index 000000000..a4a37b296 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de La mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - D騁ruire les archives informatiques\n\nToutes informations sur le crash et les 駘駑ents r馗up駻駸 d騁enue par le Secteur 51 doivent 黎re effac馥s de leurs fichiers. Le terminal est gard dans une pi鐵e ferm馥 en haut du couloir principal. Installez un virus gr稍e au r馗epteur et d騁ruisez le terminal. Si le virus infecte d'autres terminaux, leur r駸eau sera corrompu.\n\n|Objectif 2: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la pr駸ence de caisson dans lesquels des 馗hantillons organiques sont maintenus de tr鑚 basses temp駻atures. Il pense que ceux-ci servent geler des corps avant de les op駻er ou de les diss駲uer. Trouvez cette zone et confirmez la mort des trois autres passagers de l'appareil.\n\n|Objectif 3: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 4: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 5: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de La mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la pr駸ence de caisson dans lesquels des 馗hantillons organiques sont maintenus de tr鑚 basses temp駻atures. Il pense que ceux-ci servent geler des corps avant de les op駻er ou de les diss駲uer. Trouvez cette zone et confirmez la mort d'au moins un des trois passagers de l'appareil.\n\n|Objectif 2: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 3: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 4: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. La mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec nous communiquer l'existence d'un survivant. L'objectif de La mission est de sauver ce rescap.\n\n|Objectif 1: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 2: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 3: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtenir et utiliser l'uniforme de labo\n", + /* 10*/ "D騁ruire les archives informatiques\n", + /* 11*/ "Trouver les preuves de la conspiration\n", + /* 12*/ "Acc馘er au labo d'autopsie\n", + /* 13*/ "Sauver le rescap du crash\n", + /* 14*/ "Archives de recherche d騁ruites.\n", + /* 15*/ "Obtenir uniforme de labo.\n", + /* 16*/ "Laborantin: \n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme labo\n", + /* 19*/ "Uniforme labo obtenu.\n", + /* 20*/ "Acc鑚 syst鑪e contrle des portes refus.\n", + /* 21*/ "Acc鑚 syst鑪e contrle 馗lairage refus.\n", + /* 22*/ "Acc鑚 syst鑪e contrle s馗urit refus.\n", + /* 23*/ "Virus t駘馗harg dans la console.\n", + /* 24*/ "Obtenir r馗epteur.\n", + /* 25*/ "Laborantin: \n", + /* 26*/ "R馗epteur\n", + /* 27*/ "R馗epteur\n", + /* 28*/ "R馗epteur obtenu.\n", + /* 29*/ "Acc鑚 laboratoire: succ鑚.\n", + /* 30*/ "R馗epteur connect.\n", + /* 31*/ "Connexion r馗epteur coup馥.\n", + /* 32*/ "Obtenir carte medlab 2.\n", + /* 33*/ "Garde: \n", + /* 34*/ "Carte medlab 2\n", + /* 35*/ "Carte medlab 2\n", + /* 36*/ "Carte medlab 2 obtenue.\n", + /* 37*/ "Qui 黎es-vous?\n", + /* 38*/ "H! Mais c'est mes fringues!\n", + /* 39*/ "Au...au secours!\n", + /* 40*/ "Ne me tuez pas!\n", + /* 41*/ "Oh, mon Dieu! Une arme!\n", + /* 42*/ "Il y a un intrus dans le complexe.\n", + /* 43*/ "Donnez-moi mes v黎ements, sinon...!\n", + /* 44*/ "OK. Tu l'auras voulu, poulette!\n", + /* 45*/ "Donnez-moi mes fringues.\n", + /* 46*/ "Je n'ai pas beaucoup de temps!!!\n", + /* 47*/ "L'ennemi a d騁ect le costume.\n", + /* 48*/ "Virus d駛 t駘馗harg.\n", + /* 49*/ "Lancement t駘馗hargement virus.\n", + /* 50*/ "Enfin vous voil.\n", + /* 51*/ "Mais, vous n'黎es pas... ALEEEERTE!\n", + /* 52*/ "Armes interdites! Rangez votre arme.\n", + /* 53*/ "Je ne le r駱鑼erai pas: l稍hez votre arme!\n", + /* 54*/ "Bon. J'appelle la s馗urit.\n", + /* 55*/ "Tout le monde vous attendait...\n", + /* 56*/ "Personnel crucial abattu.\n", + /* 57*/ "Acc鑚 au labo d'autopsie impossible.\n", + /* 58*/ "H! Ce n'est pas Harry. C'est un intrus!\n", + /* 59*/ "Obtenir carte salle d'op駻ation.\n", + /* 60*/ "Garde: \n", + /* 61*/ "Carte salle d'op駻ation\n", + /* 62*/ "Carte salle d'op駻ation\n", + /* 63*/ "Carte salle d'op駻ation obtenue.\n", + /* 64*/ "Elvis a 騁 abattu.\n", + /* 65*/ "Sortez de l, bon Dieu!!\n", + /* 66*/ "Caisson 駘ev.\n", + /* 67*/ "Caisson abaiss.\n", + /* 68*/ "Equipement crucial d騁ruit.\n", + /* 69*/ "Obtenir scanner rayons X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner rayons X\n", + /* 72*/ "Scanner rayons X\n", + /* 73*/ "Scanner rayons X obtenu.\n", + /* 74*/ "Cible scanner accroch馥.\n", + /* 75*/ "ID cible confirm馥 - origine extraterr.\n", + /* 76*/ "Cible scanner perdue.\n", + /* 77*/ "Costume port.\n", + /* 78*/ "Les douches... Il faut convaincre quelqu'un\nde se s駱arer de son uniforme...\n", + /* 79*/ "La temp駻ature tombe... La salle de \ncryog駭isation est proche.\n", + /* 80*/ "L'air est recycl par ici... Le labo\n d'autopsie est par l.\n", + /* 81*/ "Le voil, Joanna! Faites vite!\n", + /* 82*/ "Quitter cette zone maintenant.\n", + /* 83*/ "Vous avez le droit d'黎re ici, vous?\n", + /* 84*/ "Nom de D...\n", + /* 85*/ "C'est une espionne!\n", + /* 86*/ "Pr騅enez les autres...\n", + /* 87*/ "Imposteur!\n", + /* 88*/ "Surcharge syst鑪es d'馗lairage.\n", + /* 89*/ "Entr馥 suppl駑entaire aux labos cr鳬e.\n", + /* 90*/ "Vous ne pourrez trouver un moyen d'investir \nla zone de recherche, croyez-moi. \nLa seule possibilit reste une cloison \nque j'ai rep駻馥 dans une salle apr鑚 \nl'entrept. Essayez de la faire sauter.\n", + /* 91*/ "Pas de probl鑪e. Et o sont \nles explosifs?\n", + /* 92*/ "Dans cette caisse.\n", + /* 93*/ "H h. Terrible.\n", + /* 94*/ "Au fait, l'entrept est bourr de vigiles. \nBien que ce ne soit pas votre genre, essayez \nde vous faire discr鑼e plutt que de buter \ntout le monde.\n", + /* 95*/ "Entendu. Autre chose, maestro?\n", + /* 96*/ "Cette caisse...\n", + /* 97*/ "Oui?\n", + /* 98*/ "Elle n'aime pas qu'on lui tire dessus.\n", + /* 99*/ "Parfait. Bon... On va dire que \nlui il m'駭erve...\n", + /*100*/ "Levez les mains et 馗artez-vous de \nl'extraterrestre.\n", + /*101*/ "Qu'est-ce que vous foutez ici? \nCette salle doit 黎re scell馥! \nNe connaissez-vous pas les consignes \nd'une autopsie?\n", + /*102*/ "Ne me faites pas r駱騁er, Docteur. Et \n騁eignez-moi ce laser tout de suite.\n", + /*103*/ "Le Directeur Easton en sera inform, \nmademoiselle.\n", + /*104*/ "Mais j'y compte bien, mon cher! \nJe me suis amus馥 dans sa jolie base et \nmaintenant je vole son joujou.\n", + /*105*/ "D馭enses automatiques neutralis馥s.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_g.c b/src/files/lang/pal-beta/lip_str_g.c new file mode 100644 index 000000000..c767dc5a6 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Lschen Sie die Computeraufzeichnungen!\n\nJegliche Informationen, welche die Area 51-Techniker aus dem Flugzeugwrack extrahieren konnten, muss aus ihren Datenbanken gelscht werden. Das Hauptterminal befindet sich in einem versperrten Raum am Ende eines der Korridore. Installieren Sie mit Hilfe des Data Uplink-Ger舩s einen Virus, zerstren Sie anschlie゚end das Terminal. Wenn der Virus in andere Terminals kopiert wird, ist mit hilfreichen Nebeneffekten zu rechnen.\n\n|2. Ziel: - Finden Sie einen Beweis fr die Verschwrung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Krper cryogenisiert, um sie in weiterer Folge fr Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|3. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Labortechniker-Ausrstung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|4. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|5. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 1*/ "AREA 51 - MEDI-LABORS\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Finden Sie einen Beweis fr die Verschwrung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Krper cryogenisiert, um sie in weiterer Folge fr Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|2. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Labortechniker-Ausrstung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|3. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|4. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Labortechniker-Ausrstung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|2. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|3. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Verkleiden Sie sich als Labortechniker!\n", + /* 10*/ "Vernichten Sie die Aufzeichnungen!\n", + /* 11*/ "Finden Sie den Beweis!\n", + /* 12*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 13*/ "Retten Sie den ワberlebenden!\n", + /* 14*/ "Aufzeichnungen zerstrt.\n", + /* 15*/ "Finden Sie die Laborkleidung!\n", + /* 16*/ "eines Technikers\n", + /* 17*/ "Laborkleidung\n", + /* 18*/ "Laborkleidung eines Technikers\n", + /* 19*/ "Laborkleidung aufgenommen.\n", + /* 20*/ "Zugriff auf den Trffnungsmechanismus verweigert.\n", + /* 21*/ "Zugriff auf die Beleuchtungskontrollen verweigert.\n", + /* 22*/ "Zugriff auf das Sicherheitssystem verweigert.\n", + /* 23*/ "Virus wurde installiert.\n", + /* 24*/ "Finden Sie das Data Uplink-Ger舩!\n", + /* 25*/ "des Labortechnikers\n", + /* 26*/ "Data Uplink-Ger舩\n", + /* 27*/ "Data Uplink-Ger舩\n", + /* 28*/ "Data Uplink-Ger舩 aufgenommen.\n", + /* 29*/ "Zutritt zum Labor erfolgreich durchgefhrt.\n", + /* 30*/ "Verbindung hergestellt.\n", + /* 31*/ "Verbindung abgebrochen.\n", + /* 32*/ "Erlangen Sie die Schlsselkarte fr Medlab 2.\n", + /* 33*/ "Medlab 2-Schlsselkarte\n", + /* 34*/ "der Wache\n", + /* 35*/ "Medlab 2-Schlsselkarte\n", + /* 36*/ "Medlab 2-Schlsselkarte aufgenommen.\n", + /* 37*/ "Wer sind Sie?\n", + /* 38*/ "Hey - Sie haben meine Ausrstung.\n", + /* 39*/ "Hilfe! Hilfe!\n", + /* 40*/ "Nicht schie゚en!\n", + /* 41*/ "Oh nein, eine Waffe!\n", + /* 42*/ "Es befindet sich ein Eindringling im Komplex.\n", + /* 43*/ "Geben Sie mir meine Ausrstung zurck, oder...!\n", + /* 44*/ "Na gut, Sie betteln ja frmlich darum!\n", + /* 45*/ "Geben Sie mir meine Ausrstung.\n", + /* 46*/ "Ich habe nicht viel Zeit!!!\n", + /* 47*/ "Der Feind hat die Tarnung durchschaut.\n", + /* 48*/ "Der Virus wurde bereits installiert.\n", + /* 49*/ "Virusinstallation initiiert.\n", + /* 50*/ "Sie haben es bis hierher geschafft.\n", + /* 51*/ "Hey, Sie sind nicht... ALARM! ALARM!\n", + /* 52*/ "Waffen sind hier nicht erlaubt. Legen Sie Ihre Waffe ab.\n", + /* 53*/ "Ich sage es nur einmal: Legen Sie die Waffe ab!\n", + /* 54*/ "Na gut, ich rufe die Security.\n", + /* 55*/ "Alle haben nur auf Sie gewartet...\n", + /* 56*/ "Wichtige Person eliminiert.\n", + /* 57*/ "Zugang zum Autopsie-Labor kann nicht erfolgen.\n", + /* 58*/ "Hey, das ist nicht Harry. Es ist ein Eindringling.\n", + /* 59*/ "Erlangen Sie die Schlsselkarte zum OP!\n", + /* 60*/ "OP-Schlsselkarte\n", + /* 61*/ "der Wache\n", + /* 62*/ "OP-Schlsselkarte\n", + /* 63*/ "OP-Schlsselkarte aufgenommen.\n", + /* 64*/ "Elvis wurde eliminiert.\n", + /* 65*/ "Mach, dass du hier rauskommst!\n", + /* 66*/ "Abwehreinheit wurde hochgefahren.\n", + /* 67*/ "Abwehreinheit wurde heruntergefahren.\n", + /* 68*/ "Wichtige Ausrstung wurde zerstrt.\n", + /* 69*/ "Finden Sie den Rntgen-Scanner.\n", + /* 70*/ "\n", + /* 71*/ "Rntgen-Scanner\n", + /* 72*/ "Rntgen-Scanner\n", + /* 73*/ "Rntgen-Scanner aufgenommen.\n", + /* 74*/ "Scanner-Ziel erfasst.\n", + /* 75*/ "Ziel-ID best舩igt - extraterrestrischer Ursprung.\n", + /* 76*/ "Scanner-Erfassung unterbrochen.\n", + /* 77*/ "Verkleidung wurde getragen.\n", + /* 78*/ "Die Duschen... Wenn ich jemanden berzeugen kann, \nsich von seiner Uniform zu trennen...\n", + /* 79*/ "Die Temperatur f舁lt... Du musst \nin der N臧e des Cryo-Raums sein.\n", + /* 80*/ "Die Luft riecht, als ob sie stark gefiltert worden ist.\n Das Autopsie-Labor muss nahe sein.\n", + /* 81*/ "Da ist er, Jo! Rasch, oder du kommst zu sp舩!\n", + /* 82*/ "Verlassen Sie sofort dieses Gebiet!\n", + /* 83*/ "Drfen Sie sich hier aufhalten?\n", + /* 84*/ "Was zum...\n", + /* 85*/ "Ein Spion!\n", + /* 86*/ "Warnt die anderen!\n", + /* 87*/ "Betrger!\n", + /* 88*/ "Beleuchtungssystem berladen.\n", + /* 89*/ "Alternativer Zugang zu den medizinischen Labors erschaffen.\n", + /* 90*/ "Das Problem ist, dass es keine Mglichkeit gibt, \nsich in die Forschungsabteilung zu schleichen. \nAber ich habe im Raum hinter den Lagerr舫men \neine brchige Stelle an der Wand markiert. \nAn dieser Stelle kannst du Sprengkrper anbringen, \num ein Loch in die Wand zu sprengen.\n", + /* 91*/ "Klingt nicht sehr problematisch. Wo \nfinde ich die Sprengkrper?\n", + /* 92*/ "In dieser Kiste.\n", + /* 93*/ "Reizend. Wirklich reizend.\n", + /* 94*/ "Ganz nebenbei: Die Lagerr舫me sind voller \nWachen. Es mag vielleicht nicht deinem Naturell \nentsprechen, aber du solltest dich eher \nanschleichen, als alles in die Luft zu jagen.\n", + /* 95*/ "Aber klar. Hast du noch weitere Perlen der Weisheit?\n", + /* 96*/ "Diese Kiste...\n", + /* 97*/ "Ja?\n", + /* 98*/ "Sie mag es nicht, wenn man auf sie schie゚t.\n", + /* 99*/ "Gro゚artig! Wenn ich jetzt noch mein Verlangen \nunterdrcken knnte, dich zu verpfeifen...\n", + /*100*/ "H舅de hoch und weg von dem Alien!\n", + /*101*/ "Was, zum Henker, glauben Sie hier zu tun? \nDieser Raum sollte versiegelt sein! \nWissen Sie gar nichts ber den Vorgang \nder Autopsie?\n", + /*102*/ "Fordern Sie es nicht heraus, Doktor. Und \nschalten Sie diesen Laser ab!\n", + /*103*/ "Direktor Easton wird ber diesen Vorfall \ninformiert werden, junge Dame.\n", + /*104*/ "Natrlich wird er darber informiert werden, \nSie Trottel. Immerhin bin ich gerade in seine \ngeheime Basis eingedrungen und stehle das Alien.\n", + /*105*/ "Automatische Verteidigung wurde deaktiviert.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_i.c b/src/files/lang/pal-beta/lip_str_i.c new file mode 100644 index 000000000..e11af76f8 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Distruggi i file di ricerca nel PC\n\nLe informazioni che i tecnici dell'Area 51 sono riusciti ad ottenere dai resti del disastro devono essere eliminate dalla loro banca dati. Il terminale centrale si trova in una stanza chiusa a chiave in fondo al corridoio principale. Installa un virus tramite il Connettore Dati e poi distruggi anche il computer. Se il virus viene propagato anche agli altri terminali potrebbe avere effetti formidabili.\n\n|Obiettivo 2: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unit di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unit possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unit e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 3: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 4: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 5: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 1*/ "AREA 51 - LABORATORI MEDICI\n", + /* 2*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unit di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unit possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unit e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 2: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 3: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 4: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 2: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 3: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Procurati travestimento da tecnico\n", + /* 10*/ "Distruggi i file nel PC\n", + /* 11*/ "Trova le prove della cospirazione\n", + /* 12*/ "Entra nel laboratorio autopsie\n", + /* 13*/ "Salva il sopravvissuto al disastro\n", + /* 14*/ "Distrutti file di ricerca\n", + /* 15*/ "Procurati camice\n", + /* 16*/ "Tecnico di laboratorio:\n", + /* 17*/ "Camice\n", + /* 18*/ "Camice\n", + /* 19*/ "Preso camice\n", + /* 20*/ "Negato accesso al sistema comando porte\n", + /* 21*/ "Negato accesso al sistema comando luci\n", + /* 22*/ "Negato accesso al sistema comando sicurezza\n", + /* 23*/ "Scaricato il virus\n", + /* 24*/ "Procurati Connettore Dati.\n", + /* 25*/ "Tecnico di laboratorio:\n", + /* 26*/ "C. Dati\n", + /* 27*/ "Connettore Dati\n", + /* 28*/ "Preso Connettore Dati.\n", + /* 29*/ "Accesso laboratorio: riuscito.\n", + /* 30*/ "Connettore Dati connesso.\n", + /* 31*/ "Connessione Connettore Dati interrotta.\n", + /* 32*/ "Procurati tessera lab.2\n", + /* 33*/ "Guardia:\n", + /* 34*/ "Tessera lab.2\n", + /* 35*/ "Tessera lab.2 \n", + /* 36*/ "Presa tessera lab.2\n", + /* 37*/ "Chi diavolo sei?\n", + /* 38*/ "Ehi, hai rubato il mio camice!\n", + /* 39*/ "Aiuto, aiuto!!!\n", + /* 40*/ "Non spararmi!\n", + /* 41*/ "Oh, maledizione! Una pistola!\n", + /* 42*/ "C' un intruso nel complesso!\n", + /* 43*/ "Ridammi il camice, altrimenti...\n", + /* 44*/ "Bene, l'hai voluto tu!\n", + /* 45*/ "Ridammi indietro il camice!\n", + /* 46*/ "Non ho molto tempo!!!\n", + /* 47*/ "Il nemico ha scoperto il travestimento.\n", + /* 48*/ "Il virus gi stato scaricato.\n", + /* 49*/ "Scaricamento virus in corso...\n", + /* 50*/ "Bene, finalmente sei qui!\n", + /* 51*/ "Ehi, ma tu non sei... SICUREZZA ALL'ERTA!\n", + /* 52*/ "Non sono ammesse pistole qui: posa quell'arma!\n", + /* 53*/ "Non fartelo ripetere: posa l'arma!\n", + /* 54*/ "Benissimo, chiamer la sicurezza!\n", + /* 55*/ "Ti stavamo giusto aspettando...\n", + /* 56*/ "Ucciso personale essenziale alla missione.\n", + /* 57*/ "Non puoi accedere al laboratorio.\n", + /* 58*/ "Ehi, non Harry! ネ un intruso!!!\n", + /* 59*/ "Procurati chiave sala operatoria.\n", + /* 60*/ "Guardia:\n", + /* 61*/ "Chiave sala operatoria\n", + /* 62*/ "Chiave sala operatoria\n", + /* 63*/ "Presa chiave sala operatoria.\n", + /* 64*/ "Elvis stato ucciso.\n", + /* 65*/ "Porta il tuo muso fuori di qua!\n", + /* 66*/ "Alzata unit di contenimento.\n", + /* 67*/ "Abbassata unit di contenimento.\n", + /* 68*/ "Distrutto strumento essenziale alla missione.\n", + /* 69*/ "Procurati scanner a raggi X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner a raggi X\n", + /* 72*/ "Scanner a raggi X\n", + /* 73*/ "Preso scanner a raggi X.\n", + /* 74*/ "Localizzato obiettivo scanner\n", + /* 75*/ "Obiettivo identificato: extraterrestre\n", + /* 76*/ "Perso obiettivo scanner\n", + /* 77*/ "Indossato il travestimento\n", + /* 78*/ "Le docce... Se riuscissi a convincere \nqualcuno a cedermi il camice...\n", + /* 79*/ "La temperatura sta scendendo: devi essere \nvicino alla sala criogena.\n", + /* 80*/ "Qui c' un forte ricircolo d'aria: devi essere \nvicino al laboratorio autopsie.\n", + /* 81*/ "Eccolo, Jo! Fa presto o sar troppo tardi!\n", + /* 82*/ "Abbandona subito quest'area.\n", + /* 83*/ "Che diavolo ci fai qua?\n", + /* 84*/ "Santo...\n", + /* 85*/ "ネ una spia, dannazione!\n", + /* 86*/ "Avverti gli altri...\n", + /* 87*/ "Impostore!\n", + /* 88*/ "Sistema di illuminazione in sovraccarico\n", + /* 89*/ "Creato ingresso alternativo ai laboratori\n", + /* 90*/ "Il tuo problema che non esiste nessun \nmodo per infiltrarsi nel reparto ricerca. \nL'unica possibilit un sottile tratto \ndi muro che ho contrassegnato nella stanza \ndietro ai magazzini. Lo potrai abbattere \ncon un po' di esplosivo.\n", + /* 91*/ "Non mi pare si tratti di un problema! \nDov' l'esplosivo?\n", + /* 92*/ "In quella cassa!\n", + /* 93*/ "Fantastico... veramente!\n", + /* 94*/ "Ah, a proposito... i magazzini brulicano \ndi guardie. Magari contro la tua natura, \nma cerca di insinuarti in mezzo a loro, \npiuttosto che far saltar per aria tutto!\n", + /* 95*/ "Certamente! Altri consigli illuminanti?\n", + /* 96*/ "Quella cassa...\n", + /* 97*/ "Allora?\n", + /* 98*/ "Meglio non sparargli contro...\n", + /* 99*/ "Bravo ragazzo! Cercher di resistere \nal piacere di denunciarti alle forze \ndi sicurezza della base...\n", + /*100*/ "Mani in alto e sta lontano dall'alieno.\n", + /*101*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /*102*/ "Non se lo faccia ripetere, Dottore! \nSpenga subito quel laser!\n", + /*103*/ "Il direttor Easton lo verr \na sapere, signorina!\n", + /*104*/ "Certo che lo verr a sapere, idiota! \nSono riuscita ad entrare nella sua base \nsegretissima e ora sto anche rubando il \nsuo alieno. E non lo deve venire a \nsapere?! Fammi ridere!!!\n", + /*105*/ "Disattivate difese automatiche\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_s.c b/src/files/lang/pal-beta/lip_str_s.c new file mode 100644 index 000000000..5670c9992 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Destruir Registros Cientficos del Ordenador\n\nCualquier informacin y objetos que los t馗nicos del チrea 51 hayan sido capaces de sacar de los restos del choque deben ser suprimidos de sus bases de datos. La terminal del banco principal est en una habitacin cerrada en el corredor principal. Instala un virus usando el Conector de Datos, y destruye la propia terminal. Si el virus es instalado en otras terminales, producir efectos beneficiosos.\n\n|Objetivo Dos: - Localizar Evidencias de Conspiracin\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras org疣icas a temperaturas extremadamente bajas. ノl cree que se pueden usar para congelar cuerpos criog駭icamente antes de la ciruga o la diseccin. Encuentra este area y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Tres: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Cuatro: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Cinco: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 1*/ "チREA 51 - LABORATORIOS MノDICOS\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Localizar Evidencias de Conspiracin\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras org疣icas a temperaturas extremadamente bajas. ノl cree que se pueden usar para congelar cuerpos criog駭icamente antes de la ciruga o la diseccin. Encuentra este area y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Dos: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Tres: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Cuatro: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Dos: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Tres: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtener y usar el disfraz de t馗nico\n", + /* 10*/ "Destruir registros del ordenador\n", + /* 11*/ "Localizar evidencias de conspiracin\n", + /* 12*/ "Acceder al laboratorio de autopsias\n", + /* 13*/ "Rescatar al Superviviente del impacto\n", + /* 14*/ "Registros cientficos destruidos.\n", + /* 15*/ "Obt駭 ropas de laboratorio.\n", + /* 16*/ "T馗nico:\n", + /* 17*/ "Ropas de laboratorio\n", + /* 18*/ "Ropas de laboratorio\n", + /* 19*/ "Ropas de laboratorio obtenidas.\n", + /* 20*/ "Acceso al sistema de control de puertas denegado.\n", + /* 21*/ "Acceso al sistema de control de luces denegado.\n", + /* 22*/ "Acceso al sistema de control de seguridad denegado.\n", + /* 23*/ "Virus descargado en la consola.\n", + /* 24*/ "Obt駭 el Conector de Datos.\n", + /* 25*/ "T馗nico:\n", + /* 26*/ "C. Datos\n", + /* 27*/ "Conector de Datos\n", + /* 28*/ "Conector de Datos obtenido.\n", + /* 29*/ "Has accedido al laboratorio con 騙ito.\n", + /* 30*/ "Conector de Datos en marcha.\n", + /* 31*/ "Conexin perdida.\n", + /* 32*/ "Obt駭 llave magn騁ica del lab. 2.\n", + /* 33*/ "Guarda:\n", + /* 34*/ "Llave magn騁ica del lab. 2\n", + /* 35*/ "Llave magn騁ica del lab. 2\n", + /* 36*/ "Llave magn騁ica del lab. 2 obtenida.\n", + /* 37*/ "ソY t qui駭 eres?\n", + /* 38*/ "Hey. Tienes mis ropas.\n", + /* 39*/ "。Socorro, socorro!\n", + /* 40*/ "。No me dispares!\n", + /* 41*/ "。Oh, Dios mo, un arma!\n", + /* 42*/ "Hay un intruso en el complejo.\n", + /* 43*/ "Dame mis ropas... 。o ver疽!\n", + /* 44*/ "Vale. 。T lo has querido!\n", + /* 45*/ "Dame mis ropas.\n", + /* 46*/ "。。。No tengo tiempo!!!\n", + /* 47*/ "El enemigo ha descubierto el disfraz.\n", + /* 48*/ "El virus ya ha sido descargado.\n", + /* 49*/ "Iniciando descarga del virus.\n", + /* 50*/ "As que por fin has llegado.\n", + /* 51*/ "Hey, t no eres... 。ALERTA, SEGURIDAD!\n", + /* 52*/ "No se permiten armas aqu. Deja tu arma.\n", + /* 53*/ "No te lo dir de nuevo. Tira tu arma.\n", + /* 54*/ "Vale. Estoy llamando a seguridad.\n", + /* 55*/ "Todos te est疣 esperando...\n", + /* 56*/ "Ha muerto personal crtico de la misin.\n", + /* 57*/ "No puedes acceder al laboratorio de autopsias.\n", + /* 58*/ "Hey, 駸e no es Harry. Es un intruso.\n", + /* 59*/ "Obt駭 llave magn騁ica del quirfano.\n", + /* 60*/ "Guarda:\n", + /* 61*/ "Llave magn騁ica del quirfano\n", + /* 62*/ "Llave magn騁ica del quirfano\n", + /* 63*/ "Llave magn騁ica del quirfano obtenida.\n", + /* 64*/ "Elvis ha muerto.\n", + /* 65*/ "。Salgamos de aqu!\n", + /* 66*/ "Contenedor subido.\n", + /* 67*/ "Contenedor bajado.\n", + /* 68*/ "Equipo crtico de la misin destruido.\n", + /* 69*/ "Obt駭 Esc疣er de Rayos-X.\n", + /* 70*/ "\n", + /* 71*/ "Esc疣er de Rayos-X\n", + /* 72*/ "Esc疣er de Rayos-X\n", + /* 73*/ "Esc疣er de Rayos-X obtenido.\n", + /* 74*/ "Sujeto de escaneo adquirido.\n", + /* 75*/ "ID. del sujeto confirmada - Origen E.T.\n", + /* 76*/ "Conexin del esc疣er perdida.\n", + /* 77*/ "El disfraz ha sido usado.\n", + /* 78*/ "Las duchas... Ahora, si pudiera convencer a alguien \npara irme con su uniforme...\n", + /* 79*/ "La temperatura est bajando... Debes de estar \ncerca de la sala de criogenizacin.\n", + /* 80*/ "El aire est fuertemente reciclado aqu: debo\n estar cerca del laboratorio de autopsias.\n", + /* 81*/ "。Ah est, Joanna! 。Deprisa o ser tarde!\n", + /* 82*/ "Salga de este 疵ea.\n", + /* 83*/ "ソDebe estar dentro?\n", + /* 84*/ "Por t...\n", + /* 85*/ "。Es una espa!\n", + /* 86*/ "Avisa a los otros...\n", + /* 87*/ "。Impostora!\n", + /* 88*/ "Sistemas de luz sobrecargados.\n", + /* 89*/ "Creada entrada alternativa a los laboratorios.\n", + /* 90*/ "El problema que tienes es que no hay ningn \nmodo de entrar en la seccin de desarrollo. \nEl nico camino disponible es una parte \nd饕il del muro que he marcado en la \nhabitacin tras los almacenes. Puede ser \ndestruida con explosivos.\n", + /* 91*/ "No me parece un problema. ソDnde\nest疣 esos explosivos?\n", + /* 92*/ "En esa caja.\n", + /* 93*/ "Bien. Muy bien.\n", + /* 94*/ "Eso s, los almacenes est疣 repletos de \nguardas. Puede ir contra tu naturaleza, \npero intenta evitarlos antes de hacer \nsaltar todo por los aires.\n", + /* 95*/ "Ciertamente. ソAlguna otra perla de sabidura?\n", + /* 96*/ "Esa caja...\n", + /* 97*/ "ソS?\n", + /* 98*/ "No le gusta que le disparen.\n", + /* 99*/ "Genial. Ahora, si slo pudiera luchar contra \nel impulso de informar de 駘 a Seguridad...\n", + /*100*/ "Levantad las manos y alejaos del\naliengena.\n", + /*101*/ "ソQu demonios te crees que est疽 haciendo? \n。Esto se supone que es una sala sellada! \nソNo sabes nada acerca de los procedimientos \nde autopsia?\n", + /*102*/ "No me haga repetrselo, Doctor. Y \napague ese l疽er.\n", + /*103*/ "El Director Easton se enterar de esto, \njovencita.\n", + /*104*/ "Por supuesto que va a enterarse, idiota. \nHe logrado entrar en su base ultra-secreta, \ny ahora le estoy robando su aliengena.\n", + /*105*/ "Defensas Autom疸icas Desactivadas.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lueE.c b/src/files/lang/pal-beta/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-beta/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-beta/lueJ.c b/src/files/lang/pal-beta/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/pal-beta/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lueP.c b/src/files/lang/pal-beta/lueP.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-beta/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_f.c b/src/files/lang/pal-beta/lue_str_f.c new file mode 100644 index 000000000..56f6e3d5c --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Installer D駻oute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont prot馮馥s par des mouchards, ce qui neutralisera notre connexion d鑚 que vous entrerez dans la base. Pour y rem馘ier, placez un D駻oute-Comms sur l'antenne satellite pr鑚 de l'entr馥.\n\n|Objectif 3: - D駸activer robots Interceptors au sol\n\nUne fois le radar coup, les robots Interceptors vous poseront un probl鑪e. D騁ruisez un maximum d'unit駸 au sol. Notre derni鑽e photo satellite en r騅鑞e deux mais il risque d'y en avoir ,plus.\n\n|Objectif 4: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 5: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Installer D駻oute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont prot馮馥s par des mouchards, ce qui neutralisera notre connexion d鑚 que vous entrerez dans la base. Pour y rem馘ier, placez un D駻oute-Comms sur l'antenne satellite pr鑚 de l'entr馥.\n\n|Objectif 3: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 4: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 3: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Couper le radar d'interception\n", + /* 10*/ "Installer D駻oute-Comms sur antenne\n", + /* 11*/ "D駸activer robots Interceptors au sol\n", + /* 12*/ "Acc馘er l'ascenseur du hangar\n", + /* 13*/ "Contacter l'espion de l'IC\n", + /* 14*/ "Obtenir grenades.\n", + /* 15*/ "Dr. Caroll: \n", + /* 16*/ "Grenade\n", + /* 17*/ "Une grenade\n", + /* 18*/ "Grenade obtenue.\n", + /* 19*/ "Robot Interceptor d駸activ.\n", + /* 20*/ "Tous robots Interceptors d駸activ駸.\n", + /* 21*/ "Obtenir D駻oute-Comms.\n", + /* 22*/ "Dr. Caroll: \n", + /* 23*/ "D駻oute-Comms\n", + /* 24*/ "D駻oute-Comms\n", + /* 25*/ "D駻oute-Comms obtenu.\n", + /* 26*/ "Mouchard de communication plac correctement.\n", + /* 27*/ "Mouchard de communication mal plac.\n", + /* 28*/ "Antenne d騁ruite.\n", + /* 29*/ "Antenne lev馥.\n", + /* 30*/ "Antenne baiss馥.\n", + /* 31*/ "Obtenir carte d'ascenseur.\n", + /* 32*/ "Dr. Caroll: \n", + /* 33*/ "Carte d'ascenseur\n", + /* 34*/ "Carte d'ascenseur\n", + /* 35*/ "Carte d'ascenseur obtenue.\n", + /* 36*/ "Acc鑚 ascenseur refus - carte requise.\n", + /* 37*/ "Carte accept馥 - ascenseur op駻ationnel.\n", + /* 38*/ "Ascenseur op駻ationnel.\n", + /* 39*/ "Hangar p駭騁r.\n", + /* 40*/ "Agent de l'IC contact.\n", + /* 41*/ "Radar d'interception coup.\n", + /* 42*/ "Objet crucial d騁ruit.\n", + /* 43*/ "Porte principale ouverte.\n", + /* 44*/ "Porte principale ferm馥.\n", + /* 45*/ "Acc鑚 refus.\n", + /* 46*/ "Explosif plac.\n", + /* 47*/ "Intrus d騁ect - syst鑪es s馗urit branch駸.\n", + /* 48*/ "Obtenir explosif.\n", + /* 49*/ "Dr. Caroll: \n", + /* 50*/ "Explosifs\n", + /* 51*/ "Explosifs\n", + /* 52*/ "Explosifs obtenus.\n", + /* 53*/ "Le radar d'interception est contrl depuis\nce bunker.\n", + /* 54*/ "Voil l'antenne, mais... Je ne peux pas lancer\nun mouchard si haut!\n", + /* 55*/ "L'ascenseur du hangar est derri鑽e \ncette grande porte.\n", + /* 56*/ "Attention ne pas descendre n'importe qui, Agent Dark - \nvous vous approchez de ma position.\n", + /* 57*/ "Terminaux d'acc鑚 ascenseur d騁ruits.\n", + /* 58*/ "Regardez Joanna: notre agent infiltr \ndans le Secteur 51 a pu nous faire \nparvenir ceci.\n", + /* 59*/ "C'est votre point d'entr馥: un h駘iport \nabandonn en bordure de la base.\n", + /* 60*/ "L'ascenseur vers les hangars et le \npoint de rendez-vous est derri鑽e ce \nmur. Attention aux gardes.\n", + /* 61*/ "Voici l'antenne de communication. Fixez \nun D駻oute-Comms et nous pourrons vous \nparler dans la base. Encore une fois, \nfaites attention la r駸istance.\n", + /* 62*/ "Oh, mon Dieu!\n", + /* 63*/ "Voici notre ami. Il ne semble pas bless \nbien qu'il n'ait pas encore repris ses \nesprits. De toute 騅idence, les chirurgiens \nont presque achev leurs pr駱arations \net vont bientt entamer la dissection.\n", + /* 64*/ "Mais qui 騁ait...?\n", + /* 65*/ "Des questions? Non? Bon. En route \nvers le hangar.\n", + /* 66*/ "Agent Dark, Journal de mission, H: 10:28.\nJe suis sur le point d'acc馘er au \nSecteur 51.\n", + /* 67*/ "Agent Dark! Par ici!\n", + /* 68*/ "Vous voil, vous! Je pensais \nque...\n", + /* 69*/ "Que quoi?\n", + /* 70*/ "Que vous 騁iez mort. Vous devez \navoir une bonne 騁oile pour 黎re \nencore en vie.\n", + /* 71*/ "Je m'occupais de votre boulot mal fait.\n", + /* 72*/ "Mal quoi?\n", + /* 73*/ "Vous vouliez peut-黎re que ce garde vous \ndescende? Tr鑚 bien. Je peux en appeler un \nautre si vous voulez...\n", + /* 74*/ "Bon, bon. Laissez tomber. Je pr騅iens \nl'Institut de notre rencontre.\n", + /* 75*/ "Objet 騁ranger d騁ect - s馗urit alert馥.\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_g.c b/src/files/lang/pal-beta/lue_str_g.c new file mode 100644 index 000000000..34ed974c4 --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhrmechanismen geschtzt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, mssen Sie einen Antennenzugang an der Satellitenschssel installieren.\n\n|3. Ziel: - Setzen Sie die Abfang-Roboter au゚er Kraft!\n\nAuch wenn das Radar deaktiviert ist, stellen die Abfang-Roboter eine ernsthafte Gefahr dar. Besch臈igen Sie so viele Einheiten, wie mglich. Unser letztes Satellitenphoto zeigt zwei Maschinen, aber es knnen sich noch weitere Roboter am Gel舅de befinden.\n\n|4. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|5. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 1*/ "AREA 51 - UMGEBUNG\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhrmechanismen geschtzt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, mssen Sie einen Antennenzugang an der Satellitenschssel installieren.\n\n|3. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|4. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|3. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Schalten Sie die Radar-Funktion ab!\n", + /* 10*/ "Installieren Sie den Antennen-Zugang!\n", + /* 11*/ "Setzen Sie die Roboter au゚er Kraft!\n", + /* 12*/ "Betreten Sie den Hangar-Aufzug!\n", + /* 13*/ "Kontaktieren Sie unseren Agenten!\n", + /* 14*/ "Erlangen Sie die Granaten!\n", + /* 15*/ "Dr. Carolls\n", + /* 16*/ "Granate\n", + /* 17*/ "Eine Granate\n", + /* 18*/ "Granate aufgenommen.\n", + /* 19*/ "Abfang-Roboter au゚er Kraft gesetzt.\n", + /* 20*/ "Alle Abfang-Roboter wurden au゚er Kraft gesetzt.\n", + /* 21*/ "Erlangen Sie den Antennenzugang.\n", + /* 22*/ "Dr. Carolls\n", + /* 23*/ "Antennenzugang\n", + /* 24*/ "Antennenzugang\n", + /* 25*/ "Antennenzugang aufgenommen.\n", + /* 26*/ "Antennenzugang wurde korrekt platziert.\n", + /* 27*/ "Antennenzugang wurde nicht korrekt platziert.\n", + /* 28*/ "Antenne wurde zerstrt.\n", + /* 29*/ "Antenne wurde hochgefahren.\n", + /* 30*/ "Antenne wurde heruntergefahren.\n", + /* 31*/ "Finden Sie die Schlsselkarte fr den Aufzug!\n", + /* 32*/ "Dr. Carolls\n", + /* 33*/ "Schlsselkarte\n", + /* 34*/ "Schlsselkarte\n", + /* 35*/ "Schlsselkarte aufgenommen.\n", + /* 36*/ "Zutritt zum Aufzug verweigert. - Schlsselkarte wird bentigt.\n", + /* 37*/ "Schlsselkarte akzeptiert - Aufzug ist einsatzbereit.\n", + /* 38*/ "Der Aufzug ist einsatzbereit.\n", + /* 39*/ "Hangar wurde betreten.\n", + /* 40*/ "Agent wurde kontaktiert.\n", + /* 41*/ "Radar-Funktion wurde abgeschaltet.\n", + /* 42*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 43*/ "Haupttor wurde geffnet.\n", + /* 44*/ "Haupttor wurde geschlossen.\n", + /* 45*/ "Zugriff verweigert.\n", + /* 46*/ "Sprengkrper wurde platziert.\n", + /* 47*/ "Eindringling erfasst - ワberwachungssystem ist online.\n", + /* 48*/ "Erlangen Sie die Sprengs舩ze!\n", + /* 49*/ "Dr. Carolls\n", + /* 50*/ "Sprengs舩ze\n", + /* 51*/ "Sprengs舩ze\n", + /* 52*/ "Sprengs舩ze aufgenommen.\n", + /* 53*/ "Die Radar-Funktion wird von diesem Bunker aus \ngesteuert.\n", + /* 54*/ "Da ist die Antenne, aber... Ich kann den ワberbrcker \nnicht so hoch hinaufwerfen.\n", + /* 55*/ "Der Aufzug ist auf der anderen Seite \ndieses Tores.\n", + /* 56*/ "Hoffe, du hast keinen nervsen Zeigefinger, Agent Dark - \nDu n臧erst dich meiner Position.\n", + /* 57*/ "Zugang zu den Terminals wurde zerstrt.\n", + /* 58*/ "Okay, Joanna, sehen Sie sich das an. Unser \nMann in der Basis konnte uns diese Information \nzuspielen.\n", + /* 59*/ "Hier gelangen Sie ins Innere; ein verlassenes Helipad \nam Rande der Basis.\n", + /* 60*/ "Der Aufzug zu den Hangars und der \nTreffpunkt befinden sich hinter dieser Mauer. \nAchten Sie auf die Wachen!\n", + /* 61*/ "Da ist die Kommunikationsantenne. \nInstallieren Sie den Antennenzugang, damit wir \nmit Ihnen kommunizieren knnen. Nochmals: \nAchten Sie auf Feindbewegungen!\n", + /* 62*/ "Oh nein!\n", + /* 63*/ "Da ist unser Freund. Es scheint, als w舐e er \nunversehrt, obwohl er bis jetzt noch nicht \nwieder bei Bewusstsein ist. Sieht so aus, als \nh舩ten die Chirurgen die ersten Tests bereits \nabgeschlossen. Wahrscheinlich beginnen sie gleich \nmit der Sektion.\n", + /* 64*/ "Aber wer war...?\n", + /* 65*/ "Noch Fragen? Nein? Gut. Machen Sie sich auf \nden Weg zum Hangar.\n", + /* 66*/ "Agent Dark Missions-Logbuch, 10.28 Uhr. Entgegen \nmeiner inneren Stimme betrete ich nun die \nArea 51.\n", + /* 67*/ "Agent Dark! Hier drben!\n", + /* 68*/ "Da bist du ja! Ich habe mich schon gefragt, \nob...\n", + /* 69*/ "Ob was?\n", + /* 70*/ "Ob du entdeckt worden bist. Ehrlich gesagt: \nWenn das deine Art ist zu arbeiten, dann wundert \nes mich, dass du bis jetzt berlebt hast.\n", + /* 71*/ "Ich musste ja die Lcher in deiner Abwehr stopfen.\n", + /* 72*/ "Die Lcher in meiner Abwehr?\n", + /* 73*/ "Verzeihung, ich wusste nicht, dass du es bevorzugen \nwrdest, wenn er auf dich geschossen h舩te. Aber wenn \ndu mchtest, kann ich ein paar Wachen rufen.\n", + /* 74*/ "Okay, okay, vergiss es. Ich lasse das Institut wissen, \ndass wir uns gefunden haben.\n", + /* 75*/ "Fremdkrper erfasst - Security wurde alarmiert.\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_i.c b/src/files/lang/pal-beta/lue_str_i.c new file mode 100644 index 000000000..350663cc4 --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Disattiva gli intercettatori di terra\n\nSebbene il radar d'intercettazione aerea sia disattivato, gli intercettatori di terra continueranno ad essere un problema. Eliminane quanti pi possibile: la nostra ultima foto satellitare ne mostrava due a terra, ma potrebbero essercene anche altri.\n\n|Obiettivo 4: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 5: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 1*/ "AREA 51 - ESTERNO\n", + /* 2*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 4: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 3: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Disattiva radar d'intercettazione aerea\n", + /* 10*/ "Piazza una cimice sull'antenna\n", + /* 11*/ "Disattiva gli intercettatori di terra\n", + /* 12*/ "Penetra nell'ascensore dell'hangar\n", + /* 13*/ "Mettiti in contatto con l'agente segreto\n", + /* 14*/ "Procurati granate.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granata\n", + /* 17*/ "Granata\n", + /* 18*/ "Presa una granata.\n", + /* 19*/ "Disattivato l'intercettatore\n", + /* 20*/ "Disattivati tutti gli intercettatori\n", + /* 21*/ "Procurati cimice\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Cimice\n", + /* 24*/ "Cimice\n", + /* 25*/ "Presa cimice\n", + /* 26*/ "Cimice piazzata correttamente\n", + /* 27*/ "Cimice in posizione errata\n", + /* 28*/ "L'antenna stata distrutta.\n", + /* 29*/ "Alzata l'antenna\n", + /* 30*/ "Abbassata l'antenna\n", + /* 31*/ "Procurati tessera ascensore\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Tessera ascensore\n", + /* 34*/ "Tessera ascensore\n", + /* 35*/ "Presa tessera ascensore\n", + /* 36*/ "Negato accesso ascensore - Serve tessera\n", + /* 37*/ "Tessera valida - Ascensore in funzione\n", + /* 38*/ "L'ascensore in funzione.\n", + /* 39*/ "Raggiunto l'hangar\n", + /* 40*/ "Incontrato l'agente segreto\n", + /* 41*/ "Disattivato radar d'intercettazione aerea\n", + /* 42*/ "Distrutto strumento essenziale alla missione\n", + /* 43*/ "Aperto cancello principale\n", + /* 44*/ "Chiuso cancello principale\n", + /* 45*/ "Accesso negato\n", + /* 46*/ "Piazzato esplosivo\n", + /* 47*/ "Allarme intrusione - Sistema di sicurezza operativo\n", + /* 48*/ "Procurati esplosivo\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Esplosivo\n", + /* 51*/ "Esplosivo\n", + /* 52*/ "Preso esplosivo\n", + /* 53*/ "Il radar d'intercettazione aerea \ncomandato da quel bunker!\n", + /* 54*/ "Ecco l'antenna, ma... non posso mica lanciare \nuna cimice fin lass!\n", + /* 55*/ "L'ascensore dell'hangar oltre \nquel portone.\n", + /* 56*/ "Vacci piano con quel grilletto, Agente Dark: \nti stai avvicinando alla mia postazione.\n", + /* 57*/ "Distrutti i terminali di accesso all'ascensore\n", + /* 58*/ "Bene, Joanna, guarda qua! Il nostro \nagente nell'Area 51 riuscito a \nprocurarci questo!\n", + /* 59*/ "Questo ~e il tuo punto d'ingresso: un \neliporto deserto ai margini della base.\n", + /* 60*/ "L'ascensore per gli hangar e il punto \nd'incontro sono oltre quel muro: \nattenzione a queste guardie!\n", + /* 61*/ "Qui c' un'antenna di comunicazione: \nattaccaci una cimice in modo che possiamo \nrimanere in contatto mentre sei dentro la \nbase. Ripeto, attenta alle guardie!\n", + /* 62*/ "Oh, maledizione!\n", + /* 63*/ "Ecco il nostro amico: sembra illeso \nfisicamente, sebbene non abbia ancora \nripreso conoscenza. A prima vista \nsembra che i chirurghi abbiano finito \ni loro esami preliminari e che stiano \nper iniziare il sezionamento.\n", + /* 64*/ "Ma chi era...\n", + /* 65*/ "Qualche domanda? No? Benissimo. Forza! \nVa nell'hangar!\n", + /* 66*/ "Missione dell'Agente Dark, ore 10.28. \nSecondo le mie valutazioni sto per \nentrare nell'Area 51.\n", + /* 67*/ "Agente Dark! Da questa parte!\n", + /* 68*/ "Eccoti, finalmente! Stavo iniziando \na chiedermi se...\n", + /* 69*/ "Se cosa?!\n", + /* 70*/ "Se magari non t'eri gi fatto scoprire! \nE francamente se questo il modo in cui \nlavori, sono sorpresa che tu abbia \nresistito per pi di cinque minuti!\n", + /* 71*/ "Stavo solo cercando di coprirti le spalle!\n", + /* 72*/ "Le MIE spalle?\n", + /* 73*/ "Scusa, non m'ero accorto che volevi \nche ti sparasse. Posso chiamare \nqualche altra guardia se vuoi!\n", + /* 74*/ "Va bene, va bene. Lascia perdere! \nComunicher all'istituto che ci \nsiamo incontrati.\n", + /* 75*/ "Rilevato oggetto strano - Sicurezza allertata\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_s.c b/src/files/lang/pal-beta/lue_str_s.c new file mode 100644 index 000000000..23b13d13e --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeado de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterr疣eas del チrea 51 est疣 protegidas de dispositivos de escucha, lo que significa que nuestra conexin se romper tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parablica cercana a la entrada.\n\n|Objetivo Tres: - Desactivar Robots Interceptores en tierra\n\nIncluso con el radar interceptor a駻eo apagado, los propios robots interceptores ser疣 un problema. Destruye tantas unidades en tierra como sea posible; nuestra ltima foto de sat駘ite muestra dos en tierra, pero quiz haya m疽.\n\n|Objetivo Cuatro: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 1*/ "チREA 51 - EXTERIOR\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeado de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterr疣eas del チrea 51 est疣 protegidas de dispositivos de escucha, lo que significa que nuestra conexin se romper tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parablica cercana a la entrada.\n\n|Objetivo Tres: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cuatro: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeado de ordenadores.\n\n|Objetivo Dos: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Apagar el radar interceptor a駻eo\n", + /* 10*/ "Colocar disp. de com. en antena\n", + /* 11*/ "Desac. todos los robots interceptores\n", + /* 12*/ "Acceder al ascensor del hangar\n", + /* 13*/ "Contactar con el espa del IC\n", + /* 14*/ "Obt駭 granadas.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granada\n", + /* 17*/ "Una granada\n", + /* 18*/ "Granada obtenida.\n", + /* 19*/ "Robot interceptor desactivado.\n", + /* 20*/ "Todos los robots interceptores est疣 desactivados.\n", + /* 21*/ "Obt駭 controlador de comunicaciones.\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Contr. comunicaciones\n", + /* 24*/ "Controlador de comunicaciones\n", + /* 25*/ "Controlador de comunicaciones obtenido.\n", + /* 26*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 27*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 28*/ "La antena ha sido destruida.\n", + /* 29*/ "Antena elevada.\n", + /* 30*/ "Antena bajada.\n", + /* 31*/ "Obt駭 llave magn騁ica del ascensor.\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Llave magn騁ica del ascensor\n", + /* 34*/ "Llave magn騁ica del ascensor\n", + /* 35*/ "Llave magn騁ica del ascensor obtenida\n", + /* 36*/ "Acceso al ascensor denegado - llave magn騁ica requerida.\n", + /* 37*/ "Llave magn騁ica aceptada - ascensor operativo.\n", + /* 38*/ "El ascensor est completamente operativo.\n", + /* 39*/ "Has accedido al hangar.\n", + /* 40*/ "Has encontrado al agente del IC.\n", + /* 41*/ "Radar interceptor a駻eo apagado.\n", + /* 42*/ "Objeto crtico de la misin destruido.\n", + /* 43*/ "La puerta principal ha sido abierta.\n", + /* 44*/ "La puerta principal ha sido cerrada.\n", + /* 45*/ "Acceso denegado.\n", + /* 46*/ "El explosivo ha sido colocado.\n", + /* 47*/ "Intruso detectado - sistema de seguridad activo.\n", + /* 48*/ "Obt駭 explosivos.\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Explosivos\n", + /* 51*/ "Explosivos\n", + /* 52*/ "Explosivos obtenidos.\n", + /* 53*/ "El radar interceptor a駻eo es controlado desde \nese bnker.\n", + /* 54*/ "Ah est la antena, pero... 。no puedo lanzar un \n'bicho' a esa altura!\n", + /* 55*/ "El ascensor del hangar est al otro lado \nde esa gran puerta.\n", + /* 56*/ "Cuidado con el dedo en el gatillo, Agente Dark - \nlo est疽 acercando a mi posicin.\n", + /* 57*/ "Terminales de acceso del ascensor destruidos.\n", + /* 58*/ "Vale, Joanna, echa un vistazo a esto. \nNuestro agente en el チrea 51 fue capaz \nde sacar esto para nosotros.\n", + /* 59*/ "ノste es tu punto de entrada. Un helipuerto \ndesierto en el borde de la base.\n", + /* 60*/ "El ascensor que baja a los hangares y el \npunto de encuentro est疣 detr疽 de ese \nmuro... Cuidado con esos guardas.\n", + /* 61*/ "Aqu est la antena de comunicaciones. \nColoca un 'bicho' para que podamos contactar \ncuando est駸 dentro de la base. De nuevo, \ncuidado con el personal hostil.\n", + /* 62*/ "。Oh, Dios mo!\n", + /* 63*/ "Aqu est nuestro amigo. Parece que no \nest fsicamente daado, aunque no ha \nrecuperado la consciencia todava. Por lo \nque parece, los cirujanos casi han hecho \nsus pruebas preliminares y comenzar疣 \npronto con la diseccin.\n", + /* 64*/ "ソPero qui駭 fue...?\n", + /* 65*/ "ソAlguna pregunta? No. Bien. Despu駸 \nir疽 al hangar.\n", + /* 66*/ "Informe de Misin del Agente Dark, 10:28 horas. \nContra mi mejor juicio, estoy a punto de \nentrar en el チrea 51.\n", + /* 67*/ "。Agente Dark! 。Aqu!\n", + /* 68*/ "。Aqu est疽! Estaba empezando a \npreguntarme si...\n", + /* 69*/ "ソSi qu?\n", + /* 70*/ "Si habas sido descubierto ya. Y francamente, \nsi as es como trabajas, estoy asombrada de \nque hayas sobrevivido m疽 de cinco minutos.\n", + /* 71*/ "Estaba atando uno de tus cabos sueltos.\n", + /* 72*/ "ソMis cabos sueltos?\n", + /* 73*/ "Lo siento, no pensaba que quisieras que 駘 \nte disparara. Puedo llamar a m疽 guardas \nsi t quieres...\n", + /* 74*/ "Vale, vale, olvdalo. Voy a hacer saber al \nInstituto que hemos contactado.\n", + /* 75*/ "Objeto extrao detectado - seguridad alertada.\n", +}; diff --git a/src/files/lang/pal-beta/miscE.c b/src/files/lang/pal-beta/miscE.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-beta/miscE.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/miscJ.c b/src/files/lang/pal-beta/miscJ.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-beta/miscJ.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/miscP.c b/src/files/lang/pal-beta/miscP.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-beta/miscP.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_f.c b/src/files/lang/pal-beta/misc_str_f.c new file mode 100644 index 000000000..0505e9412 --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_f.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R E U R\n", + /* 1*/ "Pas de briefing pour cette mission\n", + /* 2*/ "\n", + /* 3*/ "Objectif", + /* 4*/ "Succ鑚\n", + /* 5*/ "Incomplet\n", + /* 6*/ "Echec\n", + /* 7*/ "Plus qu'une minute.\n", + /* 8*/ "OBJECTIFS NON ATTEINTS - abandonner mission.\n", + /* 9*/ "Salutations Garde\n", + /* 10*/ "C'est quoi ce flingue?\n", + /* 11*/ "Ne pointe pas 軋 sur moi.\n", + /* 12*/ "Vit/MPS", + /* 13*/ "Hau/M", + /* 14*/ "Dev/D", + /* 15*/ "Ang/D", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELE 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Cool", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Difficile", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "Cool-Sim", + /* 28*/ "Facile-Sim", + /* 29*/ "Normal-Sim", + /* 30*/ "Difficile-Sim", + /* 31*/ "Perfect-Sim", + /* 32*/ "Dark-Sim", + /* 33*/ "Peace-Sim", + /* 34*/ "Bouclier-Sim", + /* 35*/ "Roquette-Sim", + /* 36*/ "Kaze-Sim", + /* 37*/ "Poing-Sim", + /* 38*/ "Proie-Sim", + /* 39*/ "L稍he-Sim", + /* 40*/ "Juge-Sim", + /* 41*/ "Vendetta-Sim", + /* 42*/ "Speed-Sim", + /* 43*/ "Tortue-Sim", + /* 44*/ "Vengeance-Sim", + /* 45*/ "Cool-Sim: c'est le plus facile des simulants. Un excellent choix pour un d饕utant. Il n'est pas tr鑚 malin et vise tr鑚 mal.\n", + /* 46*/ "Facile-Sim: Ce simulant a des capacit駸 de base mais il peut 黎re dangereux.\n", + /* 47*/ "Normal-Sim: Ce simulant a les m麥es capacit駸 que le joueur humain moyen.\n", + /* 48*/ "Difficile-Sim: Ce simulant a les m麥es capacit駸 qu'un bon joueur humain.\n", + /* 49*/ "Perfect-Sim: L'adversaire ultime, le plus intelligent et habile des simulants. Les joueurs choisissent souvent le Perfect-Sim pour am駘iorer leurs capacit駸.\n", + /* 50*/ "Dark-Sim: Prototype de cyborg d騅elopp par la dataDyne pour affronter les agents Carrington. Attention: ce simulant n'est pas humain. Il peut donc faire ce qui est humainement impossible.\n", + /* 51*/ "Peace-Sim: Un scientifique refusant d'utiliser une arme. Il recherche et r馗up鑽e les armes dans le niveau pour que les joueurs ne les utilisent pas. Vous pouvez bien sr lui tirer dessus et il en fera peut-黎re tomber!\n", + /* 52*/ "Bouclier-Sim: Il cherche toujours la meilleure protection. Si ce simulant perd de l'駭ergie, Il ira chercher un nouveau bouclier. Cela n'a aucun int駻黎 s'il n'y a pas de bouclier dans le niveau!\n", + /* 53*/ "Roquette-Sim: Ce simulant adore tout faire sauter. Il pr馭鑽e l'armement explosif plutt que des pistolets ou des automatiques. C'est aussi vrai pour les armes au tir secondaire explosif!\n", + /* 54*/ "Kaze-Sim: Ce simulant ne recule devant rien pour d騁ruire sa cible. Il est tr鑚 aggressif et ne garde jamais ses distances - m麥e s'il tient une grenade! Faites attention quelqu'un qui n'a pas peur de mourir.\n", + /* 55*/ "Poing-Sim: Tout comme le Peace-Sim, ce simulant d騁este les armes mais il est en revanche un adversaire teigneux. Il tentera sans arr黎 d'assommer ou de d駸armer ses adversaires mains nues.\n", + /* 56*/ "Proie-Sim: Ce simulant pr馭鑽e attaquer les faibles pour tuer plus de monde. Il recherche les joueurs neufs et d駸arm駸 ou encore ceux affaiblis par un combat.\n", + /* 57*/ "L稍he-Sim: Ce simulant ne veut pas combattre et pr馭鑽e fuir pour survivre. Il peut attaquer de temps en temps mais seulement si l'adversaire a un armement inf駻ieur au sien. Utilisez une arme puissante ou tirez-lui dessus et il s'enfuira!\n", + /* 58*/ "Juge-Sim: Ce simulant est loyal et il d騁este les m騁hodes du Proie-Sim. Il essaiera de tuer le joueur en t黎e pour arrondir les scores.\n", + /* 59*/ "Vendetta-Sim: Si ce simulant choisit une cible, celle-ci doit faire attention! Un Vendetta-Sim poursuit un joueur jusqu' la fin de la partie! M麥e tu, il reviendra la charge.\n", + /* 60*/ "Speed-Sim: Ce simulant est un as de la vitesse. Il est plus rapide qu'un joueur humain, il est alors inutile, moins de connatre un raccourci, d'essayer de le semer!\n", + /* 61*/ "Tortue-Sim: Ce simulant porte un g駭駻ateur de bouclier d騅elopp par les scientifiques de la dataDyne. Le g駭駻ateur proj鑼e un bouclier deux fois plus r駸istant qu'un bouclier normal. Malheureusement, il r馘uit les mouvements de l'utilisateur. Le Tortue-Sim porte cet appareil m麥e s'il n'y a aucun bouclier dans le niveau.\n", + /* 62*/ "Vengeance-Sim: Ce simulant attaquera toujours le dernier joueur l'avoir attaqu ou tu. R馭l馗hissez avant de tirer.", + /* 63*/ "Combat Dark", + /* 64*/ "Myst鑽e skedar", + /* 65*/ "Agent IC", + /* 66*/ "Action dataDyne", + /* 67*/ "Pleurs maians", + /* 68*/ "Conflit extrater.", + /* 69*/ "Institut Carrington", + /* 70*/ "Centre dD", + /* 71*/ "Centre dD X", + /* 72*/ "Recherche dD", + /* 73*/ "Recherche dD X", + /* 74*/ "Extraction dD", + /* 75*/ "Extraction dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Immeuble G5", + /* 81*/ "Immeuble G5 X", + /* 82*/ "Infiltration S-51", + /* 83*/ "Infiltration S-51 X", + /* 84*/ "Sauvetage S-51", + /* 85*/ "Sauvetage S-51 X", + /* 86*/ "Fuite S-51", + /* 87*/ "Fuite S-51 X", + /* 88*/ "Base a駻ienne", + /* 89*/ "Base a駻ienne X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Site du crash", + /* 93*/ "Site du crash X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Sous-marin", + /* 97*/ "Sous-marin X", + /* 98*/ "D馭ense Institut", + /* 99*/ "D馭ense Institut X", + /*100*/ "Croiseur", + /*101*/ "Croiseur X", + /*102*/ "Ruines Skedars", + /*103*/ "Ruines Skedars X", + /*104*/ "G駭駻ique de fin", + /*105*/ "Hasard\n", + /*106*/ "Choisir: tout\n", + /*107*/ "Choisir: rien\n", + /*108*/ "Au hasard\n", + /*109*/ "Armes\n", + /*110*/ "Fonctions\n", + /*111*/ "Ordres\n", + /*112*/ "Pas d'arme\n", + /*113*/ "Choix cible\n", + /*114*/ "Suivre\n", + /*115*/ "Attaquer\n", + /*116*/ "D馭endre\n", + /*117*/ "Tenir\n", + /*118*/ "Normal\n", + /*119*/ "T駘馗harger\n", + /*120*/ "Obtenir mallette\n", + /*121*/ "Marquer bote\n", + /*122*/ "Tu(e) par", + /*123*/ "Tu", + /*124*/ "D饕utant:21\n", + /*125*/ "Stagiaire:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Bleu:18\n", + /*128*/ "Novice:17\n", + /*129*/ "2鑪e classe:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Agent chef:14\n", + /*132*/ "Agent Sp馗ial:13\n", + /*133*/ "Expert:12\n", + /*134*/ "V騁駻an:11\n", + /*135*/ "Professionnel:10\n", + /*136*/ "Dangereux:9\n", + /*137*/ "Mortel:8\n", + /*138*/ "Tueur:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Fatal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Quasi-Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "MUNI.FLECHETTE", + /*146*/ "MODELE 1.4", + /*147*/ "JM: 201172", + /*148*/ "Sauv. mallette\n", + /*149*/ "D馭. zone\n", + /*150*/ "Tenir zone\n", + /*151*/ "Prendre mallette\n", + /*152*/ "D馗apsuleur\n", + /*153*/ "Prot馮er\n", + /*154*/ "Tous simulants\n", + /*155*/ "MODELE 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Espace insuffisant pour lancer ", + /*158*/ "OBJECTIF:", + /*159*/ "SCORE LIMITE:", + /*160*/ "PRECISION MIN:", + /*161*/ "TIREZ POUR COMMENCER\n", + /*162*/ "PRET!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "CENTRE\n", + /*168*/ "EXPLOS饅n", + /*169*/ "Elvis est mort.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonds", + /*175*/ "Noirs", + /*176*/ "Auburn", + /*177*/ "Rin軋ge bleu", + /*178*/ "Joueur", + /*179*/ "", + /*180*/ "Identifier\n", + /*181*/ "Inutilis", + /*182*/ "Challenges\n", + /*183*/ "Charger jeu pr馘馭ini\n", + /*184*/ "D駑arrage rapide\n", + /*185*/ "R馮lages avanc駸\n", + /*186*/ "Simulateur de combat\n", + /*187*/ "Institut Carrington\n", + /*188*/ "S. 駲uipe\n", + /*189*/ "R馮lages termin駸\n", + /*190*/ "Equipe Joueur 1\n", + /*191*/ "Equipe Joueur 2\n", + /*192*/ "Equipe Joueur 3\n", + /*193*/ "Equipe Joueur 4\n", + /*194*/ "Nombre de Simulants\n", + /*195*/ "Simulants par 駲uipe\n", + /*196*/ "Difficult des Simulants\n", + /*197*/ "Commencer partie\n", + /*198*/ "Quitter\n", + /*199*/ "R馮lages joueur\n", + /*200*/ "R馮lages jeu\n", + /*201*/ "Lancer\n", + /*202*/ "Pr黎!\n", + /*203*/ "Equipe rapide\n", + /*204*/ "Joueurs seulement\n", + /*205*/ "Joueurs et simulants\n", + /*206*/ "Equipes de joueurs\n", + /*207*/ "Joueurs contre simulants\n", + /*208*/ "Equipes joueurs-simulants\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Rejouer mission pr馗馘ente\n", + /*212*/ "Holographe\n", + /*213*/ "Agressif\n", + /*214*/ "Passif\n", + /*215*/ "Perfect Pote\n", + /*216*/ "Furtif\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_g.c b/src/files/lang/pal-beta/misc_str_g.c new file mode 100644 index 000000000..8638f7ac3 --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_g.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "Fr diese Mission gibt es kein Briefing.\n", + /* 2*/ "\n", + /* 3*/ "Ziel", + /* 4*/ "erreicht\n", + /* 5*/ "nicht erreicht\n", + /* 6*/ "versagt\n", + /* 7*/ "Noch eine Minute.\n", + /* 8*/ "ZIELERREICHUNG UNGENワGEND - Mission abbrechen.\n", + /* 9*/ "Wachgru゚.\n", + /* 10*/ "Was soll die Waffe?\n", + /* 11*/ "Zielen Sie nicht auf mich!\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Opfer", + /* 22*/ "Leicht", + /* 23*/ "Normal", + /* 24*/ "Schwer", + /* 25*/ "Perfekt", + /* 26*/ "Dark", + /* 27*/ "OpferSim", + /* 28*/ "LeichtSim", + /* 29*/ "NormalSim", + /* 30*/ "SchwerSim", + /* 31*/ "PerfektSim", + /* 32*/ "DarkSim", + /* 33*/ "PazifistSim", + /* 34*/ "SchildSim", + /* 35*/ "RaketenSim", + /* 36*/ "KamikazeSim", + /* 37*/ "FaustSim", + /* 38*/ "J臠erSim", + /* 39*/ "FeiglingSim", + /* 40*/ "JustizSim", + /* 41*/ "VendettaSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "RacheSim", + /* 45*/ "OpferSim: Der am leichtesten zu besiegende Simulant. Eignet sich daher hervorragend fr Einsteiger. Der Simulant ist nicht sonderlich intelligent und ist zudem ein m葹iger Schtze.\n", + /* 46*/ "LeichtSim: Der Simulant verfgt zwar nur ber Basis-Intelligenz und -F臧igkeiten, ist aber trotzdem nicht ungef臧rlich.\n", + /* 47*/ "NormalSim: Der Simulant verfgt ber das Geschick eines menschlichen Spielers.\n", + /* 48*/ "SchwerSim: Der Simulant verfgt ber das Geschick eines guten menschlichen Spielers.\n", + /* 49*/ "PerfektSim: Der ultimative Gegner. トu゚erst intelligent und unberechenbar. Viele Spieler werden bevorzugt gegen ihn antreten, da sich ihre eigenen F臧igkeiten dadurch st舅dig verbessern.\n", + /* 50*/ "DarkSim: Ein Cyborg-Prototyp, der von dataDyne entwickelt wurde, um gegen das Institut vorzugehen. Beachten Sie, dass dieser Simulant, im Gegensatz zu den anderen, nicht menschlich ist. Daher kann er Dinge tun, die Menschen nicht tun knnen.\n", + /* 51*/ "PazifistSim: Diese Simulanten sind Wissenschaftler, die keine Waffen einsetzen. Sie gehen durch die Level, um herumliegende Waffen einzusammeln, sodass der Spieler sie nicht finden kann. Wenn Sie aber auf sie schie゚en, lassen sie vielleicht die Waffen fallen.\n", + /* 52*/ "ShieldSim: Achtet immer auf maximalen Schild-Schutz. Verliert dieser Simulant seinen Schild, zieht er los, um einen neuen zu suchen. Das hat natrlich wenig Sinn, wenn keine Schilde vorhanden sind!\n", + /* 53*/ "RaketenSim: Dieser Simulant liebt es, Dinge in die Luft zu jagen. Er zieht Explosions-Waffen gegenber Pistolen und Automatik-Gewehren vor. Zu ersteren gehren auch Waffen, die eine 'explosive' Sekund舐-Funktion haben.\n", + /* 54*/ "KamikazeSim: Dieser Simulant l舖st sich durch nichts aufhalten. Er ist sehr aggressiv und h舁t keine Distanz zum Gegner. Auch nicht, wenn er eine Granate h舁t! Seien Sie 舫゚erst vorsichtig, denn dieser Gegner kennt keine Angst.\n", + /* 55*/ "FaustSim: Dieser Simulant verwendet, 臧nlich wie der PazifistSim, keine Waffen. Kommt es aber zum Kampf, wird er seine F舫ste einsetzen. Er wird st舅dig versuchen, seinen Gegner zu entwaffnen.\n", + /* 56*/ "J臠erSim: Dieser Simulant jagt bevorzugt schw臘here Gegner. Er sucht nach Spielern, die die gerade erst erschienen sind, ber schwache Bewaffnung verfgen oder wenig Energie haben.\n", + /* 57*/ "FeiglingSim: Dieser Simulant wird eher sein Heil in der Flucht suchen, als zu k舂pfen. Er kann zwar hin und wieder attackieren, aber nur, wenn sein Gegner ber eine schwache Waffe verfgt. Ziehen Sie eine st舐kere Waffe, und er wird flchten!\n", + /* 58*/ "JustizSim: Dieser Simulant hat einen starken Gerechtigkeitssinn. Daher verurteilt er die Taktiken des J臠erSim. Er wird immer den st舐ksten Spieler verfolgen, um fr einen gleichm葹igen Score zu sorgen.\n", + /* 59*/ "VendettaSim: Hat sich dieser Simulant ein Opfer ausgesucht, sollte der Spieler sehr vorsichtig sein! Ein VendettaSim verfolgt diesen Spieler, bis das Spiel vorber ist! Er schreckt eventuell auch nicht vor einem Kamikaze-Angriff zurck.\n", + /* 60*/ "SpeedSim: Diese Simulanten sind unglaublich schnell. In Punkto Geschwindigkeit sind sie jedem Menschen berlegen, daher hat es keinen Sinn, vor ihnen zu flchten. (Es sei denn, Sie kennen eine Abkrzung.)\n", + /* 61*/ "TurtleSim: Dieser Simulant verfgt ber eine von dataDyne entwickelte Schildtechnologie. Der Generator projiziert ein Schutzschild um seinen Tr臠er, der doppelt so stark ist, wie ein normaler Schild. Leider wird dadurch auch die Bewegungsfreiheit eingeschr舅kt, und er kann sich nur langsam bewegen. TurtleSims tragen diesen Schild als Standard-Ausrstung, sogar, wenn es im aktuellen Level keine Schilde gibt.\n", + /* 62*/ "RacheSim: Seien Sie vorsichtig, wenn Sie auf einen RacheSim schie゚en, da er danach nur seinen Bezwinger angreift.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar-Mysterium", + /* 65*/ "CI-Operator", + /* 66*/ "dataDyne Action", + /* 67*/ "Maianische Tr舅en", + /* 68*/ "Alien-Konflikt", + /* 69*/ "Carrington Institut", + /* 70*/ "dD Zentrale", + /* 71*/ "dD Zentrale X", + /* 72*/ "dD Forschung", + /* 73*/ "dD Forschung X", + /* 74*/ "dD Extraktion", + /* 75*/ "dD Extraktion X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5-Building", + /* 81*/ "G5-Building X", + /* 82*/ "A-51 Infiltration", + /* 83*/ "A-51 Infiltration X", + /* 84*/ "A-51 Rettung", + /* 85*/ "A-51 Rettung X", + /* 86*/ "A-51 Flucht", + /* 87*/ "A-51 Flucht X", + /* 88*/ "Sttzpunkt", + /* 89*/ "Sttzpunkt X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Absturzstelle", + /* 93*/ "Absturzstelle X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Tiefsee", + /* 97*/ "Tiefsee X", + /* 98*/ "Verteidigung", + /* 99*/ "Verteidigung X", + /*100*/ "Feindliches Schiff", + /*101*/ "Feindliches Schiff X", + /*102*/ "Skedar Ruinen", + /*103*/ "Skedar Ruinen X", + /*104*/ "End Credits", + /*105*/ "Zuf舁lig\n", + /*106*/ "Alle\n", + /*107*/ "Keine\n", + /*108*/ "Zufallsgenerator\n", + /*109*/ "Waffe\n", + /*110*/ "Funktion\n", + /*111*/ "Befehle\n", + /*112*/ "Keine Waffe\n", + /*113*/ "Zielauswahl\n", + /*114*/ "Folgen\n", + /*115*/ "Attackieren\n", + /*116*/ "Verteidigen\n", + /*117*/ "Halten\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Schnapp den Koffer\n", + /*121*/ "Tag Box\n", + /*122*/ "Besiegt von:", + /*123*/ "Besiegt wurde:", + /*124*/ "Anf舅ger:21\n", + /*125*/ "Auszubildender:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Grnschnabel:18\n", + /*128*/ "Neuling:17\n", + /*129*/ "Soldat:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star-Agent:14\n", + /*132*/ "Spezial-Agent:13\n", + /*133*/ "Experte:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Profi:10\n", + /*136*/ "Gef臧rlich:9\n", + /*137*/ "Letal:8\n", + /*138*/ "Tdlich:7\n", + /*139*/ "Verheerend:6\n", + /*140*/ "Zerstrer:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Unbezwingbar:3\n", + /*143*/ "Fast Perfekt:2\n", + /*144*/ "Perfekt:1\n", + /*145*/ "DARTMUNI", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Vert. Koffer\n", + /*149*/ "Vert. Hgel\n", + /*150*/ "Halte Hgel\n", + /*151*/ "Erl. Koffer\n", + /*152*/ "Pop Cap\n", + /*153*/ "Beschtze\n", + /*154*/ "Alle Simulanten\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Nicht gengend Platz ", + /*158*/ "ZIELE:", + /*159*/ "SCORE:", + /*160*/ "MIN GENAUIGKEIT:", + /*161*/ "FEUER, UM LOSZULEGEN\n", + /*162*/ "FERTIG!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODIERT\n", + /*169*/ "Elvis wurde eliminiert.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Spieler", + /*179*/ "", + /*180*/ "Identifizieren\n", + /*181*/ "nicht verwendet", + /*182*/ "Challenges\n", + /*183*/ "Laden/Voreinstellung\n", + /*184*/ "Schnellstart\n", + /*185*/ "Erweitertes Setup\n", + /*186*/ "Kampf-Simulator\n", + /*187*/ "Carrington Institut\n", + /*188*/ "Team-Score\n", + /*189*/ "Setup abgeschlossen\n", + /*190*/ "Spieler 1 Team\n", + /*191*/ "Spieler 2 Team\n", + /*192*/ "Spieler 3 Team\n", + /*193*/ "Spieler 4 Team\n", + /*194*/ "Anzahl der Simulanten\n", + /*195*/ "Simulanten pro Team\n", + /*196*/ "Sim-Schwierigkeit\n", + /*197*/ "Start\n", + /*198*/ "Abbrechen\n", + /*199*/ "Spieler-Einstellungen\n", + /*200*/ "Spiel-Einstellungen\n", + /*201*/ "Quick Go\n", + /*202*/ "Fertig!\n", + /*203*/ "Quick-Team\n", + /*204*/ "Nur Spieler\n", + /*205*/ "Spieler und Simulanten\n", + /*206*/ "Spieler-Teams\n", + /*207*/ "Spieler vs. Simulanten\n", + /*208*/ "Spieler-Simulanten-Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Mission wiederholen\n", + /*212*/ "Holografie\n", + /*213*/ "Aggressiv\n", + /*214*/ "Passiv\n", + /*215*/ "Perfekte Kumpels\n", + /*216*/ "Tarnung\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_i.c b/src/files/lang/pal-beta/misc_str_i.c new file mode 100644 index 000000000..44ab48cfc --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_i.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R E\n", + /* 1*/ "Nessuna informazione per questa missione\n", + /* 2*/ "\n", + /* 3*/ "Obiettivo", + /* 4*/ "Completato\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallito\n", + /* 7*/ "Ancora un minuto.\n", + /* 8*/ "OBIETTIVI FALLITI: interrompi missione!\n", + /* 9*/ "Saluto guardia\n", + /* 10*/ "Cos' quella pistola?\n", + /* 11*/ "Non puntarla a me.\n", + /* 12*/ "v/ms", + /* 13*/ "h/m", + /* 14*/ "i/g", + /* 15*/ "t/g", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "TELESPIA", + /* 19*/ "MODELLO 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Pappa", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Tosto", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "RepPappa", + /* 28*/ "RepFacile", + /* 29*/ "RepNormal", + /* 30*/ "RepTosto", + /* 31*/ "RepPerfect", + /* 32*/ "RepDark", + /* 33*/ "RepPace", + /* 34*/ "RepScudo", + /* 35*/ "RepMissile", + /* 36*/ "RepKaze", + /* 37*/ "RepPugno", + /* 38*/ "RepPreda", + /* 39*/ "RepCodardo", + /* 40*/ "RegGiusto", + /* 41*/ "RepLite", + /* 42*/ "RepAgile", + /* 43*/ "RepTarta", + /* 44*/ "RepVendika", + /* 45*/ "RepPappa: ネ il replicante pi facile da battere, un vero pappamolle e quindi il migliore per i principianti. Non molto intelligente e quasi incapace di sparare.\n", + /* 46*/ "RepFacile: ネ dotato di abilit e intelligenza elementari, ma pu rivelarsi pericoloso.\n", + /* 47*/ "RepNormal: Le sue abilit sono come quelle di un giocatore umano medio.\n", + /* 48*/ "RepTosto: Le sue abilit sono come quelle di un giocatore umano bravo.\n", + /* 49*/ "RepPerfect: L'avversario ultimo: il pi intelligente e abile. Da usarsi per un miglioramento continuo delle proprie capacit.\n", + /* 50*/ "RepDark: Prototipo cibernetico sviluppato dalla dataDyne per contrastare gli agenti di Carrington. Ricorda che questo replicante al contrario degli altri non umano, quindi potrebbe avere abilit sovrumane!\n", + /* 51*/ "RepPace: ネ un replicante-scienziato che protesta contro l'uso delle armi. Va in giro per i piani allaricerca di armi per nasconderle in modo che il giocatore non possa usarle. Sparandogli probabile che glienecadano alcune!\n", + /* 52*/ "RepScudo: ネ sempre alla ricerca del massimo scudo protettivo. Se perde energia, andr alla ricerca di unnuovo scudo. Peggio per lui se su quel piano non ci sono scudi!\n", + /* 53*/ "RepMissile: Adora le esplosioni: preferisce le armi che provocano violente deflagrazioni alle pistole convenzionali e alle mitragliatrici. Questo vale anche per le armi con funzioni esplosive secondarie!\n", + /* 54*/ "RepKaze: Il suo scopo distruggere l'avversario ad ogni costo. ネ molto aggressivo e non prende maile distanze... neanche da una granata! Non ha paura di morire e perci molto pericoloso.\n", + /* 55*/ "RepPugno: Come il RepPace anche questo replicante contro l'uso delle armi. Tuttavia non contro la lotta corpo a corpo:usa i pugni per cercare di stendere o disarmare l'avversario.\n", + /* 56*/ "RepPreda: Preferisce scagliarsi su avversari deboli per vincere facilmente. Cerca avversariprincipianti, muniti di arma meno potente o in cattiva salute.\n", + /* 57*/ "RepCodardo: Piuttosto che combattere preferisce cercare scampo nella fuga. Attacca raramente e solo se l'avversario ha un'arma meno potente. Sfoderando un'arma migliore o sparando, scapper!\n", + /* 58*/ "RepGiusto: Ha un forte senso della giustizia e disprezza la strategia del RepPreda. Cerca sempre di colpireil giocatore in vantaggio per pareggiare il risultato.\n", + /* 59*/ "RepLite: Una volta che ha identificato un bersaglio, meglio tenere gli occhi aperti! Un RepLiteinseguir quel giocatore fino alla fine! Serba rancore anche dopo la morte.\n", + /* 60*/ "RepAgile: ネ agilissimo e velocissimo: corre molto pi veloce del giocatore umano, quindi inutile cercare di sfuggirgli a meno che si conosca una scorciatoia!\n", + /* 61*/ "RepTarta: Indossa il prototipo del generatore scudo creato dagli scienziati dataDyne. Il generatore proietta attorno al suo corpo uno scudo protettivo due volte pi potente di uno scudo normale. Questo per lo impedisce nei movimenti, per cui molto lento. Il RepTarta dotato di questo scudo anche se non ci sono scudi su quel piano.\n", + /* 62*/ "RepVendika: Sparando o uccidendo un RepVendika, gli altri attaccheranno l'ultimo giocatore che l'ha attaccato o ucciso.", + /* 63*/ "Lotta Dark", + /* 64*/ "Mistero Skedar", + /* 65*/ "CI Operative", + /* 66*/ "Azione dataDyne", + /* 67*/ "Lacrime Maian", + /* 68*/ "Conflitto Alieno", + /* 69*/ "Carrington Institute", + /* 70*/ "Quartier Generale dD", + /* 71*/ "Quartier Generale dD X", + /* 72*/ "Ricerca dD", + /* 73*/ "Ricerca dD X", + /* 74*/ "Estrazione dD", + /* 75*/ "Estrazione dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltrazione A51", + /* 83*/ "Infiltrazione A51 X", + /* 84*/ "Salvataggio A51", + /* 85*/ "Salvataggio A51 X", + /* 86*/ "Fuga A51", + /* 87*/ "Fuga A51 X", + /* 88*/ "Base aerea", + /* 89*/ "Base aerea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Luogo del disastro", + /* 93*/ "Luogo del disastro X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Abissi oceanici", + /* 97*/ "Abissi oceanici X", + /* 98*/ "Difesa dell'istituto", + /* 99*/ "Difesa dell'istituto X", + /*100*/ "Astronave d'assalto", + /*101*/ "Astronave d'assalto X", + /*102*/ "Rovine Skedar", + /*103*/ "Rovine Skedar X", + /*104*/ "Titoli di coda", + /*105*/ "A caso\n", + /*106*/ "Seleziona tutto\n", + /*107*/ "Nessuna selezione\n", + /*108*/ "Non in sequenza\n", + /*109*/ "Arma\n", + /*110*/ "Funzione\n", + /*111*/ "Ordini\n", + /*112*/ "No armi\n", + /*113*/ "Scegli obiettivo\n", + /*114*/ "Segui\n", + /*115*/ "Attacca\n", + /*116*/ "Difendi\n", + /*117*/ "Fisso\n", + /*118*/ "Normale\n", + /*119*/ "Scarica\n", + /*120*/ "Prendi cassa\n", + /*121*/ "Box\n", + /*122*/ "Eliminato da", + /*123*/ "Eliminato", + /*124*/ "Principiante:21\n", + /*125*/ "Addestrato:20\n", + /*126*/ "Amatore:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novello:17\n", + /*129*/ "Truppa:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Agente di grado:14\n", + /*132*/ "Agente speciale:13\n", + /*133*/ "Esperto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Professionista:10\n", + /*136*/ "Pericoloso:9\n", + /*137*/ "Micidiale:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassino:6\n", + /*140*/ "Letale:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invulnerabile:3\n", + /*143*/ "Quasi Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "FRECCE", + /*146*/ "MODELLO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salva cassa\n", + /*149*/ "Difendi colle\n", + /*150*/ "Tieni colle\n", + /*151*/ "Prendi cassa\n", + /*152*/ "Tutti contro 1\n", + /*153*/ "Proteggi\n", + /*154*/ "Tutti replic.\n", + /*155*/ "MODELLO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Spazio insufficiente per il lancio", + /*158*/ "OBIETTIVI:", + /*159*/ "PUNTEGGIO:", + /*160*/ "PRECISIONE IN MIN:", + /*161*/ "SPARA PER INIZIARE\n", + /*162*/ "PRONTI!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "CENTRO\n", + /*168*/ "ESPLOSO\n", + /*169*/ "Elvis morto.\n", + /*170*/ "Modalit 1", + /*171*/ "Modalit 2", + /*172*/ "Modalit 3", + /*173*/ "Modalit 4", + /*174*/ "Biondo", + /*175*/ "Nero", + /*176*/ "Castano", + /*177*/ "Cachet blu", + /*178*/ "Nome", + /*179*/ "", + /*180*/ "Identifica\n", + /*181*/ "non in uso", + /*182*/ "Sfide\n", + /*183*/ "Carica/Imposta giochi\n", + /*184*/ "Avvio rapido\n", + /*185*/ "Impostaz. avanzate\n", + /*186*/ "Simulatore lotta\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Punti squadra\n", + /*189*/ "Fine impostazioni\n", + /*190*/ "Squadra 1 giocatore\n", + /*191*/ "Squadra 2 giocatori\n", + /*192*/ "Squadra 3 giocatori\n", + /*193*/ "Squadra 4 giocatori\n", + /*194*/ "Numero di replicanti\n", + /*195*/ "Replicanti per squadra\n", + /*196*/ "Difficolt replicanti\n", + /*197*/ "Avvia gioco\n", + /*198*/ "Esci\n", + /*199*/ "Impostaz. giocatori\n", + /*200*/ "Impostazioni gioco\n", + /*201*/ "Scelta rapida\n", + /*202*/ "Pronti!\n", + /*203*/ "Avvio rapido\n", + /*204*/ "Solo giocatori\n", + /*205*/ "Giocatori e replicanti\n", + /*206*/ "Squadre di giocatori\n", + /*207*/ "Giocatori contro replicanti\n", + /*208*/ "Squadre giocatori-replicanti\n", + /*209*/ "CAPSUSPIA", + /*210*/ "BOMBASPIA", + /*211*/ "Ripeti missione precedente\n", + /*212*/ "Olografia\n", + /*213*/ "Aggressivo\n", + /*214*/ "Passivo\n", + /*215*/ "Amici Perfect\n", + /*216*/ "In incognito\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_s.c b/src/files/lang/pal-beta/misc_str_s.c new file mode 100644 index 000000000..20ea7d41c --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_s.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No hay informacin para esta misin\n", + /* 2*/ "\n", + /* 3*/ "Objetivo", + /* 4*/ "Completado\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallado\n", + /* 7*/ "Queda un minuto.\n", + /* 8*/ "OBJETIVOS FALLADOS - abortar misin.\n", + /* 9*/ "Saludos del Guarda\n", + /* 10*/ "ソQu arma es 駸a?\n", + /* 11*/ "No me apuntes con ese arma.\n", + /* 12*/ "v/mps", + /* 13*/ "a/m", + /* 14*/ "x/ー", + /* 15*/ "y/ー", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELO 1.2", + /* 20*/ "GIROSTATO", + /* 21*/ "Muy F當il", + /* 22*/ "F當il", + /* 23*/ "Normal", + /* 24*/ "Difcil", + /* 25*/ "Perfecto", + /* 26*/ "Oscuro", + /* 27*/ "SimMF當il", + /* 28*/ "SimF當il", + /* 29*/ "SimNormal", + /* 30*/ "SimDifci", + /* 31*/ "SimPerfec", + /* 32*/ "SimOscuro", + /* 33*/ "SimPaz", + /* 34*/ "SimEscudo", + /* 35*/ "SimCohete", + /* 36*/ "SimKamika", + /* 37*/ "SimLucha", + /* 38*/ "SimPresa", + /* 39*/ "SimCobard", + /* 40*/ "SimJuez", + /* 41*/ "SimPelea", + /* 42*/ "SimVeloz", + /* 43*/ "SimTortug", + /* 44*/ "SimVengan", + /* 45*/ "SimMF當il: ノste es el simulante m疽 f當il de derrotar, y por lo tanto, la mejor eleccin para los principiantes. No es muy inteligente, y su tiro es bastante pobre.\n", + /* 46*/ "SimF當il: Este simulante tiene inteligencia y habilidades b疽icas; an as puede ser peligroso.\n", + /* 47*/ "SimNormal: Este simulante es tan habilidoso como un jugador humano normal y corriente.\n", + /* 48*/ "SimDifci: Este simulante es tan habilidoso como un buen jugador humano.\n", + /* 49*/ "SimPerfec: El adversario definitivo. El simulante m疽 inteligente y habilidoso. La mayora de jugadores querr疣 usar a SimPerfecto todo el tiempo para mejorar sus habilidades.\n", + /* 50*/ "SimOscuro: Prototipo cibern騁ico desarrollado por dataDyne para contrarrestar las acciones de Carrington. Recuerda que este simulante no es humano. Esto significa que es capaz de hacer cosas que un humano no puede.\n", + /* 51*/ "SimPaz: Estos simulantes son cientficos que protestan contra el uso de armas. Recorren el nivel buscando armas y las recogen para que el jugador no pueda usarlas. Por supuesto, si les disparas un poco... 。no les importar soltarlas!\n", + /* 52*/ "SimEscudo: Siempre busca la m痊ima proteccin de escudo. Si este simulante pierde algo de energa de su escudo, ir en busca de uno nuevo. 。No tiene mucha utilidad si no hay escudos en el nivel!\n", + /* 53*/ "SimCohete: A este simulante le encanta ver cosas explotar. Prefiere armas explosivas, antes que las convencionales pistolas o autom疸icas. 。Esto tambi駭 se extiende a las armas que tienen funciones secundarias explosivas!\n", + /* 54*/ "SimKamika: Este simulante no se detendr ante nada para destruir a su blanco. Es muy agresivo y nunca cuida las distancias: 。Incluso cuando lleva una granada! Se muy cuidadoso de este adversario que no tiene miedo a morir.\n", + /* 55*/ "SimLucha: Este simulante protesta por el uso de armas al igual que hacen los SimPacficos. An as, no tiene reservas a la hora de combatir desarmado. Siempre intentar usar sus puos para atacar o desarmar a su oponente.\n", + /* 56*/ "SimPresa: Este simulante prefiere cebarse en los d饕iles para conseguir muertes f當iles. Buscar jugadores que acaben de salir, tengan un arma inferior, o tengan poca salud.\n", + /* 57*/ "SimCobard: Este simulante no quiere luchar, as que huir para intentar sobrevivir. A veces atacar, pero slo si el oponente tiene un arma inferior. 。Saca un arma mayor o disp疵ale, y saldr corriendo!\n", + /* 58*/ "SimJuez: Este simulante tiene un gran sentido de la justicia y desprecia las t當ticas del SimPredador. Siempre intentar matar al jugador que vaya ganando para as igualar los marcadores.\n", + /* 59*/ "SimPelea: 。Cuando este simulante escoge objetivo, el jugador debe tener mucho cuidado! 。Un SimVenganza perseguir al jugador hasta que se acabe el juego! Aunque muera, seguir guard疣dote rencor.\n", + /* 60*/ "SimVeloz: Estos simulantes han sido entrenados para ser muy veloces. 。Pueden atrapar f當ilmente a un humano, as que no huyas de un SimLeopardo a menos que conozcas algn buen atajo!\n", + /* 61*/ "SimTortug: Este simulante lleva un prototipo de generador de escudo creado por cientficos de dataDyne. El generador crea un escudo protector que posee el doble de fuerza que un escudo normal. Desgraciadamente, restringe el movimiento del portador, as que se mover muy despacio. Los SimTortugas llevan este escudo siempre, incluso si no hay escudos en el nivel.\n", + /* 62*/ "SimVengan: Ten cuidado de no disparar o matar a un SimRevancha, ya que siempre atacar al ltimo jugador que le haya matado.", + /* 63*/ "Combate Oscuro", + /* 64*/ "Misterio Skedar", + /* 65*/ "Operativo IC", + /* 66*/ "Accin dataDyne", + /* 67*/ "L疊rimas Maian", + /* 68*/ "Conflicto Alien", + /* 69*/ "Instituto Carrington", + /* 70*/ "Central dD", + /* 71*/ "Central dD X", + /* 72*/ "Investigacin dD", + /* 73*/ "Investigacin dD X", + /* 74*/ "Extraccin dD", + /* 75*/ "Extraccin dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltracin A51", + /* 83*/ "Infiltracin A51 X", + /* 84*/ "Rescate A51", + /* 85*/ "Rescate A51 X", + /* 86*/ "Escape A51", + /* 87*/ "Escape A51 X", + /* 88*/ "Base A駻ea", + /* 89*/ "Base A駻ea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Impacto", + /* 93*/ "Impacto X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Mar Profundo", + /* 97*/ "Mar Profundo X", + /* 98*/ "Defensa Instituto", + /* 99*/ "Defensa Instituto X", + /*100*/ "Acorazado", + /*101*/ "Acorazado X", + /*102*/ "Ruinas Skedar", + /*103*/ "Ruinas Skedar X", + /*104*/ "Cr馘itos ", + /*105*/ "Aleatorio\n", + /*106*/ "Seleccionar Todo\n", + /*107*/ "Deseleccionar Todo\n", + /*108*/ "Al azar\n", + /*109*/ "Inventario\n", + /*110*/ "Funcin\n", + /*111*/ "モrdenes\n", + /*112*/ "Sin Arma\n", + /*113*/ "Elige Objetivo\n", + /*114*/ "Seguir\n", + /*115*/ "Atacar\n", + /*116*/ "Defender\n", + /*117*/ "Mantener\n", + /*118*/ "Normal\n", + /*119*/ "Bajar\n", + /*120*/ "Obtener Maleta\n", + /*121*/ "Marcar Caja\n", + /*122*/ "Te mat", + /*123*/ "Mataste a", + /*124*/ "Iniciado:21\n", + /*125*/ "Aficionado:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novato:17\n", + /*129*/ "Soldado:16\n", + /*130*/ "Agente:15\n", + /*131*/ "A. Estrella:14\n", + /*132*/ "A. Especial:13\n", + /*133*/ "Experto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Profesional:10\n", + /*136*/ "Peligroso:9\n", + /*137*/ "Mortal:8\n", + /*138*/ "Ejecutor:7\n", + /*139*/ "Asesino:6\n", + /*140*/ "Letal:5\n", + /*141*/ "ノlite:4\n", + /*142*/ "Invencible:3\n", + /*143*/ "C. Perfecto:2\n", + /*144*/ "Perfecto:1\n", + /*145*/ "DARDOS", + /*146*/ "MODELO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salvar Caja\n", + /*149*/ "Defender Colina\n", + /*150*/ "Mantener Colina\n", + /*151*/ "Coger Maletn\n", + /*152*/ "Llevarla\n", + /*153*/ "Proteger\n", + /*154*/ "Todo Simulante\n", + /*155*/ "MODELO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Sin suficiente espacio para activar ", + /*158*/ "ACIERTOS NEC.:", + /*159*/ "PUNTUACIモN NEC.:", + /*160*/ "PRECISIモN MIN.:", + /*161*/ "DISPARA PARA EMPEZAR\n", + /*162*/ "。PREPARADO!\n", + /*163*/ "LヘMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "DIANA\n", + /*168*/ "EXPLOTADOS\n", + /*169*/ "Elvis ha muerto.\n", + /*170*/ "Estilo 1", + /*171*/ "Estilo 2", + /*172*/ "Estilo 3", + /*173*/ "Estilo 4", + /*174*/ "Rubio", + /*175*/ "Moreno", + /*176*/ "Castao", + /*177*/ "Azulado", + /*178*/ "Jugador", + /*179*/ "", + /*180*/ "Identificado\n", + /*181*/ "unused", + /*182*/ "Desafos\n", + /*183*/ "Cargar Juegos\n", + /*184*/ "Comienzo R疳ido\n", + /*185*/ "Conf. Avanzada\n", + /*186*/ "Simulador de Combate\n", + /*187*/ "Instituto Carrington\n", + /*188*/ "P. Equipo\n", + /*189*/ "Conf. Finalizada\n", + /*190*/ "Equipo Jugador 1\n", + /*191*/ "Equipo Jugador 2\n", + /*192*/ "Equipo Jugador 3\n", + /*193*/ "Equipo Jugador 4\n", + /*194*/ "Nmero de Simulantes\n", + /*195*/ "Simulantes por Equipo\n", + /*196*/ "Nivel de Simulantes\n", + /*197*/ "Empezar Juego\n", + /*198*/ "Abandonar\n", + /*199*/ "Opciones de Jugador\n", + /*200*/ "Opciones de Juego\n", + /*201*/ "Salida R疳ida\n", + /*202*/ "。Preparado!\n", + /*203*/ "Equipo R疳ido\n", + /*204*/ "Slo Jugadores\n", + /*205*/ "Jugadores y Simulantes\n", + /*206*/ "Equipos de Jugadores\n", + /*207*/ "Jugadores contra Simulantes\n", + /*208*/ "Equipos de Jugador-Simulante\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Repetir Misin Previa\n", + /*212*/ "Holografa\n", + /*213*/ "Agresivo\n", + /*214*/ "Pasivo\n", + /*215*/ "Camaradas\n", + /*216*/ "Sigiloso\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mp10E.c b/src/files/lang/pal-beta/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10J.c b/src/files/lang/pal-beta/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10P.c b/src/files/lang/pal-beta/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_f.c b/src/files/lang/pal-beta/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_g.c b/src/files/lang/pal-beta/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_i.c b/src/files/lang/pal-beta/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_s.c b/src/files/lang/pal-beta/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11E.c b/src/files/lang/pal-beta/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11J.c b/src/files/lang/pal-beta/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11P.c b/src/files/lang/pal-beta/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_f.c b/src/files/lang/pal-beta/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_g.c b/src/files/lang/pal-beta/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_i.c b/src/files/lang/pal-beta/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_s.c b/src/files/lang/pal-beta/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12E.c b/src/files/lang/pal-beta/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12J.c b/src/files/lang/pal-beta/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12P.c b/src/files/lang/pal-beta/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_f.c b/src/files/lang/pal-beta/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_g.c b/src/files/lang/pal-beta/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_i.c b/src/files/lang/pal-beta/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_s.c b/src/files/lang/pal-beta/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13E.c b/src/files/lang/pal-beta/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13J.c b/src/files/lang/pal-beta/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13P.c b/src/files/lang/pal-beta/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_f.c b/src/files/lang/pal-beta/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_g.c b/src/files/lang/pal-beta/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_i.c b/src/files/lang/pal-beta/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_s.c b/src/files/lang/pal-beta/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14E.c b/src/files/lang/pal-beta/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14J.c b/src/files/lang/pal-beta/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14P.c b/src/files/lang/pal-beta/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_f.c b/src/files/lang/pal-beta/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_g.c b/src/files/lang/pal-beta/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_i.c b/src/files/lang/pal-beta/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_s.c b/src/files/lang/pal-beta/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15E.c b/src/files/lang/pal-beta/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15J.c b/src/files/lang/pal-beta/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15P.c b/src/files/lang/pal-beta/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_f.c b/src/files/lang/pal-beta/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_g.c b/src/files/lang/pal-beta/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_i.c b/src/files/lang/pal-beta/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_s.c b/src/files/lang/pal-beta/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16E.c b/src/files/lang/pal-beta/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16J.c b/src/files/lang/pal-beta/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16P.c b/src/files/lang/pal-beta/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_f.c b/src/files/lang/pal-beta/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_g.c b/src/files/lang/pal-beta/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_i.c b/src/files/lang/pal-beta/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_s.c b/src/files/lang/pal-beta/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17E.c b/src/files/lang/pal-beta/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17J.c b/src/files/lang/pal-beta/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17P.c b/src/files/lang/pal-beta/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_f.c b/src/files/lang/pal-beta/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_g.c b/src/files/lang/pal-beta/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_i.c b/src/files/lang/pal-beta/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_s.c b/src/files/lang/pal-beta/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18E.c b/src/files/lang/pal-beta/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18J.c b/src/files/lang/pal-beta/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18P.c b/src/files/lang/pal-beta/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_f.c b/src/files/lang/pal-beta/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_g.c b/src/files/lang/pal-beta/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_i.c b/src/files/lang/pal-beta/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_s.c b/src/files/lang/pal-beta/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19E.c b/src/files/lang/pal-beta/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19J.c b/src/files/lang/pal-beta/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19P.c b/src/files/lang/pal-beta/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_f.c b/src/files/lang/pal-beta/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_g.c b/src/files/lang/pal-beta/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_i.c b/src/files/lang/pal-beta/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_s.c b/src/files/lang/pal-beta/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1E.c b/src/files/lang/pal-beta/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1J.c b/src/files/lang/pal-beta/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1P.c b/src/files/lang/pal-beta/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_f.c b/src/files/lang/pal-beta/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_g.c b/src/files/lang/pal-beta/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_i.c b/src/files/lang/pal-beta/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_s.c b/src/files/lang/pal-beta/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20E.c b/src/files/lang/pal-beta/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20J.c b/src/files/lang/pal-beta/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20P.c b/src/files/lang/pal-beta/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_f.c b/src/files/lang/pal-beta/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_g.c b/src/files/lang/pal-beta/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_i.c b/src/files/lang/pal-beta/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_s.c b/src/files/lang/pal-beta/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2E.c b/src/files/lang/pal-beta/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2J.c b/src/files/lang/pal-beta/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2P.c b/src/files/lang/pal-beta/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_f.c b/src/files/lang/pal-beta/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_g.c b/src/files/lang/pal-beta/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_i.c b/src/files/lang/pal-beta/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_s.c b/src/files/lang/pal-beta/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3E.c b/src/files/lang/pal-beta/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3J.c b/src/files/lang/pal-beta/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3P.c b/src/files/lang/pal-beta/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_f.c b/src/files/lang/pal-beta/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_g.c b/src/files/lang/pal-beta/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_i.c b/src/files/lang/pal-beta/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_s.c b/src/files/lang/pal-beta/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4E.c b/src/files/lang/pal-beta/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4J.c b/src/files/lang/pal-beta/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4P.c b/src/files/lang/pal-beta/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_f.c b/src/files/lang/pal-beta/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_g.c b/src/files/lang/pal-beta/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_i.c b/src/files/lang/pal-beta/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_s.c b/src/files/lang/pal-beta/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5E.c b/src/files/lang/pal-beta/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5J.c b/src/files/lang/pal-beta/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5P.c b/src/files/lang/pal-beta/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_f.c b/src/files/lang/pal-beta/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_g.c b/src/files/lang/pal-beta/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_i.c b/src/files/lang/pal-beta/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_s.c b/src/files/lang/pal-beta/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6E.c b/src/files/lang/pal-beta/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6J.c b/src/files/lang/pal-beta/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6P.c b/src/files/lang/pal-beta/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_f.c b/src/files/lang/pal-beta/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_g.c b/src/files/lang/pal-beta/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_i.c b/src/files/lang/pal-beta/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_s.c b/src/files/lang/pal-beta/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7E.c b/src/files/lang/pal-beta/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7J.c b/src/files/lang/pal-beta/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7P.c b/src/files/lang/pal-beta/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_f.c b/src/files/lang/pal-beta/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_g.c b/src/files/lang/pal-beta/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_i.c b/src/files/lang/pal-beta/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_s.c b/src/files/lang/pal-beta/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8E.c b/src/files/lang/pal-beta/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8J.c b/src/files/lang/pal-beta/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8P.c b/src/files/lang/pal-beta/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_f.c b/src/files/lang/pal-beta/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_g.c b/src/files/lang/pal-beta/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_i.c b/src/files/lang/pal-beta/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_s.c b/src/files/lang/pal-beta/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9E.c b/src/files/lang/pal-beta/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9J.c b/src/files/lang/pal-beta/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9P.c b/src/files/lang/pal-beta/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_f.c b/src/files/lang/pal-beta/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_g.c b/src/files/lang/pal-beta/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_i.c b/src/files/lang/pal-beta/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_s.c b/src/files/lang/pal-beta/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mpmenuE.c b/src/files/lang/pal-beta/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenuJ.c b/src/files/lang/pal-beta/mpmenuJ.c new file mode 100644 index 000000000..0329540db --- /dev/null +++ b/src/files/lang/pal-beta/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpmenuP.c b/src/files/lang/pal-beta/mpmenuP.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_f.c b/src/files/lang/pal-beta/mpmenu_str_f.c new file mode 100644 index 000000000..9fa83a5c1 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Super suicidaire\n", + /* 1*/ "Munitions? O?\n", + /* 2*/ "Le moins prot馮饅n", + /* 3*/ "Le mieux prot馮饅n", + /* 4*/ "Tireur d'駘ite\n", + /* 5*/ "Le plus pro\n", + /* 6*/ "Le plus meurtrier\n", + /* 7*/ "Le plus inoffensif\n", + /* 8*/ "Le plus p騁ochard\n", + /* 9*/ "Le plus dingue\n", + /* 10*/ "Le plus loyal\n", + /* 11*/ "Le plus fourbe\n", + /* 12*/ "Dur馥 de vie Mini\n", + /* 13*/ "Dur馥de vie Maxi\n", + /* 14*/ "Double frag\n", + /* 15*/ "Triple frag\n", + /* 16*/ "Quadruple frag\n", + /* 17*/ "Param鑼res jeu\n", + /* 18*/ "Charger param鑼res\n", + /* 19*/ "Sc駭ario\n", + /* 20*/ "Ar鈩es\n", + /* 21*/ "Options\n", + /* 22*/ "Equipes\n", + /* 23*/ "Armes\n", + /* 24*/ "Limites\n", + /* 25*/ "Simulants\n", + /* 26*/ "Sauvegarder param鑼res\n", + /* 27*/ "Abandonner jeu\n", + /* 28*/ "Param鑼res joueur\n", + /* 29*/ "Charger joueur\n", + /* 30*/ "Nom\n", + /* 31*/ "Personnages\n", + /* 32*/ "Handicap\n", + /* 33*/ "Manipulations\n", + /* 34*/ "Options joueur\n", + /* 35*/ "Statistiques\n", + /* 36*/ "Commencer jeu\n", + /* 37*/ "Abandonner\n", + /* 38*/ "Sauver joueur\n", + /* 39*/ "Sauver copie du joueur\n", + /* 40*/ "Trucs\n", + /* 41*/ "Musique\n", + /* 42*/ "Noms 駲uipes\n", + /* 43*/ "Ratio\n", + /* 44*/ "Verrou\n", + /* 45*/ "Aucun\n", + /* 46*/ "Dernier vainqueur\n", + /* 47*/ "Dernier perdant\n", + /* 48*/ "Hasard\n", + /* 49*/ "Challenge\n", + /* 50*/ "Challenges combat\n", + /* 51*/ "Abandonner Challenge\n", + /* 52*/ "Abandonner\n", + /* 53*/ "Voulez-vous vraiment\narr黎er la partie?\n", + /* 54*/ "Arr黎er\n", + /* 55*/ "Retour\n", + /* 56*/ "%s\n", + /* 57*/ "Accepter\n", + /* 58*/ "Retour\n", + /* 59*/ "Noms 駲uipes\n", + /* 60*/ "Retour\n", + /* 61*/ "Changer nom 駲uipe\n", + /* 62*/ "Musique\n", + /* 63*/ "Actuelle:\n", + /* 64*/ "Musiques multiples\n", + /* 65*/ "Retour\n", + /* 66*/ "Musiques multiples\n", + /* 67*/ "Hasard\n", + /* 68*/ "Choix musiques\n", + /* 69*/ "Choix musique\n", + /* 70*/ "Manip. 駲uipe\n", + /* 71*/ "Equipes activ馥s\n", + /* 72*/ "Equipes:\n", + /* 73*/ "Equipe auto...\n", + /* 74*/ "Retour\n", + /* 75*/ "Equipe auto\n", + /* 76*/ "Deux 駲uipes\n", + /* 77*/ "Trois 駲uipes\n", + /* 78*/ "Quatre 駲uipes\n", + /* 79*/ "Maximum 駲uipes\n", + /* 80*/ "Humains contre Simulants\n", + /* 81*/ "Duos Humain-Simulant\n", + /* 82*/ "Retour\n", + /* 83*/ "Simulants\n", + /* 84*/ "Ajouter Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Effacer tout\n", + /* 94*/ "Retour\n", + /* 95*/ "Difficult:\n", + /* 96*/ "Changer type...\n", + /* 97*/ "Personnage...\n", + /* 98*/ "Effacer Simulant\n", + /* 99*/ "Retour\n", + /*100*/ "Personnage Simulant\n", + /*101*/ "Ajouter Simulant\n", + /*102*/ "Changer Simulant\n", + /*103*/ "Simulants normaux\n", + /*104*/ "Simulants sp馗iaux\n", + /*105*/ "Pr黎!\n", + /*106*/ "...en attente\n", + /*107*/ "Limites\n", + /*108*/ "Temps\n", + /*109*/ "Score\n", + /*110*/ "R騁ablir par d馭aut\n", + /*111*/ "Retour\n", + /*112*/ "Pas de limite\n", + /*113*/ "%d\n", + /*114*/ "%d Min.\n", + /*115*/ "Ar鈩es\n", + /*116*/ "Dark\n", + /*117*/ "Classique\n", + /*118*/ "Hasard\n", + /*119*/ "Skedar", + /*120*/ "Conduits", + /*121*/ "Ravin", + /*122*/ "Immeuble G5", + /*123*/ "Egouts", + /*124*/ "Entrept", + /*125*/ "Grid", + /*126*/ "Ruines", + /*127*/ "Secteur 52", + /*128*/ "Base", + /*129*/ "Toit", + /*130*/ "Forteresse", + /*131*/ "Villa", + /*132*/ "Parking", + /*133*/ "Temple", + /*134*/ "Complexe", + /*135*/ "F駘icit", + /*136*/ "Hasard", + /*137*/ "Charger joueur\n", + /*138*/ "Bouton B pour annuler\n", + /*139*/ "Charger param鑼res jeu\n", + /*140*/ "%s: Sc駭ario: %s Ar鈩e: %s Simulants: %d", + /*141*/ "Pr駸駘ections\n", + /*142*/ "Nom joueur\n", + /*143*/ "Personnage\n", + /*144*/ "Charger t黎e...\n", + /*145*/ "Stats pour %s\n", + /*146*/ "Tu駸:\n", + /*147*/ "Morts:\n", + /*148*/ "Pr馗ision:\n", + /*149*/ "Tirs t黎e:\n", + /*150*/ "Mun. utilis馥s:\n", + /*151*/ "D馮穰s inflig駸:\n", + /*152*/ "D馮穰s re輹s:\n", + /*153*/ "Parties jou馥s:\n", + /*154*/ "Parties gagn馥s:\n", + /*155*/ "Parties perdues:\n", + /*156*/ "Temps:\n", + /*157*/ "Distance:\n", + /*158*/ "M馘ailles gagn馥s:\n", + /*159*/ " Pr馗ision:\n", + /*160*/ " Tirs t黎e:\n", + /*161*/ " Tueur:\n", + /*162*/ " Survivant:\n", + /*163*/ "Votre titre:\n", + /*164*/ "Retour\n", + /*165*/ "Challenges compl騁駸\n", + /*166*/ "Retour\n", + /*167*/ "Options\n", + /*168*/ "Voir r馗up.\n", + /*169*/ "Voir joueurs\n", + /*170*/ "Voir 駲uipes\n", + /*171*/ "Radar\n", + /*172*/ "Retour\n", + /*173*/ "Armes\n", + /*174*/ "Choix:\n", + /*175*/ "Param鑼res armes actuels:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Retour\n", + /*183*/ "Sauver param鑼res jeu\n", + /*184*/ "Voulez-vous 馗raser\nvotre fichier original?\n", + /*185*/ "Ecraser fichier original\n", + /*186*/ "Sauver copie\n", + /*187*/ "Ne pas sauver\n", + /*188*/ "Nom fichier\n", + /*189*/ "Entrer un nom pour votre\nfichier de param鑼res:\n", + /*190*/ "Confirmer\n", + /*191*/ "Votre fichier joueur\nest toujours sauv饅nautomatiquement.\n", + /*192*/ "Sauver une copie maintenant?\n", + /*193*/ "Non\n", + /*194*/ "Oui\n", + /*195*/ "Abandonner\n", + /*196*/ "Voulez-vous vraiment\nabandonner?\n", + /*197*/ "Abandonner\n", + /*198*/ "Retour\n", + /*199*/ "Manipulations\n", + /*200*/ "Style manip.\n", + /*201*/ "Inverser axe\n", + /*202*/ "Voir devant\n", + /*203*/ "Mouv. t黎e\n", + /*204*/ "Vis馥 auto\n", + /*205*/ "Contrle vis馥\n", + /*206*/ "Cible l'馗ran\n", + /*207*/ "Voir cible\n", + /*208*/ "Port馥 zoom\n", + /*209*/ "Munit. l'馗ran\n", + /*210*/ "Fonction arme\n", + /*211*/ "Paintball\n", + /*212*/ "Retour\n", + /*213*/ "Maintenu\n", + /*214*/ "Fixe\n", + /*215*/ "Options combat\n", + /*216*/ "Options mallette\n", + /*217*/ "Options hacker\n", + /*218*/ "Options d馗apsuleur\n", + /*219*/ "Options zone\n", + /*220*/ "Options capture\n", + /*221*/ "Options botes\n", + /*222*/ "Pan! T'es mort!\n", + /*223*/ "Ralenti\n", + /*224*/ "Mouvement rapide\n", + /*225*/ "Afficher 駲uipe\n", + /*226*/ "Sans radar\n", + /*227*/ "Sans vis馥 auto\n", + /*228*/ "Sans voir joueur\n", + /*229*/ "Sans voir r馗up.\n", + /*230*/ "Voir cible\n", + /*231*/ "Voir Terminal\n", + /*232*/ "Botes sur radar\n", + /*233*/ "Zone sur radar\n", + /*234*/ "Zone mobile\n", + /*235*/ "Temps\n", + /*236*/ "Visible sur radar\n", + /*237*/ "Voir mallette\n", + /*238*/ "Voir sur radar\n", + /*239*/ "Retour\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Custom\n", + /*243*/ "Sc駭ario\n", + /*244*/ "Chacun pour soi!\n", + /*245*/ "-Equipes-\n", + /*246*/ "Combat", + /*247*/ "Tenir la mallette", + /*248*/ "Centre hacker", + /*249*/ "D馗apsuleur", + /*250*/ "Roi de la zone", + /*251*/ "Capturer la mallette", + /*252*/ "Toucher la bote", + /*253*/ "Combat", + /*254*/ "Mallette", + /*255*/ "Hacker", + /*256*/ "D馗aps.", + /*257*/ "Zone", + /*258*/ "Capture", + /*259*/ "Botes", + /*260*/ "Game Over\n", + /*261*/ "Titre:\n", + /*262*/ "Arme de pr馘ilection:\n", + /*263*/ "Prix:\n", + /*264*/ "1er\n", + /*265*/ "2鑪e\n", + /*266*/ "3鑪e\n", + /*267*/ "4鑪e\n", + /*268*/ "5鑪e\n", + /*269*/ "6鑪e\n", + /*270*/ "7鑪e\n", + /*271*/ "8鑪e\n", + /*272*/ "9鑪e\n", + /*273*/ "10鑪e\n", + /*274*/ "11鑪e\n", + /*275*/ "12鑪e\n", + /*276*/ "Classement joueur\n", + /*277*/ "Morts\n", + /*278*/ "Score\n", + /*279*/ "Classement 駲uipe\n", + /*280*/ "Stats de %s", + /*281*/ "Suicides\n", + /*282*/ "Morts\n", + /*283*/ "Tu駸\n", + /*284*/ "Inventaire\n", + /*285*/ "Manipulation\n", + /*286*/ "Temps de jeu:\n", + /*287*/ "Fin de jeu\n", + /*288*/ "Pause\n", + /*289*/ "Reprendre\n", + /*290*/ "Fin jeu\n", + /*291*/ "Etes-vous sr?\n", + /*292*/ "Annuler\n", + /*293*/ "Fin jeu\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Bouton B pour Retour.\n", + /*415*/ "Hangar d'information\n", + /*416*/ "Holo-entranement\n", + /*417*/ "Liste appareils\n", + /*418*/ "Informations\n", + /*419*/ "Emplacements\n", + /*420*/ "V馼icules\n", + /*421*/ "Profils personnages\n", + /*422*/ "Autres informations\n", + /*423*/ "Stats entranement\n", + /*424*/ "Temps 馗oul:\n", + /*425*/ "Succ鑚!\n", + /*426*/ "Echec!\n", + /*427*/ "Ok\n", + /*428*/ "Reprendre\n", + /*429*/ "Annuler\n", + /*430*/ "Abandonner\n", + /*431*/ "Profil personnage\n", + /*432*/ "Nom:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Bouton B pour Retour.\n", + /*436*/ "Triche\n", + /*437*/ "Vous pouvez 騁eindre votre ordinateur en toute s馗urit.\n", + /*438*/ "Annuler\n", + /*439*/ "Bronze\n", + /*440*/ "Argent\n", + /*441*/ "Or\n", + /*442*/ "Difficult饅n", + /*443*/ "Difficult:\n", + /*444*/ "Choix difficult:\n", + /*445*/ " \n", + /*446*/ "Arme\n", + /*447*/ "Info entranement\n", + /*448*/ "Stats entranement\n", + /*449*/ "Succ鑚!\n", + /*450*/ "Score:\n", + /*451*/ "Cibles d騁ruites:\n", + /*452*/ "Difficult:\n", + /*453*/ "Temps 馗oul:\n", + /*454*/ "Arme:\n", + /*455*/ "Pr馗ision:\n", + /*456*/ "Pas 馗hou饅n", + /*457*/ "Plus de munit.\n", + /*458*/ "Fin chrono\n", + /*459*/ "Score non atteint\n", + /*460*/ "Trop impr馗is\n", + /*461*/ "Centre\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Score\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munit.:\n", + /*472*/ "Limite temps:\n", + /*473*/ "Pr馗ision Mini:\n", + /*474*/ "Cibles d騁ruire:\n", + /*475*/ "Score atteindre:\n", + /*476*/ "Triche\n", + /*477*/ "Termin饅n", + /*478*/ "Attention\n", + /*479*/ "En utilsant les codes de triche\nvous ne pourrez pas progresser dans le jeu \ntant que ceux-ci seront activ駸.\n", + /*480*/ "OK\n", + /*481*/ "Annuler\n", + /*482*/ "Joueur %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_g.c b/src/files/lang/pal-beta/mpmenu_str_g.c new file mode 100644 index 000000000..8e7e91577 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Der Suizidalste\n", + /* 1*/ "Wer braucht Muni?\n", + /* 2*/ "Am wenigsten beschildet\n", + /* 3*/ "Bestgeschtzter\n", + /* 4*/ "Der Treffsicherste\n", + /* 5*/ "Der Professionellste\n", + /* 6*/ "Der Gef臧rlichste\n", + /* 7*/ "Der Harmloseste\n", + /* 8*/ "Der Feigste\n", + /* 9*/ "Der Verzweifeltste\n", + /* 10*/ "Der Ehrenhafteste\n", + /* 11*/ "Der Unehrenhafteste\n", + /* 12*/ "Eintagsfliege\n", + /* 13*/ "Methusalem\n", + /* 14*/ "Doppel-Treffer\n", + /* 15*/ "Dreifach-Treffer\n", + /* 16*/ "Vierfach-Treffer\n", + /* 17*/ "Spiel-Einstellungen\n", + /* 18*/ "Einstellungen laden\n", + /* 19*/ "Szenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Optionen\n", + /* 22*/ "Teams\n", + /* 23*/ "Waffen\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulanten\n", + /* 26*/ "Einstellungen speichern\n", + /* 27*/ "Spiel abbrechen\n", + /* 28*/ "Spieler-Einstellungen\n", + /* 29*/ "Spieler laden\n", + /* 30*/ "Name\n", + /* 31*/ "Charakter\n", + /* 32*/ "Handicap\n", + /* 33*/ "Steuerung\n", + /* 34*/ "Spieler-Optionen\n", + /* 35*/ "Statistik\n", + /* 36*/ "Spielstart\n", + /* 37*/ "Abbruch\n", + /* 38*/ "Spieler speichern\n", + /* 39*/ "Spieler nochmals speichern\n", + /* 40*/ "Zeugs\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team-Namen\n", + /* 43*/ "Rate\n", + /* 44*/ "Sperre\n", + /* 45*/ "keine\n", + /* 46*/ "Letzter Gewinner\n", + /* 47*/ "Letzter Verlierer\n", + /* 48*/ "zuf舁lig\n", + /* 49*/ "Challenge\n", + /* 50*/ "Kampf-Challenge\n", + /* 51*/ "Challenge abbrechen\n", + /* 52*/ "Abbruch\n", + /* 53*/ "Sind Sie sicher, dass Sie\ndas Spiel abbrechen mchten?\n", + /* 54*/ "Abbruch\n", + /* 55*/ "Zurck\n", + /* 56*/ "%s\n", + /* 57*/ "Annehmen\n", + /* 58*/ "Zurck\n", + /* 59*/ "Team-Namen\n", + /* 60*/ "Zurck\n", + /* 61*/ "Team-Name 舅dern\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Derzeit:\n", + /* 64*/ "Multiple Soundtracks\n", + /* 65*/ "Zurck\n", + /* 66*/ "Multiple Soundtracks\n", + /* 67*/ "zuf舁lig\n", + /* 68*/ "W臧le Soundtracks\n", + /* 69*/ "W臧le Soundtrack\n", + /* 70*/ "Team-Steuerung\n", + /* 71*/ "Teams erm臘htigt\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto-Team...\n", + /* 74*/ "Zurck\n", + /* 75*/ "Auto-Team\n", + /* 76*/ "Zwei Teams\n", + /* 77*/ "Drei Teams\n", + /* 78*/ "Vier Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Menschen vs. Simulanten\n", + /* 81*/ "Menschen-Simulanten Paare\n", + /* 82*/ "Zurck\n", + /* 83*/ "Simulanten\n", + /* 84*/ "Simulant hinzufgen...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Alle lschen\n", + /* 94*/ "Zurck\n", + /* 95*/ "Schwierigkeit:\n", + /* 96*/ "Typ wechseln...\n", + /* 97*/ "Charakter...\n", + /* 98*/ "Simulant lschen\n", + /* 99*/ "Zurck\n", + /*100*/ "Simulanten-Charakter\n", + /*101*/ "Simulant hinzufgen\n", + /*102*/ "Simulant wechseln\n", + /*103*/ "Normale Simulanten\n", + /*104*/ "Spezielle Simulanten\n", + /*105*/ "Fertig!\n", + /*106*/ "...und bereit\n", + /*107*/ "Limits\n", + /*108*/ "Zeit\n", + /*109*/ "Score\n", + /*110*/ "Grundeinstellung\n", + /*111*/ "Zurck\n", + /*112*/ "Unbegr.\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "zuf舁lig\n", + /*119*/ "Skedar", + /*120*/ "Rohre", + /*121*/ "Graben", + /*122*/ "G5-Building", + /*123*/ "Kan舁e", + /*124*/ "Lagerhaus", + /*125*/ "Netz", + /*126*/ "Ruinen", + /*127*/ "Area 52", + /*128*/ "Basis", + /*129*/ "D臘her", + /*130*/ "Festung", + /*131*/ "Villa", + /*132*/ "Parkdeck", + /*133*/ "Tempel", + /*134*/ "Komplex", + /*135*/ "Glckseligkeit", + /*136*/ "Zuf舁lig", + /*137*/ "Spieler laden\n", + /*138*/ "B-Knopf fr Abbruch\n", + /*139*/ "Spieleinstellungen laden\n", + /*140*/ "%s: Szenario: %s Arena: %s Simulanten: %d", + /*141*/ "Voreinstellungen\n", + /*142*/ "Spieler-Name\n", + /*143*/ "Charakter\n", + /*144*/ "Kopf laden...\n", + /*145*/ "Statistik fr %s\n", + /*146*/ "Treff.:\n", + /*147*/ "Versuche:\n", + /*148*/ "Genauigkeit:\n", + /*149*/ "Kopftreffer:\n", + /*150*/ "Verbrauchte Muni:\n", + /*151*/ "Schaden verursacht:\n", + /*152*/ "Schmerzen ertragen:\n", + /*153*/ "Spiele gesamt:\n", + /*154*/ "Gewinne:\n", + /*155*/ "Verluste:\n", + /*156*/ "Zeit:\n", + /*157*/ "Distanz:\n", + /*158*/ "Medaillen:\n", + /*159*/ " Genauigkeit:\n", + /*160*/ " Kopftreffer:\n", + /*161*/ " Meisterschtze:\n", + /*162*/ " ワberlebender:\n", + /*163*/ "Ihr Titel:\n", + /*164*/ "Zurck\n", + /*165*/ "Challenges komplettiert\n", + /*166*/ "Zurck\n", + /*167*/ "Optionen\n", + /*168*/ "Items anzeigen\n", + /*169*/ "Spieler anzeigen\n", + /*170*/ "Teams anzeigen\n", + /*171*/ "Radar\n", + /*172*/ "Zurck\n", + /*173*/ "Bewaffnung\n", + /*174*/ "Einstellung:\n", + /*175*/ "Aktuelle Einstellung:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Zurck\n", + /*183*/ "Einstellungen speichern\n", + /*184*/ "Mchten Sie das \nbestehende File\nberschreiben?\n", + /*185*/ "ワberschreiben\n", + /*186*/ "Kopieren\n", + /*187*/ "Nicht speichern\n", + /*188*/ "File-Name\n", + /*189*/ "Bitte benennen Sie\nIhr File:\n", + /*190*/ "Best舩igen\n", + /*191*/ "Ihr Spieler-File wird\nimmer automatisch\ngespeichert.\n", + /*192*/ "Kopie speichern?\n", + /*193*/ "Nein\n", + /*194*/ "Ja\n", + /*195*/ "Abbruch\n", + /*196*/ "Sind Sie sicher, dass\nSie abbrechen wollen?\n", + /*197*/ "Abbrechen\n", + /*198*/ "Zurck\n", + /*199*/ "Steuerung\n", + /*200*/ "Steuerungsart\n", + /*201*/ "Blick vertauschen\n", + /*202*/ "Vorausschauen\n", + /*203*/ "Kopfneigung\n", + /*204*/ "Auto-Ziel\n", + /*205*/ "Ziel-Steuerung\n", + /*206*/ "Screen-Anzeigen\n", + /*207*/ "Ziel zeigen\n", + /*208*/ "Zoom-Bereich\n", + /*209*/ "Munition anzeigen\n", + /*210*/ "Funktion anzeigen\n", + /*211*/ "Paintball\n", + /*212*/ "Zurck\n", + /*213*/ "Halten\n", + /*214*/ "Umschalten\n", + /*215*/ "Kampf-Optionen\n", + /*216*/ "Aktenkoffer-Optionen\n", + /*217*/ "Hacker-Optionen\n", + /*218*/ "Pop a Cap-Optionen\n", + /*219*/ "Hgel-Optionen\n", + /*220*/ "Fang-Optionen\n", + /*221*/ "Boxen-Optionen\n", + /*222*/ "Ein Treffer\n", + /*223*/ "Zeitlupe\n", + /*224*/ "Zeitraffer\n", + /*225*/ "Team anzeigen\n", + /*226*/ "Kein Radar\n", + /*227*/ "Kein Auto-Ziel\n", + /*228*/ "Spieler nicht anzeigen\n", + /*229*/ "Items nicht anzeigen\n", + /*230*/ "Ziel anzeigen\n", + /*231*/ "Terminal anzeigen\n", + /*232*/ "Boxen am Radar zeigen\n", + /*233*/ "Hgel am Radar zeigen\n", + /*234*/ "Mobiler Hgel\n", + /*235*/ "Zeit\n", + /*236*/ "Am Radar zeigen\n", + /*237*/ "Aktenkoffer anzeigen\n", + /*238*/ "Am Radar zeigen\n", + /*239*/ "Zurck\n", + /*240*/ "Aus\n", + /*241*/ "Ein\n", + /*242*/ "Smart\n", + /*243*/ "Szenario\n", + /*244*/ "Frei fr alle!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Kampf", + /*247*/ "Verteidigen Sie den Aktenkoffer", + /*248*/ "Hacker-Zentrale", + /*249*/ "Pop a Cap", + /*250*/ "Herr des Hgels", + /*251*/ "Schnapp den Koffer", + /*252*/ "Berhr die Box", + /*253*/ "Kampf", + /*254*/ "Aktenkoffer", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hgel", + /*258*/ "Fang", + /*259*/ "Boxen", + /*260*/ "Game Over\n", + /*261*/ "Titel:\n", + /*262*/ "Bevorzugte Waffe:\n", + /*263*/ "Preise:\n", + /*264*/ "1.\n", + /*265*/ "2.\n", + /*266*/ "3.\n", + /*267*/ "4.\n", + /*268*/ "5.\n", + /*269*/ "6.\n", + /*270*/ "7.\n", + /*271*/ "8.\n", + /*272*/ "9.\n", + /*273*/ "10.\n", + /*274*/ "11.\n", + /*275*/ "12.\n", + /*276*/ "Spieler-Bewertung\n", + /*277*/ "Versuche\n", + /*278*/ "Score\n", + /*279*/ "Team-Bewertung\n", + /*280*/ "Statistik fr %s", + /*281*/ "Selber Schuld\n", + /*282*/ "Versuche\n", + /*283*/ "Treffer\n", + /*284*/ "Inventar\n", + /*285*/ "Steuerung\n", + /*286*/ "Spielzeit:\n", + /*287*/ "Spiel beenden\n", + /*288*/ "Pause\n", + /*289*/ "Pause beenden\n", + /*290*/ "Spiel beenden\n", + /*291*/ "Sind Sie sicher?\n", + /*292*/ "Zurck\n", + /*293*/ "Spiel beenden\n", + /*294*/ "PerfectHead\n", + /*295*/ "Gespeicherten Kopf laden\n", + /*296*/ "Neuen Kopf erstellen\n", + /*297*/ "Kopf editieren\n", + /*298*/ "PerfectHead editieren\n", + /*299*/ "W臧le den Kopf:\n", + /*300*/ "Abbruch\n", + /*301*/ "Neuen Kopf erstellen\n", + /*302*/ "Gespeicherten Kopf laden\n", + /*303*/ "Wo mchtest du diesen\n", + /*304*/ "Kopf einsetzen?\n", + /*305*/ "Kampfsimulator\n", + /*306*/ "Alle Missionen\n", + /*307*/ "Beide\n", + /*308*/ "Abbruch\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "PerfectHead laden\n", + /*339*/ "Legen Sie das Controller Pak\n", + /*340*/ "mit dem Kopf, den Sie laden\n", + /*341*/ "mchten in einen beliebigen\n", + /*342*/ "Controller ein.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Abbruch\n", + /*345*/ "Quelle:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "PerfectHead speichern\n", + /*393*/ "Sie knnen jetzt den Kopf auf\n", + /*394*/ "ein Controller Pak speichern.\n", + /*395*/ "In diesem Fall stellen Sie bitte\n", + /*396*/ "sicher, dass ein Controller Pak\n", + /*397*/ "eingelegt ist. W臧len Sie \"Speichern\".\n", + /*398*/ "Speichern\n", + /*399*/ "Nicht speichern\n", + /*400*/ "Kopf wurde erstellt!\n", + /*401*/ "Um diesen Kopf im Kampsimulator einzusetzen,\n", + /*402*/ "w臧len Sie ihn aus dem Charakter-Men vom\n", + /*403*/ "Spieler/Simulanten-Einstellungs-Men.\n", + /*404*/ "Die gewnschten Kpfe erscheinen nun\n", + /*405*/ "in allen Missionen, die Sie spielen.\n", + /*406*/ "Sie knnen den Kopf nun noch weiter editieren.\n", + /*407*/ "Beenden\n", + /*408*/ "Kopf editieren\n", + /*409*/ "Farbe des Kopfes:\n", + /*410*/ "Gesicht:\n", + /*411*/ "Frisur:\n", + /*412*/ "OK\n", + /*413*/ "Abbruch\n", + /*414*/ "Drcken Sie den B-Knopf, um zurckzukehren.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Ger舩e-Liste\n", + /*418*/ "Information\n", + /*419*/ "ヨrtlichkeiten\n", + /*420*/ "Fahrzeuge\n", + /*421*/ "Character-Profile\n", + /*422*/ "Weitere Informationen\n", + /*423*/ "Trainings-Statistik\n", + /*424*/ "bentigte Zeit:\n", + /*425*/ "Abgeschlossen!\n", + /*426*/ "Durchgefallen!\n", + /*427*/ "OK\n", + /*428*/ "Weiter\n", + /*429*/ "Zurck\n", + /*430*/ "Abbruch\n", + /*431*/ "Character-Profile\n", + /*432*/ "Name:\n", + /*433*/ "Alter:\n", + /*434*/ "Rasse:\n", + /*435*/ "Drcken Sie den B-Knopf, um zurckzukehren.\n", + /*436*/ "Cheats\n", + /*437*/ "Sie knnen das Ger舩 jetzt abschalten.\n", + /*438*/ "Abbruch\n", + /*439*/ "Bronze\n", + /*440*/ "Silber\n", + /*441*/ "Gold\n", + /*442*/ "Schwierigkeit\n", + /*443*/ "Schwierigkeit:\n", + /*444*/ "W臧len Sie die Schwierigkeit:\n", + /*445*/ " \n", + /*446*/ "Waffe\n", + /*447*/ "Trainings-Info\n", + /*448*/ "Trainings-Statistik\n", + /*449*/ "Abgeschlossen!\n", + /*450*/ "Score:\n", + /*451*/ "Getroffene Ziele:\n", + /*452*/ "Schwierigkeit:\n", + /*453*/ "bentigte Zeit:\n", + /*454*/ "Waffe:\n", + /*455*/ "Genauigkeit:\n", + /*456*/ "Nicht durchgefallen\n", + /*457*/ "Keine Munition\n", + /*458*/ "Zeit abgelaufen\n", + /*459*/ "Score unerreichbar\n", + /*460*/ "Zu ungenau\n", + /*461*/ "Bingo\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Munitions-Limit:\n", + /*472*/ "Zeit-Limit:\n", + /*473*/ "Min. Genauigkeit:\n", + /*474*/ "Ziele:\n", + /*475*/ "Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Fertig\n", + /*478*/ "Warnung!\n", + /*479*/ "Sollten Sie Cheats aktivieren, knnen Sie nicht\nweiter ins Spiel vordringen, solange\ndiese Cheats aktiv sind.\n", + /*480*/ "OK\n", + /*481*/ "Zurck\n", + /*482*/ "Spieler %d: ", + /*483*/ "Drcken Sie START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Controller Pak wird geprft\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_i.c b/src/files/lang/pal-beta/mpmenu_str_i.c new file mode 100644 index 000000000..3ac5cda70 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Che schifo!\n", + /* 1*/ "Servono munizioni?\n", + /* 2*/ "Protezione minima\n", + /* 3*/ "Protezione massima\n", + /* 4*/ "Precisione di tiro\n", + /* 5*/ "Professionale\n", + /* 6*/ "Micidiale\n", + /* 7*/ "Innocuo\n", + /* 8*/ "Codardo\n", + /* 9*/ "Disperato\n", + /* 10*/ "Lodevole\n", + /* 11*/ "Disonorevole\n", + /* 12*/ "Vita pi breve\n", + /* 13*/ "Vita pi lunga\n", + /* 14*/ "Ucciso 2 volte\n", + /* 15*/ "Ucciso 3 volte\n", + /* 16*/ "Ucciso 4 volte\n", + /* 17*/ "Impostazioni gioco\n", + /* 18*/ "Carica impostazioni\n", + /* 19*/ "Ambientazione\n", + /* 20*/ "Scena\n", + /* 21*/ "Opzioni\n", + /* 22*/ "Squadre\n", + /* 23*/ "Armi\n", + /* 24*/ "Limiti\n", + /* 25*/ "Replicanti\n", + /* 26*/ "Salva impostazioni\n", + /* 27*/ "Interrompi gioco\n", + /* 28*/ "Impostaz. giocatore\n", + /* 29*/ "Carica giocatore\n", + /* 30*/ "Nome\n", + /* 31*/ "Personaggio\n", + /* 32*/ "Svantaggi\n", + /* 33*/ "Comandi\n", + /* 34*/ "Opzioni giocatore\n", + /* 35*/ "Statistiche\n", + /* 36*/ "Avvio gioco\n", + /* 37*/ "Esci\n", + /* 38*/ "Salva Giocatore\n", + /* 39*/ "Salva Copia Giocatore\n", + /* 40*/ "Varie\n", + /* 41*/ "Colonna sonora\n", + /* 42*/ "Nomi squadre\n", + /* 43*/ "Rapporto\n", + /* 44*/ "Blocco\n", + /* 45*/ "Nessuno\n", + /* 46*/ "Ultimo vincitore\n", + /* 47*/ "Ultimo perdente\n", + /* 48*/ "A caso\n", + /* 49*/ "Sfida\n", + /* 50*/ "Sfide di lotta\n", + /* 51*/ "Interrompi la sfida\n", + /* 52*/ "Interrompi\n", + /* 53*/ "Desideri veramente\ninterrompere il gioco?\n", + /* 54*/ "Interrompi\n", + /* 55*/ "Annulla\n", + /* 56*/ "%s\n", + /* 57*/ "Accetta\n", + /* 58*/ "Annulla\n", + /* 59*/ "Nomi squadre\n", + /* 60*/ "Esci\n", + /* 61*/ "Cambia nomi squadre\n", + /* 62*/ "Colonna sonora\n", + /* 63*/ "Attuale:\n", + /* 64*/ "Pi brani\n", + /* 65*/ "Esci\n", + /* 66*/ "Brani multipli\n", + /* 67*/ "A caso\n", + /* 68*/ "Seleziona brani\n", + /* 69*/ "Seleziona brano\n", + /* 70*/ "Comandi squadra\n", + /* 71*/ "Squadre attivate\n", + /* 72*/ "Squadre:\n", + /* 73*/ "Squadra automatica...\n", + /* 74*/ "Esci\n", + /* 75*/ "Squadra automatica\n", + /* 76*/ "Due squadre\n", + /* 77*/ "Tre squadre\n", + /* 78*/ "Quattro squadre\n", + /* 79*/ "Squadre al massimo\n", + /* 80*/ "Umani contro replic.\n", + /* 81*/ "Coppie umani-replic.\n", + /* 82*/ "Annulla\n", + /* 83*/ "Replicanti\n", + /* 84*/ "Aggiungi replicanti...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Cancella tutto\n", + /* 94*/ "Esci\n", + /* 95*/ "Difficolt:\n", + /* 96*/ "Cambia tipo...\n", + /* 97*/ "Personaggio...\n", + /* 98*/ "Cancella replicante\n", + /* 99*/ "Esci\n", + /*100*/ "Personaggio replicante\n", + /*101*/ "Aggiungi replicante\n", + /*102*/ "Cambia replicante\n", + /*103*/ "Replicanti normali\n", + /*104*/ "Replicanti speciali\n", + /*105*/ "Pronti!\n", + /*106*/ "...attendere\n", + /*107*/ "Limiti\n", + /*108*/ "Tempo\n", + /*109*/ "Punteggio\n", + /*110*/ "Ripristina impostaz.\n", + /*111*/ "Esci\n", + /*112*/ "No limite\n", + /*113*/ "%d\n", + /*114*/ "%d min\n", + /*115*/ "Scena\n", + /*116*/ "Dark\n", + /*117*/ "Classica\n", + /*118*/ "A caso\n", + /*119*/ "Skedar", + /*120*/ "Condotte", + /*121*/ "Burrone", + /*122*/ "Edificio G5", + /*123*/ "Fognature", + /*124*/ "Magazzino", + /*125*/ "Griglia", + /*126*/ "Rovine", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Tetto", + /*130*/ "Fortezza", + /*131*/ "Villa", + /*132*/ "Parcheggio", + /*133*/ "Tempio", + /*134*/ "Complesso", + /*135*/ "Felicit", + /*136*/ "A caso", + /*137*/ "Carica giocatore\n", + /*138*/ "Premi B per annullare\n", + /*139*/ "Carica impostaz. gioco\n", + /*140*/ "%s: Ambientazione: %s Scena: %s Replicanti: %d", + /*141*/ "Impostazioni\n", + /*142*/ "Nome giocatore\n", + /*143*/ "Personaggio\n", + /*144*/ "Carica testa...\n", + /*145*/ "Statist. per %s\n", + /*146*/ "Vittime:\n", + /*147*/ "Decessi:\n", + /*148*/ "Precisione:\n", + /*149*/ "Colpi al capo:\n", + /*150*/ "Munizioni usate:\n", + /*151*/ "Danno arrecato:\n", + /*152*/ "Danno subito:\n", + /*153*/ "Partite giocate:\n", + /*154*/ "Partite vinte:\n", + /*155*/ "Partite perse:\n", + /*156*/ "Tempo:\n", + /*157*/ "Distanza:\n", + /*158*/ "Medaglie vinte:\n", + /*159*/ " Precisione:\n", + /*160*/ " Colpi al capo:\n", + /*161*/ " Campione:\n", + /*162*/ " Superstite:\n", + /*163*/ "Tuo titolo:\n", + /*164*/ "Esci\n", + /*165*/ "Sfide completate\n", + /*166*/ "Esci\n", + /*167*/ "Opzioni\n", + /*168*/ "Mostra strumenti\n", + /*169*/ "Mostra giocatori\n", + /*170*/ "Mostra squadre\n", + /*171*/ "Radar\n", + /*172*/ "Esci\n", + /*173*/ "Armi\n", + /*174*/ "Imposta:\n", + /*175*/ "Impostaz. attuali armi:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Esci\n", + /*183*/ "Salva impostaz. gioco\n", + /*184*/ "Vuoi salvare sul file\ndi gioco originale?\n", + /*185*/ "Salva su originale\n", + /*186*/ "Salva copia\n", + /*187*/ "Non salvare\n", + /*188*/ "Nome del file partita\n", + /*189*/ "Digita nome per il file\nimpostazioni gioco:\n", + /*190*/ "Conferma\n", + /*191*/ "Il file giocatore 鐔nsempre salvato\nautomaticamente.\n", + /*192*/ "Salvarne una copia?\n", + /*193*/ "No\n", + /*194*/ "S\n", + /*195*/ "Esci\n", + /*196*/ "Desideri veramente\nuscire?\n", + /*197*/ "Esci\n", + /*198*/ "Annulla\n", + /*199*/ "Comandi\n", + /*200*/ "Modalit comandi\n", + /*201*/ "Inv. punto vista\n", + /*202*/ "Vista in avanti\n", + /*203*/ "Rotazione testa\n", + /*204*/ "Mira automatica\n", + /*205*/ "Mirino\n", + /*206*/ "Vista su schermo\n", + /*207*/ "Mostra obiettivo\n", + /*208*/ "Area zoom\n", + /*209*/ "Munizioni\n", + /*210*/ "Funzioni arma\n", + /*211*/ "Macchia colorata\n", + /*212*/ "Esci\n", + /*213*/ "Tieni premuto\n", + /*214*/ "Attiva/disattiva\n", + /*215*/ "Opzioni lotta\n", + /*216*/ "Opzioni cartella\n", + /*217*/ "Opzioni hacker\n", + /*218*/ "Opzioni tutti contro 1\n", + /*219*/ "Opzioni colle\n", + /*220*/ "Opzioni cassa\n", + /*221*/ "Opzioni box\n", + /*222*/ "Vittime in un colpo\n", + /*223*/ "Al rallentatore\n", + /*224*/ "Accelerato\n", + /*225*/ "Mostra squadra\n", + /*226*/ "Nessun Radar\n", + /*227*/ "No mira autom.\n", + /*228*/ "Nascondi giocatori\n", + /*229*/ "Nascondi strumenti\n", + /*230*/ "Mostra obiettivo\n", + /*231*/ "Mostra terminale\n", + /*232*/ "Box su radar\n", + /*233*/ "Colle su radar\n", + /*234*/ "Colle mobile\n", + /*235*/ "Tempo\n", + /*236*/ "Mostra su radar\n", + /*237*/ "Mostra cartella\n", + /*238*/ "Mostra su radar\n", + /*239*/ "Esci\n", + /*240*/ "No\n", + /*241*/ "S\n", + /*242*/ "Furbo\n", + /*243*/ "Ambientazione\n", + /*244*/ "Per tutti!\n", + /*245*/ "-Collaborazione-\n", + /*246*/ "Lotta", + /*247*/ "Tieni cartella", + /*248*/ "Centrale Hacker", + /*249*/ "Tutti contro 1", + /*250*/ "Re del colle", + /*251*/ "Prendi la cassa", + /*252*/ "Tocca quel box", + /*253*/ "Lotta", + /*254*/ "Cartella", + /*255*/ "Hacker", + /*256*/ "Contro 1", + /*257*/ "Colle", + /*258*/ "Cassa", + /*259*/ "Box", + /*260*/ "Fine partita\n", + /*261*/ "Titolo:\n", + /*262*/ "Arma pi usata:\n", + /*263*/ "Premi:\n", + /*264*/ "1ー\n", + /*265*/ "2ー\n", + /*266*/ "3ー\n", + /*267*/ "4ー\n", + /*268*/ "5ー\n", + /*269*/ "6ー\n", + /*270*/ "7ー\n", + /*271*/ "8ー\n", + /*272*/ "9ー\n", + /*273*/ "10ー\n", + /*274*/ "11ー\n", + /*275*/ "12ー\n", + /*276*/ "Classifica giocatori\n", + /*277*/ "Decessi\n", + /*278*/ "Punti\n", + /*279*/ "Classifica squadre\n", + /*280*/ "Statist. per %s", + /*281*/ "Suicidi\n", + /*282*/ "Decessi\n", + /*283*/ "Vittime\n", + /*284*/ "Inventario\n", + /*285*/ "Comandi\n", + /*286*/ "Tempo di gioco:\n", + /*287*/ "Fine gioco\n", + /*288*/ "Pausa\n", + /*289*/ "Fine pausa\n", + /*290*/ "Esci dal gioco\n", + /*291*/ "Sicuro?\n", + /*292*/ "Annulla\n", + /*293*/ "Fine gioco\n", + /*294*/ "TestaPerfect\n", + /*295*/ "Carica testa salvata\n", + /*296*/ "Crea nuova testa\n", + /*297*/ "Modifica testa caricata\n", + /*298*/ "Modifica testaPerfect\n", + /*299*/ "Scegli casella per modifica:\n", + /*300*/ "Annulla\n", + /*301*/ "Crea nuova testa\n", + /*302*/ "Carica testa salvata\n", + /*303*/ "Dove desideri usare\n", + /*304*/ "questa testa?\n", + /*305*/ "Simulatore lotta\n", + /*306*/ "Tutte le missioni\n", + /*307*/ "Entrambi\n", + /*308*/ "Annulla\n", + /*309*/ "Impostaz. macch. fotografica\n", + /*310*/ "Inserisci la macch. fotografica\n", + /*311*/ "nella cassetta Game Boy.\n", + /*312*/ "Poi inserisci la cassetta Game Boy\n", + /*313*/ "in un Controller.\n", + /*314*/ "OK\n", + /*315*/ "Annulla\n", + /*316*/ "Errore\n", + /*317*/ "Macch. fotografica Game Boy non rilevata!\n", + /*318*/ "Controlla i collegamenti\n", + /*319*/ "e riprova.\n", + /*320*/ "Annulla\n", + /*321*/ "Scegli la macchina\n", + /*322*/ "Rilevate pi macchine\n", + /*323*/ "Seleziona la macchina che\nvuoi usare\n", + /*324*/ "OK\n", + /*325*/ "Annulla\n", + /*326*/ "TestaPerfect\n", + /*327*/ "Scatta foto ora\n", + /*328*/ "Carica foto da macchina\n", + /*329*/ "Annulla\n", + /*330*/ "Carica da macchina\n", + /*331*/ "Scegli foto:\n", + /*332*/ "Annulla\n", + /*333*/ "Scatta foto\n", + /*334*/ "Scatta!\n", + /*335*/ "Annulla\n", + /*336*/ "Tieni foto\n", + /*337*/ "Riprova\n", + /*338*/ "Carica testaPerfect\n", + /*339*/ "Inserisci il Controller Pak\n", + /*340*/ "contenete la testa che\n", + /*341*/ "vuoi caricare in uno\n", + /*342*/ "dei Controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Annulla\n", + /*345*/ "Fonte:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "TestaPerfect Editor\n", + /*352*/ "Scatta altra foto\n", + /*353*/ "Cambia testa\n", + /*354*/ "Posiziona foto\n", + /*355*/ "Colora viso e capelli\n", + /*356*/ "Dai forma a testa\n", + /*357*/ "Rimuovi testa\n", + /*358*/ "Cancella modifiche\n", + /*359*/ "Tieni modifiche\n", + /*360*/ "Dai forma a testa\n", + /*361*/ "Profondit濬n", + /*362*/ "OK\n", + /*363*/ "Annulla\n", + /*364*/ "Posiziona immagine\n", + /*365*/ "Lumninosit濬n", + /*366*/ "OK\n", + /*367*/ "Annulla\n", + /*368*/ "Scegli testa\n", + /*369*/ "OK\n", + /*370*/ "Annulla\n", + /*371*/ "Elimina testaPerfect\n", + /*372*/ "Desideri veramente eliminare\n", + /*373*/ "questa testa dalla memoria?\n", + /*374*/ "Elimina\n", + /*375*/ "Annulla\n", + /*376*/ "Annulla modifiche\n", + /*377*/ "Eliminare veramente\n", + /*378*/ "le modifiche?\n", + /*379*/ "Elimina\n", + /*380*/ "Esci\n", + /*381*/ "Salva testaPerfect\n", + /*382*/ "Hai modificato questa testa.\n", + /*383*/ "Vuoi tenere le modifiche?\n", + /*384*/ "Tieni\n", + /*385*/ "Annulla\n", + /*386*/ "Salva testaPerfect\n", + /*387*/ "Le modifiche saranno memorizzate.\n", + /*388*/ "Vuoi salvare le modifiche\n", + /*389*/ "nel Controller Pak?\n", + /*390*/ "Salva\n", + /*391*/ "Non salvare\n", + /*392*/ "Salva testaPerfect\n", + /*393*/ "Ora puoi salvare la testa\n", + /*394*/ "su un Controller Pak se vuoi.\n", + /*395*/ "Prima per accertati che\n", + /*396*/ "sia inserito un Controller Pak\n", + /*397*/ "e scegli \"Salva\".\n", + /*398*/ "Salva\n", + /*399*/ "Non salvare\n", + /*400*/ "Testa completa!\n", + /*401*/ "Per usare la testa nel simulatore lotta,\n", + /*402*/ "selezionala dal menu personaggi delle\n", + /*403*/ "impostazioni giocatore/replicante.\n", + /*404*/ "Appariranno le teste missione\n", + /*405*/ "per ogni missione giocata.\n", + /*406*/ "Puoi ancora modificare la testa.\n", + /*407*/ "Esci\n", + /*408*/ "Modifica testa\n", + /*409*/ "Colore testa\n", + /*410*/ "Viso:\n", + /*411*/ "Capelli:\n", + /*412*/ "OK\n", + /*413*/ "Annulla\n", + /*414*/ "Premi B per uscire.\n", + /*415*/ "Informazioni hangar\n", + /*416*/ "Esercitazione olografica\n", + /*417*/ "Lista strumenti\n", + /*418*/ "Informazioni\n", + /*419*/ "Luoghi\n", + /*420*/ "Veicoli\n", + /*421*/ "Profili personaggi\n", + /*422*/ "Altre informazioni\n", + /*423*/ "Statist. esercitaz.\n", + /*424*/ "Tempo impiegato:\n", + /*425*/ "Compiuto!\n", + /*426*/ "Fallito!\n", + /*427*/ "Ok\n", + /*428*/ "Riprendi\n", + /*429*/ "Annulla\n", + /*430*/ "Interrompi\n", + /*431*/ "Profilo personaggio\n", + /*432*/ "Nome:\n", + /*433*/ "Et:\n", + /*434*/ "Razza:\n", + /*435*/ "Premi B per uscire.\n", + /*436*/ "Trucchi\n", + /*437*/ "Ora puoi spegnere il computer.\n", + /*438*/ "Annulla\n", + /*439*/ "Bronzo\n", + /*440*/ "Argento\n", + /*441*/ "Oro\n", + /*442*/ "Difficolt濬n", + /*443*/ "Difficolt:\n", + /*444*/ "Seleziona difficolt:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Info esercitaz.\n", + /*448*/ "Statist. esercitaz.\n", + /*449*/ "Compiuto!\n", + /*450*/ "Punti:\n", + /*451*/ "Obiettivi distrutti:\n", + /*452*/ "Difficolt:\n", + /*453*/ "Tempo impiegato:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisione:\n", + /*456*/ "Non fallito\n", + /*457*/ "Finite munizioni\n", + /*458*/ "Tempo scaduto\n", + /*459*/ "Punteggio impossibile \n", + /*460*/ "Troppo impreciso\n", + /*461*/ "Centro\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Totale colpi\n", + /*466*/ "Punti\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munizioni:\n", + /*472*/ "Limite tempo:\n", + /*473*/ "Precisione min.:\n", + /*474*/ "Obiettivi:\n", + /*475*/ "Punteggio obiettivi:\n", + /*476*/ "Trucchi\n", + /*477*/ "Fatto\n", + /*478*/ "Avvertenza\n", + /*479*/ "Finch i trucchi sono attivi,\nnon potrai progredire nel gioco\n.", + /*480*/ "OK\n", + /*481*/ "Annulla\n", + /*482*/ "Giocat. %d: ", + /*483*/ "Premi START!\n", + /*484*/ "Ricerca macch. fotografica!\n", + /*485*/ "Regolazione macchina\n", + /*486*/ "Scaricamento immagine\n", + /*487*/ "Caricamento immagine\n", + /*488*/ "Salva immagine\n", + /*489*/ "Tasferimento immagine\n", + /*490*/ "Caricamento segmento\n", + /*491*/ "Esame Controller Pak\n", + /*492*/ "Prelevam. testaPerfect\n", + /*493*/ "Salvatag. testaPerfect\n", + /*494*/ "Regolazione autom. macchina\n", + /*495*/ "Attendere prego...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_s.c b/src/files/lang/pal-beta/mpmenu_str_s.c new file mode 100644 index 000000000..f7dcd58bb --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "El m疽 Suicida\n", + /* 1*/ "ソQu es municin?\n", + /* 2*/ "Menor Escudo\n", + /* 3*/ "Mejor Protegido\n", + /* 4*/ "Mejor Puntera\n", + /* 5*/ "El m疽 Profesional\n", + /* 6*/ "El m疽 Mortfero\n", + /* 7*/ "El m疽 Inofensivo\n", + /* 8*/ "El m疽 Cobarde\n", + /* 9*/ "El m疽 Fren騁ico\n", + /* 10*/ "El m疽 Honorable\n", + /* 11*/ "El m疽 Deshonorable\n", + /* 12*/ "La Vida m疽 Corta\n", + /* 13*/ "La Vida m疽 Larga\n", + /* 14*/ "Doble Muerte\n", + /* 15*/ "Triple Muerte\n", + /* 16*/ "Cu疆ruple Muerte\n", + /* 17*/ "Conf. de Juego\n", + /* 18*/ "Cargar Par疥etros\n", + /* 19*/ "Escenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Opciones\n", + /* 22*/ "Equipos\n", + /* 23*/ "Armas\n", + /* 24*/ "Lmites\n", + /* 25*/ "Simulantes\n", + /* 26*/ "Guardar Par疥etros\n", + /* 27*/ "Abortar Juego\n", + /* 28*/ "Conf. de Jugador\n", + /* 29*/ "Cargar Jugador\n", + /* 30*/ "Nombre\n", + /* 31*/ "Personaje\n", + /* 32*/ "H疣dicap\n", + /* 33*/ "Controles\n", + /* 34*/ "Opciones de Jugador\n", + /* 35*/ "Estadsticas\n", + /* 36*/ "Comenzar Juego\n", + /* 37*/ "Abandonar\n", + /* 38*/ "Guardar Jugador\n", + /* 39*/ "Guardar Copia del Jugador\n", + /* 40*/ "Objetos\n", + /* 41*/ "Banda Sonora\n", + /* 42*/ "Nombres de Equipo\n", + /* 43*/ "Ratio\n", + /* 44*/ "Bloquear\n", + /* 45*/ "Ninguno\n", + /* 46*/ "レltimo Ganador\n", + /* 47*/ "レltimo Perdedor\n", + /* 48*/ "Aleatorio\n", + /* 49*/ "Desafo\n", + /* 50*/ "Desafos de Combate\n", + /* 51*/ "Abortar Desafo\n", + /* 52*/ "Abortar\n", + /* 53*/ "ソEst疽 seguro de que\nquieres abortar el juego?\n", + /* 54*/ "Abortar\n", + /* 55*/ "Cancelar\n", + /* 56*/ "%s\n", + /* 57*/ "Aceptar\n", + /* 58*/ "Cancelar\n", + /* 59*/ "Nombres de Equipo\n", + /* 60*/ "Volver\n", + /* 61*/ "Cambiar Nombre de Equipo\n", + /* 62*/ "Banda Sonora\n", + /* 63*/ "Actual:\n", + /* 64*/ "Mltiples Melodas\n", + /* 65*/ "Volver\n", + /* 66*/ "Mltiples Melodas\n", + /* 67*/ "Aleatorio\n", + /* 68*/ "Elegir Melodas\n", + /* 69*/ "Elegir Meloda\n", + /* 70*/ "Controles de Equipo\n", + /* 71*/ "Equipos Activados\n", + /* 72*/ "Equipos:\n", + /* 73*/ "Auto Equipo...\n", + /* 74*/ "Volver\n", + /* 75*/ "Auto Equipo\n", + /* 76*/ "Dos Equipos\n", + /* 77*/ "Tres Equipos\n", + /* 78*/ "Cuatro Equipos\n", + /* 79*/ "M痊imo de Equipos\n", + /* 80*/ "Humanos contra Sim.\n", + /* 81*/ "Parejas Humano-Sim.\n", + /* 82*/ "Cancelar\n", + /* 83*/ "Simulantes\n", + /* 84*/ "Aadir Simulante...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Despejar Todo\n", + /* 94*/ "Volver\n", + /* 95*/ "Dificultad:\n", + /* 96*/ "Cambiar Tipo...\n", + /* 97*/ "Personaje...\n", + /* 98*/ "Borrar Simulante\n", + /* 99*/ "Volver\n", + /*100*/ "Personaje Simulante\n", + /*101*/ "Aadir Simulante\n", + /*102*/ "Cambiar Simulante\n", + /*103*/ "Simulantes Normales\n", + /*104*/ "Simulantes Especiales\n", + /*105*/ "。Preparado!\n", + /*106*/ "...y esperando\n", + /*107*/ "Lmites\n", + /*108*/ "Tiempo\n", + /*109*/ "Puntos\n", + /*110*/ "Par疥etros Iniciales\n", + /*111*/ "Volver\n", + /*112*/ "Sin lmite\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Cl疽ico\n", + /*118*/ "Aleatorio\n", + /*119*/ "Skedar", + /*120*/ "Tuberas", + /*121*/ "Barranco", + /*122*/ "Edificio G5", + /*123*/ "Cloacas", + /*124*/ "Almac駭", + /*125*/ "Rejilla", + /*126*/ "Ruinas", + /*127*/ "チrea 52", + /*128*/ "Base", + /*129*/ "Tejado", + /*130*/ "Fortaleza", + /*131*/ "Villa", + /*132*/ "Aparcamiento", + /*133*/ "Templo", + /*134*/ "Complejo", + /*135*/ "Felicity", + /*136*/ "Aleatorio", + /*137*/ "Cargar Jugador\n", + /*138*/ "Botn B para cancelar\n", + /*139*/ "Cargar Par疥etros de Juego\n", + /*140*/ "%s: Escenario: %s Arena: %s Simulantes: %d", + /*141*/ "Predefinidos\n", + /*142*/ "Nombre del Jugador\n", + /*143*/ "Personaje\n", + /*144*/ "Cargar Cabeza...\n", + /*145*/ "Estadsticas de %s\n", + /*146*/ "Muertes:\n", + /*147*/ "Bajas:\n", + /*148*/ "Precisin:\n", + /*149*/ "Tiros a la Cabeza:\n", + /*150*/ "Municin Usada:\n", + /*151*/ "Dao Causado:\n", + /*152*/ "Dolor Recibido:\n", + /*153*/ "Nー de Juegos:\n", + /*154*/ "Juegos Ganados:\n", + /*155*/ "Juegos Perdidos:\n", + /*156*/ "Tiempo:\n", + /*157*/ "Distancia:\n", + /*158*/ "Medallas Ganadas:\n", + /*159*/ " Precisin:\n", + /*160*/ " Tiros Cabeza:\n", + /*161*/ " Maestro Muerte:\n", + /*162*/ " Superviviente:\n", + /*163*/ "Tu Ttulo:\n", + /*164*/ "Volver\n", + /*165*/ "Desafos Completados\n", + /*166*/ "Volver\n", + /*167*/ "Opciones\n", + /*168*/ "Destacar Objetos\n", + /*169*/ "Destacar Jugadores\n", + /*170*/ "Destacar Equipos\n", + /*171*/ "Radar\n", + /*172*/ "Volver\n", + /*173*/ "Armas\n", + /*174*/ "Fijar:\n", + /*175*/ "Conf. Arma Actual:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Volver\n", + /*183*/ "Guardar Conf. de Juego\n", + /*184*/ "ソQuieres guardar sobre\ntu fichero original?\n", + /*185*/ "Guardar Sobre el Original\n", + /*186*/ "Guardar Copia\n", + /*187*/ "No Guardar\n", + /*188*/ "Nombre de Fichero\n", + /*189*/ "Introduce el nombre\nde fichero de conf.:\n", + /*190*/ "Confirmar\n", + /*191*/ "Tu fichero de jugador\nsiempre se guarda\nautom疸icamente.\n", + /*192*/ "ソGuardar una copia ahora?\n", + /*193*/ "No\n", + /*194*/ "S\n", + /*195*/ "Abandonar\n", + /*196*/ "ソSeguro que quieres\nabandonar?\n", + /*197*/ "Abandonar\n", + /*198*/ "Cancelar\n", + /*199*/ "Controles\n", + /*200*/ "Estilo de Control\n", + /*201*/ "Cabeceo Cambiado\n", + /*202*/ "Mirar al Frente\n", + /*203*/ "Giro de Cabeza\n", + /*204*/ "Auto-Apuntar\n", + /*205*/ "C. Apuntar\n", + /*206*/ "Mirilla en Pantalla\n", + /*207*/ "Mostrar Objetivo\n", + /*208*/ "Alcance de Zoom\n", + /*209*/ "Municin en Pantalla\n", + /*210*/ "Funcin del Arma\n", + /*211*/ "Bolas de Pintura\n", + /*212*/ "Volver\n", + /*213*/ "Mantener\n", + /*214*/ "Cambiar\n", + /*215*/ "Opciones de Combate\n", + /*216*/ "Opciones de Maletn\n", + /*217*/ "Opciones de Hacker\n", + /*218*/ "Opciones de Llevar\n", + /*219*/ "Opciones de Colina\n", + /*220*/ "Opciones de Captura\n", + /*221*/ "Opciones de Cajas\n", + /*222*/ "Muertes de 1 Tiro\n", + /*223*/ "C疥ara Lenta\n", + /*224*/ "Movimiento R疳ido\n", + /*225*/ "Mostrar Equipo\n", + /*226*/ "Sin Radar\n", + /*227*/ "Sin Auto-Apuntar\n", + /*228*/ "Sin Destacar Jugadores\n", + /*229*/ "Sin Destacar Objetos\n", + /*230*/ "Destacar Objetivos\n", + /*231*/ "Destacar Terminales\n", + /*232*/ "Cajas en el Radar\n", + /*233*/ "Colina en el Radar\n", + /*234*/ "Colina Mvil\n", + /*235*/ "Tiempo\n", + /*236*/ "Mostrar en el Radar\n", + /*237*/ "Destacar Maletn\n", + /*238*/ "Mostrar en Radar\n", + /*239*/ "Volver\n", + /*240*/ "No\n", + /*241*/ "S\n", + /*242*/ "Inteligente\n", + /*243*/ "Escenario\n", + /*244*/ "。Pelea!\n", + /*245*/ "-Trabajo de Equipo-\n", + /*246*/ "Combate", + /*247*/ "Mant駭 el Maletn", + /*248*/ "Central Hacker", + /*249*/ "T la llevas", + /*250*/ "Rey de la Colina", + /*251*/ "Captura la Caja", + /*252*/ "Toca esa Caja", + /*253*/ "Combate", + /*254*/ "Maletn", + /*255*/ "Hacker", + /*256*/ "Llevar", + /*257*/ "Colina", + /*258*/ "Capturas", + /*259*/ "Cajas", + /*260*/ "Fin del Juego\n", + /*261*/ "Ttulo:\n", + /*262*/ "Arma Preferida:\n", + /*263*/ "Premios:\n", + /*264*/ "1ー\n", + /*265*/ "2ー\n", + /*266*/ "3ー\n", + /*267*/ "4ー\n", + /*268*/ "5ー\n", + /*269*/ "6ー\n", + /*270*/ "7ー\n", + /*271*/ "8ー\n", + /*272*/ "9ー\n", + /*273*/ "10ー\n", + /*274*/ "11ー\n", + /*275*/ "12ー\n", + /*276*/ "Situacin Jugador\n", + /*277*/ "Bajas\n", + /*278*/ "Punt.\n", + /*279*/ "Situacin Equipo\n", + /*280*/ "Estad. de %s", + /*281*/ "Suicidios\n", + /*282*/ "Bajas\n", + /*283*/ "Ac.\n", + /*284*/ "Inventario\n", + /*285*/ "Controles\n", + /*286*/ "T. Juego:\n", + /*287*/ "Acabar Juego\n", + /*288*/ "Pausar\n", + /*289*/ "Reanudar\n", + /*290*/ "Acabar Juego\n", + /*291*/ "ソEst疽 seguro?\n", + /*292*/ "Cancelar\n", + /*293*/ "Acabar Juego\n", + /*294*/ "PerfectHead\n", + /*295*/ "Cargar Cabeza Guardada\n", + /*296*/ "Crear Nueva Cabeza\n", + /*297*/ "Editar Cabeza Cargada\n", + /*298*/ "Editar PerfectHead\n", + /*299*/ "Elegir slot a editar:\n", + /*300*/ "Cancelar\n", + /*301*/ "Crear Nueva Cabeza\n", + /*302*/ "Cargar Cabeza Guardada\n", + /*303*/ "ソDnde querr疽 usar\n", + /*304*/ "esta cabeza?\n", + /*305*/ "Simulador de Combate\n", + /*306*/ "Todas las Misiones\n", + /*307*/ "Ambos\n", + /*308*/ "Cancelar\n", + /*309*/ "Conf. C疥ara\n", + /*310*/ "Inserta tu c疥ara en tu\n", + /*311*/ "Transfer Pak.\n", + /*312*/ "Entonces, inserta tu Transfer Pak\n", + /*313*/ "en cualquier mando.\n", + /*314*/ "Aceptar\n", + /*315*/ "Cancelar\n", + /*316*/ "Error\n", + /*317*/ "。C疥ara de Game Boy No Detectada!\n", + /*318*/ "Por favor, comprueba todas las\n", + /*319*/ "conexiones y reint駭talo.\n", + /*320*/ "Cancelar\n", + /*321*/ "Elegir C疥ara\n", + /*322*/ "M疽 de una c疥ara detectada.\n", + /*323*/ "Por favor, elige qu c疥ara\nquieres usar\n", + /*324*/ "Aceptar\n", + /*325*/ "Cancelar\n", + /*326*/ "PerfectHead\n", + /*327*/ "Tomar una Foto ahora\n", + /*328*/ "Cargar Foto de la C疥ara\n", + /*329*/ "Cancelar\n", + /*330*/ "Cargar de la C疥ara\n", + /*331*/ "Elige foto a cargar de la c疥ara:\n", + /*332*/ "Cancelar\n", + /*333*/ "Tomar Foto\n", + /*334*/ "。Dispara!\n", + /*335*/ "Cancelar\n", + /*336*/ "Guardar Foto\n", + /*337*/ "Reintentar\n", + /*338*/ "Cargar PerfectHead\n", + /*339*/ "Inserta el Controller Pak\n", + /*340*/ "que contiene la cabeza\n", + /*341*/ "que quieres cargar en\n", + /*342*/ "cualquier mando.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancelar\n", + /*345*/ "Origen:\n", + /*346*/ "Cart. 1", + /*347*/ "Cart. 2", + /*348*/ "Cart. 3", + /*349*/ "Cart. 4", + /*350*/ "", + /*351*/ "Editor PerfectHead\n", + /*352*/ "Tomar otra foto\n", + /*353*/ "Cambiar Cabeza\n", + /*354*/ "Posicionar la Foto\n", + /*355*/ "Color de Cara y Pelo\n", + /*356*/ "Forma de la Cabeza\n", + /*357*/ "Quitar Cabeza\n", + /*358*/ "Cancelar Cambios\n", + /*359*/ "Mantener Cambios\n", + /*360*/ "Forma de la Cabeza\n", + /*361*/ "Profundidad\n", + /*362*/ "Aceptar\n", + /*363*/ "Cancelar\n", + /*364*/ "Posicionar la Imagen\n", + /*365*/ "Brillo\n", + /*366*/ "Aceptar\n", + /*367*/ "Cancelar\n", + /*368*/ "Elegir Cabeza\n", + /*369*/ "Aceptar\n", + /*370*/ "Cancelar\n", + /*371*/ "Quitar PerfectHead\n", + /*372*/ "ソEst疽 seguro de que quieres\n", + /*373*/ "quitar esta cabeza de la memoria?\n", + /*374*/ "Borrar\n", + /*375*/ "Cancelar\n", + /*376*/ "Cancelar Cambios\n", + /*377*/ "ソEst疽 seguro de que quieres\n", + /*378*/ "descartar tus cambios?\n", + /*379*/ "Descartar\n", + /*380*/ "Volver al Editor\n", + /*381*/ "Guardar PerfectHead\n", + /*382*/ "Has editado esta cabeza.\n", + /*383*/ "ソQuieres guardar tus cambios?\n", + /*384*/ "Mantener\n", + /*385*/ "Volver\n", + /*386*/ "Guardar PerfectHead\n", + /*387*/ "Tus cambios se mantendr疣 en la memoria.\n", + /*388*/ "ソQuieres guardar tus cambios\n", + /*389*/ "en el Controller Pak?\n", + /*390*/ "Guardar\n", + /*391*/ "No Guardar\n", + /*392*/ "Guardar PerfectHead\n", + /*393*/ "Puedes guardar tu cabeza en el\n", + /*394*/ "Controller Pak que desees.\n", + /*395*/ "Si quieres hacerlo, por favor,\n", + /*396*/ "asegrate de que el Controller Pak\n", + /*397*/ "est insertado y elige \"Guardar\".\n", + /*398*/ "Guardar\n", + /*399*/ "No Guardar\n", + /*400*/ "。Cabeza Completada!\n", + /*401*/ "Para usar tu cabeza en el simulador de combate,\n", + /*402*/ "elige la cabeza desde el men de personajes\n", + /*403*/ "en el men de par疥etros del jugador/simulante.\n", + /*404*/ "Tus cabezas de Misin aparecer疣 en\n", + /*405*/ "cualquier misin que juegues.\n", + /*406*/ "Puedes editar m疽 tu cabeza si quieres.\n", + /*407*/ "Finalizar\n", + /*408*/ "Editar Cabeza\n", + /*409*/ "Color de Cabeza\n", + /*410*/ "Cara:\n", + /*411*/ "Estilo de Pelo:\n", + /*412*/ "Aceptar\n", + /*413*/ "Cancelar\n", + /*414*/ "Pulsa el Botn B para volver.\n", + /*415*/ "Informacin del Hangar\n", + /*416*/ "Holoentrenamiento\n", + /*417*/ "Lista de Dispositivos\n", + /*418*/ "Informacin\n", + /*419*/ "Lugares\n", + /*420*/ "Vehculos\n", + /*421*/ "Perfiles de Personajes\n", + /*422*/ "Informacin Adicional\n", + /*423*/ "Estadsticas de Entrenamiento\n", + /*424*/ "Tiempo Necesitado:\n", + /*425*/ "。Completado!\n", + /*426*/ "。Fallado!\n", + /*427*/ "Aceptar\n", + /*428*/ "Reanudar\n", + /*429*/ "Cancelar\n", + /*430*/ "Abortar\n", + /*431*/ "Perfil del Personaje\n", + /*432*/ "Nombre:\n", + /*433*/ "Edad:\n", + /*434*/ "Raza:\n", + /*435*/ "Pulsa el Botn B para volver.\n", + /*436*/ "Trucos\n", + /*437*/ "Ahora es seguro apagar tu ordenador.\n", + /*438*/ "Cancelar\n", + /*439*/ "Bronce\n", + /*440*/ "Plata\n", + /*441*/ "Oro\n", + /*442*/ "Dificultad\n", + /*443*/ "Dificultad:\n", + /*444*/ "Elegir Dificultad:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informacin de Entrenamiento\n", + /*448*/ "Estadsticas de Entrenamiento\n", + /*449*/ "。Completado!\n", + /*450*/ "Puntuacin:\n", + /*451*/ "Blancos Destruidos:\n", + /*452*/ "Dificultad:\n", + /*453*/ "Tiempo Necesitado:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisin:\n", + /*456*/ "No Fallado\n", + /*457*/ "Sin Municin\n", + /*458*/ "Tiempo Acabado\n", + /*459*/ "Puntuacin Inalcanzable\n", + /*460*/ "Demasiado Impreciso\n", + /*461*/ "Diana\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "T. Impactos \n", + /*466*/ "Puntuacin\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Lmite de Municin:\n", + /*472*/ "Lmite de Tiempo:\n", + /*473*/ "Precisin Mnima:\n", + /*474*/ "Blancos Necesarios:\n", + /*475*/ "Puntuacin Necesaria:\n", + /*476*/ "Trucos\n", + /*477*/ "Hecho\n", + /*478*/ "Cuidado\n", + /*479*/ "Si activas cualquier truco, ser疽\nincapaz de avanzar m疽 en el juego\nmientras ese truco est activo.\n", + /*480*/ "Aceptar\n", + /*481*/ "Cancelar\n", + /*482*/ "Jugador %d: ", + /*483*/ "。Pulsa START!\n", + /*484*/ "。Buscando C疥ara!\n", + /*485*/ "Calibrando C疥ara\n", + /*486*/ "Descargando Imagen\n", + /*487*/ "Cargando Imagen\n", + /*488*/ "Guardando Imagen\n", + /*489*/ "Transfiriendo Imagen\n", + /*490*/ "Cargando Segmento\n", + /*491*/ "Comprobando Controller Pak\n", + /*492*/ "Obteniendo PerfectHead\n", + /*493*/ "Guardando PerfectHead\n", + /*494*/ "Autoajuste de C疥ara\n", + /*495*/ "Por favor, espera...\n", +}; diff --git a/src/files/lang/pal-beta/mpweaponsE.c b/src/files/lang/pal-beta/mpweaponsE.c new file mode 100644 index 000000000..82bf32092 --- /dev/null +++ b/src/files/lang/pal-beta/mpweaponsE.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweaponsJ.c b/src/files/lang/pal-beta/mpweaponsJ.c new file mode 100644 index 000000000..130bf580f --- /dev/null +++ b/src/files/lang/pal-beta/mpweaponsJ.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Capture the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Flag\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak Inserted\n", + /* 66*/ "is damaged or inserted\n", + /* 67*/ "incorrectly.\n", + /* 68*/ "Please remove and try again.\n", + /* 69*/ "Full Controller Pak Inserted\n", + /* 70*/ "is too full to save files.\n", + /* 71*/ "Use the Game Notes Editor to\n", + /* 72*/ "free some space (hold START\n", + /* 73*/ "while powering up.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "Superdragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP7\n", + /*111*/ "DD44\n", + /*112*/ "Klobb\n", + /*113*/ "KF7 Soviet\n", + /*114*/ "ZMG (9mm)\n", + /*115*/ "D5K\n", + /*116*/ "AR33\n", + /*117*/ "RC-P90\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak could\nnot be repaired.\n", + /*185*/ "L/R: ", + /*186*/ "C-UP: ", + /*187*/ "C-L/R: ", + /*188*/ "C-DOWN: ", + /*189*/ "A: ", + /*190*/ "B: ", + /*191*/ "STICK: ", + /*192*/ "Z: ", + /*193*/ "D-PAD: ", + /*194*/ "AIM TOGGLE", + /*195*/ "LOOK UP / GET UP", + /*196*/ "STRAFE", + /*197*/ "LOOK DOWN / CROUCH", + /*198*/ "CHANGE GUN / ACTIVEMENU", + /*199*/ "RELOAD / ACTION / SECONDARY FIRE", + /*200*/ "WALK AND TURN", + /*201*/ "FIRE", + /*202*/ "AS C-BUTTONS", + /*203*/ "Turn off all Cheats\n", + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, + /*264*/ NULL, + /*265*/ NULL, + /*266*/ NULL, + /*267*/ NULL, + /*268*/ NULL, + /*269*/ NULL, + /*270*/ NULL, + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweaponsP.c b/src/files/lang/pal-beta/mpweaponsP.c new file mode 100644 index 000000000..82bf32092 --- /dev/null +++ b/src/files/lang/pal-beta/mpweaponsP.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_f.c b/src/files/lang/pal-beta/mpweapons_str_f.c new file mode 100644 index 000000000..e1c69f1e5 --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_f.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%sobtient:\nR馗epteur\n", + /* 1*/ "%sobtient:\nMallette\n", + /* 2*/ "%sobtient: %s Mallette\n", + /* 3*/ "%sa notre\nMallette\n", + /* 4*/ "%s Mallette obtenu(e)", + /* 5*/ "Vous capturez:\n %sMallette\n", + /* 6*/ "%scapture notre\nMallette\n", + /* 7*/ "%scapture:\n%s Mallette\n", + /* 8*/ "Un point pour survivre!\n", + /* 9*/ "Il faut s'occuper de\n", + /* 10*/ "vos amis!\n", + /* 11*/ "Bien jou!\n", + /* 12*/ "Vous d馗apsulez!\n", + /* 13*/ "2 Points...\n", + /* 14*/ "Vous 黎es la victime!\n", + /* 15*/ "Prot馮ez %s!\n", + /* 16*/ "Abattez %s!\n", + /* 17*/ "T駘馗hargement r騏ssi.\n", + /* 18*/ "Connexion perdue.\n", + /* 19*/ "D饕ut t駘馗hargement.\n", + /* 20*/ "Il faut utiliser le r馗epteur.\n", + /* 21*/ "Roi de\nla zone!\n", + /* 22*/ "Vous avez\nla zone!\n", + /* 23*/ "%sa captur饅nla zone!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "Pas de bouclier\n", + /* 27*/ "Automatiques\n", + /* 28*/ "Lance-roquettes\n", + /* 29*/ "Simulants\n", + /* 30*/ "Roi de la zone\n", + /* 31*/ "Complexe FarSight\n", + /* 32*/ "Tenir la mallette\n", + /* 33*/ "Pistolets meurtriers\n", + /* 34*/ "Capturer la mallette\n", + /* 35*/ "Occultage\n", + /* 36*/ "Temple Explosifs\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquillisant\n", + /* 39*/ "Ralenti\n", + /* 40*/ "Appuyer sur START\n", + /* 41*/ "En pause\n", + /* 42*/ "Custom\n", + /* 43*/ "Hasard\n", + /* 44*/ "Hasard 5\n", + /* 45*/ "Corps corps\n", + /* 46*/ "Mine proximit饅n", + /* 47*/ "Lance-roquettes\n", + /* 48*/ "Lance-grenades\n", + /* 49*/ "Explosif\n", + /* 50*/ "Magnum d'Or\n", + /* 51*/ "Lourd\n", + /* 52*/ "Tranquillisant\n", + /* 53*/ "FarSight\n", + /* 54*/ "Puissant\n", + /* 55*/ "Automatiques\n", + /* 56*/ "Pistolets\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Rien\n", + /* 60*/ "Bouclier\n", + /* 61*/ "Annul饅n", + /* 62*/ "Objectifs remplis\n", + /* 63*/ "Inconnu\n", + /* 64*/ "Manquant\n", + /* 65*/ "Controller Pak ins駻饅n", + /* 66*/ "est endommag ou mal\n", + /* 67*/ "branch.\n", + /* 68*/ "Tentative r駱aration\n", + /* 69*/ "Recommencer\n", + /* 70*/ "Continuer sans utiliser\nle Controller Pak\n", + /* 71*/ "Controller Pak ins駻饅n", + /* 72*/ "n'a pas assez d'espace libre :\n1 note et 28 pages\nrequises.\n", + /* 73*/ "Utiliser le menu\npour faire de la place\n (maintenir START\nen allumant.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Poings Hurricane\n", + /* 77*/ "Occulteur\n", + /* 78*/ "Invincible\n", + /* 79*/ "Toutes les armes en solo\n", + /* 80*/ "Munitions infinies\n", + /* 81*/ "Munit. infinies, pas de rechargement\n", + /* 82*/ "1 joueur ralenti\n", + /* 83*/ "Mode DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Petite Joanna\n", + /* 87*/ "Petits personnages\n", + /* 88*/ "Boucliers Ennemis\n", + /* 89*/ "Joanna bouclier\n", + /* 90*/ "Super bouclier\n", + /* 91*/ "Vis馥 classique\n", + /* 92*/ "T黎es 駲uipe seulement\n", + /* 93*/ "Jouer Elvis\n", + /* 94*/ "Ennemis roquettes\n", + /* 95*/ "Munit. infinies - Laptop Gun sentinelle\n", + /* 96*/ "Ennemis boxeurs\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugiliste\n", + /* 99*/ "Hotshot\n", + /*100*/ "Touche et tire\n", + /*101*/ "Extraterrestre\n", + /*102*/ "Pisteur-R / Emplacements cache armes\n", + /*103*/ "Lance-roquettes\n", + /*104*/ "Fusil sniper\n", + /*105*/ "Scanner rayons X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Sp馗ial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Jouabilit饅n", + /*121*/ "Armes\n", + /*122*/ "Amis\n", + /*123*/ "Armes pour Joanna en solo\n", + /*124*/ "Armes classiques pour Joanna en solo\n", + /*125*/ "D駸ertion dataDyne", + /*126*/ "Extraction dataDyne ", + /*127*/ "Infiltration S51 ", + /*128*/ "Sauvetage S51", + /*129*/ "Fuite S51", + /*130*/ "Difficult:\n", + /*131*/ "Triche Missions Solo\n", + /*132*/ "Triche Simulateur Combat\n", + /*133*/ "Triche Coop駻atif\n", + /*134*/ "Triche Contre-Op駻ation\n", + /*135*/ "D駸honor饅n", + /*136*/ "Trich饅n", + /*137*/ "Triche disponible", + /*138*/ "Terminer", + /*139*/ "pour Triche:", + /*140*/ "sur", + /*141*/ "sous", + /*142*/ " ou brancher Perfect Dark Game Boy (r) dans le Transfer Pak (tm), connectez le Transfer Pak dans une manette , sortez et acc馘ez au menu", + /*143*/ "Choix Triche pour information\n", + /*144*/ "Ami disponible", + /*145*/ "Gagner Or sur le champ de tir pour les armes classiques.\n", + /*146*/ "Vis馥 l'馗ran\n", + /*147*/ "Cible\n", + /*148*/ "Port馥 zoom\n", + /*149*/ "Voir munit.\n", + /*150*/ "Fonction arme\n", + /*151*/ "Paintball\n", + /*152*/ "Sous-titres\n", + /*153*/ "Temps mission\n", + /*154*/ "Mode\n", + /*155*/ "S駱aration\n", + /*156*/ "Voulez-vous abandonner\nla mission?\n", + /*157*/ "Joanna Cuir\n", + /*158*/ "Joanna N馮ociatrice\n", + /*159*/ "Elvis (gilet)\n", + /*160*/ "Erreur\n", + /*161*/ "Impossible effacer fichier:\nutilisation en cours.\n", + /*162*/ "Annuler\n", + /*163*/ "Limite temps:\n", + /*164*/ "Limite score:\n", + /*165*/ "Limite score 駲uipe:\n", + /*166*/ "Challenge r騏ssi!\n", + /*167*/ "Challenge 馗hou!\n", + /*168*/ "Challenge trich!\n", + /*169*/ "Sous-titres cin饅n", + /*170*/ "Sous-titres jeu\n", + /*171*/ "Ecran titre optionnel\n", + /*172*/ "Commencer Challenge\n", + /*173*/ "Enqu黎e dataDyne", + /*174*/ "Erreur\n", + /*175*/ "Le Controller Pak\na 騁 enlev.\n", + /*176*/ "Tentative r駱aration\n", + /*177*/ "Voulez-vous tenter\nune r駱aration de\nce Controller Pak?\n", + /*178*/ "Les donn馥s peuvent se perdre!\n", + /*179*/ "Annuler\n", + /*180*/ "R駱arer\n", + /*181*/ "R駱aration r騏ssie\n", + /*182*/ "Le Controller Pak a\n騁 r駱ar.\n", + /*183*/ "R駱aration 馗hou馥\n", + /*184*/ "Le Controller Pak \nne peut 黎re r駱ar.\nSauvegarde ou\nchargement impossible\navec ce Controller Pak.\n", + /*185*/ "Handicap joueur\n", + /*186*/ "BOUTONS L/R: ", + /*187*/ "BOUTON C HAUT: ", + /*188*/ "BOUTONS C G/D: ", + /*189*/ "BOUTON C BAS: ", + /*190*/ "BOUTON A: ", + /*191*/ "BOUTON B: ", + /*192*/ "STICK ANALOG.: ", + /*193*/ "BOUTON Z: ", + /*194*/ "MANETTE +: ", + /*195*/ "VISER", + /*196*/ "ALT. VISER", + /*197*/ "REGARDER HAUT", + /*198*/ "REGARDER BAS", + /*199*/ "REGARDER BAS", + /*200*/ "REGARDER HAUT", + /*201*/ "AVANT", + /*202*/ "ARRIERE", + /*203*/ "DEP. LATERAL", + /*204*/ "ARME", + /*205*/ "ACTION/RECHARGER", + /*206*/ "FEU", + /*207*/ "MARCHER/TOURNER", + /*208*/ "REGARDER", + /*209*/ "MARCHER/LATERAL", + /*210*/ "REGARDER/LATERAL", + /*211*/ "COMME BOUTONS C", + /*212*/ "MAnette 1:", + /*213*/ "Manette 2:", + /*214*/ "Style contrle %s %s\n", + /*215*/ "(Une main)", + /*216*/ "(Deux mains)", + /*217*/ "Maintenir bouton d'arme pour menu rapide.\nMaintenir action pour autre fonction.\nAction+Feu pour changer de fonction.\nViser pour plus de pr馗ision.\nViser + Bouton C Bas pour s'accroupir.\nViser + Bouton C Haut pour se lever.\n", + /*218*/ "D駸activer toutes les wtriches\n", + /*219*/ "Filtre langage\n", + /*220*/ "UTILISATEUR:\n", + /*221*/ "MOT DE PASSE:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choix param鑼res:\n", + /*224*/ "Vitesse de r饌ction ennemis:\n", + /*225*/ "Vie ennemis:\n", + /*226*/ "D馮穰s ennemis:\n", + /*227*/ "Pr馗ision ennemis:\n", + /*228*/ "OK\n", + /*229*/ "Annuler\n", + /*230*/ "Controller Pak introuvable\n", + /*231*/ "Nom:\n", + /*232*/ "Emplacement:\n", + /*233*/ "Dupliquer nom fichier\n", + /*234*/ "contient d駛濬n", + /*235*/ "un fichier nomm饅n", + /*236*/ "Renommer fichier\n", + /*237*/ "Changer emplacement\n", + /*238*/ "Annuler\n", + /*239*/ "Changer nom fichier\n", + /*240*/ "Entrer nouveau nom fichier:\n", + /*241*/ " Le fichier en copie\nne peut 黎re effac.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Temps sp馗ial:\n", + /*244*/ "Nouvelle triche disponible!:\n", + /*245*/ "Continuer\n", + /*246*/ "Recommencer dernier niveau\n", + /*247*/ "Sauver joueur\n", + /*248*/ "Sauver nouveau joueur\net stats?\n", + /*249*/ "Sauver maintenant\n", + /*250*/ "Non merci!\n", + /*251*/ "Confirmer nom joueur:\n", + /*252*/ "Le fichier sauv饅na 騁 effac:\ncorrupu ou\nendommag.\n", + /*253*/ "Continuer\n", + /*254*/ "Erreur\n", + /*255*/ "Cartouche Game Boy illisible.\nV駻ifier connexions et s'assurer\nque la bonne cartouche est\nutilis馥.\n", + /*256*/ "Annuler\n", + /*257*/ "Erreur\n", + /*258*/ "La sauvegarde a 騁饅n", + /*259*/ "effac馥: corrompue\n", + /*260*/ "ou endommag馥.\n", + /*261*/ "Annuler\n", + /*262*/ "Choix de langue:\n", + /*263*/ "English\n", + /*264*/ "Fran軋is\n", + /*265*/ "Deutsch\n", + /*266*/ "Italian\n", + /*267*/ "Espaol\n", + /*268*/ "American\n", + /*269*/ "Langue:\n", + /*270*/ "Langue\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_g.c b/src/files/lang/pal-beta/mpweapons_str_g.c new file mode 100644 index 000000000..b08ceef69 --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_g.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shat den\nData Uplink\n", + /* 1*/ "%shat den\nAktenkoffer\n", + /* 2*/ "%shat die %s Aktenkoffer\n", + /* 3*/ "%shat unsere\nAktenkoffer\n", + /* 4*/ "Hat die %s Aktenkoffer\n", + /* 5*/ "Sie haben die\n%s Aktenkoffer geschnappt.\n", + /* 6*/ "%shat unseren\nAktenkoffer geschnappt.\n", + /* 7*/ "%shat unsere\n%s Aktenkoffer geschnappt.\n", + /* 8*/ "Wieviel ist Ihnen das Leben wert?\n", + /* 9*/ "Sie sollten Ihr Team nicht\n", + /* 10*/ "angreifen!\n", + /* 11*/ "Gut gemacht!\n", + /* 12*/ "Einer weniger!\n", + /* 13*/ "Ist Ihnen das Leben noch immer etwas wert?\n", + /* 14*/ "Sie sind das Opfer!\n", + /* 15*/ "Beschtzen Sie %s!\n", + /* 16*/ "Schnappen Sie %s!\n", + /* 17*/ "Download erfolgreich.\n", + /* 18*/ "Verbindung abgebrochen.\n", + /* 19*/ "Download gestartet.\n", + /* 20*/ "Sie mssen den Data Uplink einsetzen.\n", + /* 21*/ "Herr des\nHgels!\n", + /* 22*/ "Der Hgel\nist unser!\n", + /* 23*/ "%shat den Hgel\nerobert!\n", + /* 24*/ "%ds/Punkt\n", + /* 25*/ "1 Punkt!\n", + /* 26*/ "Kein Schild\n", + /* 27*/ "Automatische Waffen\n", + /* 28*/ "Raketenwerfer\n", + /* 29*/ "Simulanten\n", + /* 30*/ "Herr des Hgels\n", + /* 31*/ "Weitsicht\n", + /* 32*/ "Schnappen Sie den Aktenkoffer\n", + /* 33*/ "Ein Treffer ist zu viel\n", + /* 34*/ "Schnappen Sie den Koffer\n", + /* 35*/ "Tarnung\n", + /* 36*/ "Sprengs舩ze im Tempel\n", + /* 37*/ "Slayer\n", + /* 38*/ "Bet舫bungsgewehr\n", + /* 39*/ "Zeitlupe\n", + /* 40*/ "Drcken Sie START\n", + /* 41*/ "Pause\n", + /* 42*/ "individuell\n", + /* 43*/ "zuf舁lig\n", + /* 44*/ "Fnf Zuf舁lige\n", + /* 45*/ "Nahkampf\n", + /* 46*/ "Ann臧erungs-Mine\n", + /* 47*/ "Raketenwerfer\n", + /* 48*/ "Granatwerfer\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Goldene Magnum\n", + /* 51*/ "Schwere Waffen\n", + /* 52*/ "Bet舫bungsgewehr\n", + /* 53*/ "Fernsicht\n", + /* 54*/ "Power\n", + /* 55*/ "Automatische Waffen\n", + /* 56*/ "Pistolen\n", + /* 57*/ "Test\n", + /* 58*/ "4 MB-Test\n", + /* 59*/ "Nichts\n", + /* 60*/ "Schild\n", + /* 61*/ "Nicht belegt\n", + /* 62*/ "Alle Ziele erreicht\n", + /* 63*/ "Unbekannt\n", + /* 64*/ "Vermisst\n", + /* 65*/ "Controller Pak ist besch臈igt.\n", + /* 66*/ "ist besch臈igt oder nicht \n", + /* 67*/ "korrekt eingelegt.\n", + /* 68*/ "Schaden beheben\n", + /* 69*/ "Nochmals versuchen\n", + /* 70*/ "Ohne Controller Pak \nfortfahren\n", + /* 71*/ "Controller Pak ist voll\n", + /* 72*/ "ist zu voll, um zu \nspeichern - Es werden 28 \nfreie Seiten bentigt.\n", + /* 73*/ "Schaffe im Controller Pak \nMen ausreichend Platz. \n(Halte w臧rend des Einschaltens \nSTART gedrckt.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane-Faust\n", + /* 77*/ "Tarnkappe\n", + /* 78*/ "Unbesiegbar\n", + /* 79*/ "Alle Waffen verfgbar\n", + /* 80*/ "Unbegrenzte Munition\n", + /* 81*/ "Unbegrenzte Munition, kein Nachladen\n", + /* 82*/ "Zeitlupen-Modus\n", + /* 83*/ "DK-Modus\n", + /* 84*/ "Trents Magnum\n", + /* 85*/ "Fernsicht\n", + /* 86*/ "Mini-Jo\n", + /* 87*/ "Kleine Charaktere\n", + /* 88*/ "Feinde mit Schild\n", + /* 89*/ "Jo mit Schild\n", + /* 90*/ "Super-Schild\n", + /* 91*/ "Klassische Sicht\n", + /* 92*/ "Nur Kpfe des Teams\n", + /* 93*/ "Elvis\n", + /* 94*/ "Feinde mit Raketen\n", + /* 95*/ "Unbegrenzte Munition fr die Selbstschuss-Anlage\n", + /* 96*/ "Marquis of Queensbury-Regeln\n", + /* 97*/ "Perfekte Dunkelheit\n", + /* 98*/ "Boxer\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Munitions-Fundorte\n", + /*103*/ "Raketenwerfer\n", + /*104*/ "Sniper-Gewehr\n", + /*105*/ "Rntgen-Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop-Gewehr\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KLO1313\n", + /*113*/ "KF7 Spezial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Waffen\n", + /*122*/ "Kumpel\n", + /*123*/ "Waffen fr Jo im Solo-Modus\n", + /*124*/ "Klassische Waffe fr Jo im Solo-Modus\n", + /*125*/ "dataDyne ワberlauf", + /*126*/ "dataDyne Extraktion", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rettung", + /*129*/ "A51 Flucht", + /*130*/ "Schwierigkeit:\n", + /*131*/ "Cheat Solo Missionen\n", + /*132*/ "Cheat Kampf-Simulator\n", + /*133*/ "Cheat Teamwork\n", + /*134*/ "Cheat Counter Operative-Modus\n", + /*135*/ "Entehrt\n", + /*136*/ "Gecheated\n", + /*137*/ "Cheat verfgbar", + /*138*/ "Komplettierung", + /*139*/ "fr den Cheat:", + /*140*/ "auf", + /*141*/ "in weniger als", + /*142*/ "oder legen Sie Perfect Dark - Game Boy (R) in das Transfer Pak (TM) ein. Legen Sie ein Transfer Pak in einen beliebigen Controller ein, und gehen Sie ins Men.", + /*143*/ "W臧len Sie den Cheat fr mehr Infos aus.\n", + /*144*/ "Kumpel verfgbar", + /*145*/ "Erlangen Sie Gold am Schie゚stand, um klassische Waffen anzuw臧len.\n", + /*146*/ "Bildschirm-Anzeigen\n", + /*147*/ "Ziel\n", + /*148*/ "Zoombereich anzeigen\n", + /*149*/ "Munition anzeigen\n", + /*150*/ "Waffen-Funktion\n", + /*151*/ "Paintball\n", + /*152*/ "Untertitel\n", + /*153*/ "Missionszeit\n", + /*154*/ "Sound\n", + /*155*/ "Split\n", + /*156*/ "Mchten Sie die Mission\nabbrechen?\n", + /*157*/ "Joanna in Leder\n", + /*158*/ "Joanna als Unterh舅dler\n", + /*159*/ "Elvis (Weste)\n", + /*160*/ "Error\n", + /*161*/ "File ist aktiv. Aktive Files \nknnen nicht gelscht werden.\n", + /*162*/ "Abbrechen\n", + /*163*/ "Zeit-Limit:\n", + /*164*/ "Score-Limit:\n", + /*165*/ "Team Score-Limit:\n", + /*166*/ "Challenge abgeschlossen!\n", + /*167*/ "Challenge fehlgeschlagen!\n", + /*168*/ "Es wurde ein Cheat eingesetzt!\n", + /*169*/ "Zwischensequenzen Untertitel\n", + /*170*/ "In-Game Untertitel\n", + /*171*/ "Alternativer Titelbildschirm\n", + /*172*/ "Challenge beginnen\n", + /*173*/ "dataDyne Untersuchung", + /*174*/ "Error\n", + /*175*/ "Das Controller Pak \nwurde entfernt.\n", + /*176*/ "Schaden beheben\n", + /*177*/ "Sind Sie sicher, dass \nSie das Controller Pak \nreparieren wollen)\n", + /*178*/ "Es knnten Daten verloren gehen!\n", + /*179*/ "Abbruch\n", + /*180*/ "Reparatur\n", + /*181*/ "Reparatur erfolgreich\n", + /*182*/ "Das Controller Pak \nwurde repariert.\n", + /*183*/ "Reparatur fehlgeschlagen\n", + /*184*/ "Das Controller Pak \nkann nicht repariert werden.\nSie knnen keine \nDaten laden \noder speichern.\n", + /*185*/ "Spieler-Handicaps\n", + /*186*/ "L/R-TASTEN: ", + /*187*/ "C-KNOPF OBEN: ", + /*188*/ "C-KNヨPFE LINKS/RECHTS: ", + /*189*/ "C-KNOPF UNEN: ", + /*190*/ "A-KNOPF: ", + /*191*/ "B-KNOPF: ", + /*192*/ "ANALOGER 3D-STICK: ", + /*193*/ "Z-TRIGGER: ", + /*194*/ "+ STEUERKREUZ: ", + /*195*/ "ZIELEN", + /*196*/ "ZIELFUNKTION", + /*197*/ "NACH OBEN SCHAUEN", + /*198*/ "NACH UNTEN SCHAUEN", + /*199*/ "NACH UNTEN SCHAUEN", + /*200*/ "NACH OBEN SCHAUEN", + /*201*/ "VORWトRTS", + /*202*/ "RワCKWトRTS", + /*203*/ "AUSWEICHEN", + /*204*/ "WAFFE", + /*205*/ "AKTION/NACHLADEN", + /*206*/ "FEUER", + /*207*/ "GEHEN/DREHEN", + /*208*/ "UMSCHAUEN", + /*209*/ "GEHEN/AUSWEICHEN", + /*210*/ "UMSCHAUEN/AUSWEICHEN", + /*211*/ "WIE C-KNヨPFE", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Steuerungsart %s %s\n", + /*215*/ "(Einh舅dig)", + /*216*/ "(Beidh舅dig)", + /*217*/ "Halten Sie den Waffen-Knopf gedrckt, um das Quick-Men aufzurufen.\nHalten Sie den Aktions-Knopf gedrckt, um die Funktion zu 舅dern.\nAktion+Feuer 舅dert die Funktion kurzzeitig.\nMit der Zielfunktion knnen Sie genauer zielen.\nZielen + C-Knopf unten = kriechen.\nZielen + C-Knopf oben = aufstehen.\n", + /*218*/ "Alle Cheats deaktivieren\n", + /*219*/ "Sprachfilter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORT:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Einstellungen w臧len:\n", + /*224*/ "Gegnerische Reaktion:\n", + /*225*/ "Gegnerische Energie:\n", + /*226*/ "Schaden durch Gegner:\n", + /*227*/ "Gegnerische Genauigkeit:\n", + /*228*/ "OK\n", + /*229*/ "Abbruch\n", + /*230*/ "Controller Pak wurde nicht gefunden\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "File Name duplizieren\n", + /*234*/ "beinhaltet bereits\n", + /*235*/ "ein File namens\n", + /*236*/ "File umbenennen\n", + /*237*/ "Location wechseln\n", + /*238*/ "Abbruch\n", + /*239*/ "File Namen 舅dern\n", + /*240*/ "Neuen Namen eingeben:\n", + /*241*/ "Das zu kopierende File \nkann nicht gelscht werden.\n", + /*242*/ "SchockSim:%d\n", + /*243*/ "Maximale Zeit:\n", + /*244*/ "Neuer Cheat verfgbar!\n", + /*245*/ "Weiter\n", + /*246*/ "Letzten Level wiederholen\n", + /*247*/ "Spieler speichern\n", + /*248*/ "Neuen Spieler und \nWerte speichern?\n", + /*249*/ "Speichern\n", + /*250*/ "Nein Danke!\n", + /*251*/ "Spielernamen best舩igen:\n", + /*252*/ "Das gespeicherte File wurde \naufgrund von besch臈igten Daten \noder Hardware-Sch臈en \ngelscht.\n", + /*253*/ "Weiter\n", + /*254*/ "Error\n", + /*255*/ "Game Boy-Modul kann nicht gelesen werden.\nBitte berprfen Sie, ob\ndas richtige Game Boy-Modul\neingelegt ist.\n", + /*256*/ "Abbruch\n", + /*257*/ "Error\n", + /*258*/ "Die gespeicherten Daten\n", + /*259*/ "wurden aufgrund einer\n", + /*260*/ "Besch臈igung gelscht.\n", + /*261*/ "Abbruch\n", + /*262*/ "W臧len Sie die Sprache:\n", + /*263*/ "Englisch\n", + /*264*/ "Franzsisch\n", + /*265*/ "Deutsch\n", + /*266*/ "Italienisch\n", + /*267*/ "Spanisch\n", + /*268*/ "Amerikanisch\n", + /*269*/ "Sprache:\n", + /*270*/ "Sprache\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_i.c b/src/files/lang/pal-beta/mpweapons_str_i.c new file mode 100644 index 000000000..10a28539c --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_i.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%sha il\nConnettore Dati\n", + /* 1*/ "%sha il\nCartella\n", + /* 2*/ "%sha la Cartella di %s\n", + /* 3*/ "%sha la nostra\nCartella\n", + /* 4*/ "Presa la Cartella di %s\n", + /* 5*/ "Hai preso la\nCartella di %s\n", + /* 6*/ "%s ha preso la nostra\nCartella\n", + /* 7*/ "%s ha preso la\nCartella di %s\n", + /* 8*/ "Un punto per la resistenza!\n", + /* 9*/ "Dovresti aver cura\n", + /* 10*/ "dei tuoi amici!\n", + /* 11*/ "Ben fatto!\n", + /* 12*/ "Libero!\n", + /* 13*/ "Due punti ...\n", + /* 14*/ "Sei la vittima!\n", + /* 15*/ "Proteggi %s!\n", + /* 16*/ "Prendi %s!\n", + /* 17*/ "Scaricamento avvenuto.\n", + /* 18*/ "Connessione fallita.\n", + /* 19*/ "Avvio scaricamento.\n", + /* 20*/ "Devi usare il Connettore Dati.\n", + /* 21*/ "Re \ndel colle!\n", + /* 22*/ "Abbiamo\nil colle!\n", + /* 23*/ "%sha preso\nil colle!\n", + /* 24*/ "%ds/punto\n", + /* 25*/ "Un punto!\n", + /* 26*/ "Niente scudo\n", + /* 27*/ "Automatica\n", + /* 28*/ "Lanciamissili\n", + /* 29*/ "Replicanti\n", + /* 30*/ "Re del Colle\n", + /* 31*/ "TeleVista complessa\n", + /* 32*/ "Prendi la cartella\n", + /* 33*/ "Pistola un colpo micidiale\n", + /* 34*/ "Prendi la cassa\n", + /* 35*/ "Mimesi\n", + /* 36*/ "Esplosivi tempio\n", + /* 37*/ "Killer\n", + /* 38*/ "Sedativo\n", + /* 39*/ "Al rallentatore\n", + /* 40*/ "Premi START\n", + /* 41*/ "In pausa\n", + /* 42*/ "Personale\n", + /* 43*/ "A caso\n", + /* 44*/ "Cinque a caso\n", + /* 45*/ "Lotta ravvicinata\n", + /* 46*/ "Mina di Prossimit濬n", + /* 47*/ "Lanciamissili\n", + /* 48*/ "Lanciagranate\n", + /* 49*/ "Esplosivo\n", + /* 50*/ "Magnum d'oro\n", + /* 51*/ "Pesante\n", + /* 52*/ "Sedativo\n", + /* 53*/ "TeleVista\n", + /* 54*/ "Power\n", + /* 55*/ "Automatico\n", + /* 56*/ "Pistole\n", + /* 57*/ "Prova\n", + /* 58*/ "Prova 4mb\n", + /* 59*/ "Niente\n", + /* 60*/ "Scudo\n", + /* 61*/ "Disattivato\n", + /* 62*/ "Obiettivi raggiunti\n", + /* 63*/ "Sconosciuto\n", + /* 64*/ "Mancante\n", + /* 65*/ "Controller Pak difettoso\n", + /* 66*/ "ネ danneggiato o \n", + /* 67*/ "inserito male.\n", + /* 68*/ "Sistemalo\n", + /* 69*/ "Riprova\n", + /* 70*/ "Continua senza\nController Pak\n", + /* 71*/ "Controller Pak pieno\n", + /* 72*/ "Memoria esaurita,\nimpossibile salvare.\n", + /* 73*/ "Accedi al menu\nController Pak per\nliberare spazio (premi START\n all'avvio del gioco.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Pugni uragano\n", + /* 77*/ "Dispositivo mimetico\n", + /* 78*/ "Invulnerabile\n", + /* 79*/ "Tutte armi per miss. indiv.\n", + /* 80*/ "Munizioni illimitate\n", + /* 81*/ "Munizioni illimitate, senza ricarica\n", + /* 82*/ "Un giocatore al rallentatore \n", + /* 83*/ "Modalit DK\n", + /* 84*/ "Magnum di Trent\n", + /* 85*/ "TeleVista\n", + /* 86*/ "Jo Piccola\n", + /* 87*/ "Personaggi piccoli\n", + /* 88*/ "Scudi nemici\n", + /* 89*/ "Scudo di Jo\n", + /* 90*/ "SuperScudo\n", + /* 91*/ "Vista classica\n", + /* 92*/ "Solo capi squadra\n", + /* 93*/ "Gioca come Elvis\n", + /* 94*/ "Missili nemici\n", + /* 95*/ "Munizioni illimitate - Pistola Laptop Sentinella\n", + /* 96*/ "Regole del Marchese di Queensbury\n", + /* 97*/ "BuioPerfect\n", + /* 98*/ "Pugile\n", + /* 99*/ "Colpo\n", + /*100*/ "Toccata e fuga\n", + /*101*/ "Alieno\n", + /*102*/ "Puntatore R/Disposizione armi nascoste\n", + /*103*/ "Lanciamissili\n", + /*104*/ "Fucile cecchino\n", + /*105*/ "Scanner a raggi X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Pistola Laptop\n", + /*108*/ "Phoenix\n", + /*109*/ "PsicoArma\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Divertimento\n", + /*120*/ "Gioco\n", + /*121*/ "Armi\n", + /*122*/ "Amici\n", + /*123*/ "Armi per Jo da sola\n", + /*124*/ "Armi classiche per Jo da sola\n", + /*125*/ "Ribellione dD", + /*126*/ "Salvataggio dD", + /*127*/ "Infiltrazione A51", + /*128*/ "Salvataggio A51", + /*129*/ "Fuga A51", + /*130*/ "Difficolt:\n", + /*131*/ "Trucco Missioni Individuali\n", + /*132*/ "Trucco Simulatore Lotta\n", + /*133*/ "Trucco Collaborazione\n", + /*134*/ "Trucco Tutti-contro-Tutti\n", + /*135*/ "Disonore\n", + /*136*/ "Truccata\n", + /*137*/ "Trucco disponibile", + /*138*/ "Completa", + /*139*/ "per trucco:", + /*140*/ "con", + /*141*/ "in meno di", + /*142*/ " o inserisci Perfect Dark Game Boy (r) nel Transfer Pak (tm), connetti il Transfer Pak ad un Controller, esci e accedi al menu", + /*143*/ "Seleziona trucco per informazioni\n", + /*144*/ "Amico disponibile", + /*145*/ "Vinci medaglie d'oro al poligono per attivare le pistole classiche.\n", + /*146*/ "Vista su schermo\n", + /*147*/ "Obiettivo\n", + /*148*/ "Area Zoom\n", + /*149*/ "Munizioni\n", + /*150*/ "Funzioni arma\n", + /*151*/ "Macchia colorata\n", + /*152*/ "Didascalie\n", + /*153*/ "Tempo Missione\n", + /*154*/ "Modalit濬n", + /*155*/ "Dividi\n", + /*156*/ "Vuoi interrompere\nla missione?\n", + /*157*/ "Pelle Joanna\n", + /*158*/ "Negoziatore Joanna\n", + /*159*/ "Gilet Elvis\n", + /*160*/ "Errore\n", + /*161*/ "Impossibile eliminare\nfile in uso.\n", + /*162*/ "Annulla\n", + /*163*/ "Limite tempo:\n", + /*164*/ "Limite punti:\n", + /*165*/ "Limite punti squadra:\n", + /*166*/ "Sfida compiuta!\n", + /*167*/ "Sfida fallita!\n", + /*168*/ "Sfida truccata!\n", + /*169*/ "Didascalie film\n", + /*170*/ "Didascalie nel gioco\n", + /*171*/ "Schermo alternativo titolo\n", + /*172*/ "Inizia sfida\n", + /*173*/ "Indagine dataDyne", + /*174*/ "Errore\n", + /*175*/ "Il Controller Pak\n stato tolto.\n", + /*176*/ "Sistemalo\n", + /*177*/ "Sicuro di voler\nsistemare il\nController Pak?\n", + /*178*/ "Potresti perdere i dati!\n", + /*179*/ "Annulla\n", + /*180*/ "Sistema\n", + /*181*/ "Ci sei riuscito!\n", + /*182*/ "Il Controller Pak\n stato sistemato.\n", + /*183*/ "Non ci sei riuscito.\n", + /*184*/ "Impossibile sistemare\nil Controller Pak:\nimpossibile caricare\no salvare su questo\nController Pak.\n", + /*185*/ "Svantaggio giocatore\n", + /*186*/ "PULSANTI L/R: ", + /*187*/ "PULSANTE C SU: ", + /*188*/ "PULSANTI C DX/SX: ", + /*189*/ "PULSANTE C GIル: ", + /*190*/ "PULSANTE A: ", + /*191*/ "PULSANTE B: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "PULSANTE Z: ", + /*194*/ "PULSANTIERA +: ", + /*195*/ "MIRA", + /*196*/ "DIS/ATTIVA MIRA", + /*197*/ "GUARDA SU", + /*198*/ "GUARDA GIル", + /*199*/ "GUARDA GIル", + /*200*/ "GUARDA SU", + /*201*/ "AVANTI", + /*202*/ "INDIETRO", + /*203*/ "SPOSTATI", + /*204*/ "ARMA", + /*205*/ "AZIONE/RICARICA", + /*206*/ "FUOCO", + /*207*/ "VAI/GIRA", + /*208*/ "GUARDA", + /*209*/ "VAI/SPOSTATI", + /*210*/ "VAI/SPOSTATI", + /*211*/ "COME PULSANTI C", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Modalit comandi %s %s\n", + /*215*/ "(a una mano)", + /*216*/ "(a due mani)", + /*217*/ "Tieni premuto ARMA per menu rapido.\nTieni premuto AZIONE per dis/attivare funzioni.\nAZIONE+FUOCO per cambiare funzioni.\nCon MIRA puoi mirare accuratamente.\nMIRA + C GIル per accucciarti.\nMIRA + C SU per alzarti.\n", + /*218*/ "Disattiva i trucchi\n", + /*219*/ "Filtro lingua\n", + /*220*/ "NOME UTENTE:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Scegli impostaz.:\n", + /*224*/ "Velocit reazione nemico:\n", + /*225*/ "Salute nemico:\n", + /*226*/ "Danno nemico:\n", + /*227*/ "Precisione nemico:\n", + /*228*/ "OK\n", + /*229*/ "Annulla\n", + /*230*/ "Controller Pak assente\n", + /*231*/ "Nome:\n", + /*232*/ "Dove:\n", + /*233*/ "Copia nome file\n", + /*234*/ "contiene gi un\n", + /*235*/ "file di nome\n", + /*236*/ "Rinomina file\n", + /*237*/ "Cambia posto\n", + /*238*/ "Annulla\n", + /*239*/ "Cambia nome file\n", + /*240*/ "Digita nuovo nome:\n", + /*241*/ "Il file che stai copiando\nnon pu essere cancellato.\n", + /*242*/ "RepShock:%d\n", + /*243*/ "Tempo-obiettivo:\n", + /*244*/ "Nuovo trucco disponibile!:\n", + /*245*/ "Continua\n", + /*246*/ "Replay ultimo livello\n", + /*247*/ "Salva giocatore\n", + /*248*/ "Salva nuovo giocatore\ne statistiche?\n", + /*249*/ "Salva!\n", + /*250*/ "Non salvare!\n", + /*251*/ "Conferma nome giocatore:\n", + /*252*/ "Il file in memoria\n stato cancellato\na causa di un errore.\n", + /*253*/ "Continua\n", + /*254*/ "Errore\n", + /*255*/ "Impossibile leggere la cassetta\ndi gioco Game Boy. Controlla le\nconnessioni e assicurati che si\ntratti della cassetta giusta.\n", + /*256*/ "Annulla\n", + /*257*/ "Errore\n", + /*258*/ "I dati in memoria\n", + /*259*/ "sono stati eliminati.\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Annulla\n", + /*262*/ "Scegli la lingua:\n", + /*263*/ "Inglese\n", + /*264*/ "Francese\n", + /*265*/ "Tedesco\n", + /*266*/ "Italiano\n", + /*267*/ "Spagnolo\n", + /*268*/ "Americano\n", + /*269*/ "Lingua:\n", + /*270*/ "Lingua\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_s.c b/src/files/lang/pal-beta/mpweapons_str_s.c new file mode 100644 index 000000000..782579dfe --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_s.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%stiene el/la\nConector de Datos\n", + /* 1*/ "%stiene el/la\nMaletn\n", + /* 2*/ "%stiene el/la %s Maletn\n", + /* 3*/ "%stiene nuestra\nMaletn\n", + /* 4*/ "Atrap el/la %s Maletn\n", + /* 5*/ "Has capturado\nel/la %s Maletn\n", + /* 6*/ "%scapturado nuestra\nMaletn\n", + /* 7*/ "%scapturado\nel/la %s Maletn\n", + /* 8*/ "。Un punto por sobrevivir!\n", + /* 9*/ "。Se supone que debes\n", + /* 10*/ "proteger a tus amigos!\n", + /* 11*/ "。Bien hecho!\n", + /* 12*/ "。T la llevas!\n", + /* 13*/ "Obtienes 2 Puntos...\n", + /* 14*/ "。Eres la vctima!\n", + /* 15*/ "。Protege a %s!\n", + /* 16*/ "。Coge %s!\n", + /* 17*/ "Descarga completada.\n", + /* 18*/ "Conexin perdida.\n", + /* 19*/ "Comenzando descarga.\n", + /* 20*/ "Necesitas usar el Conector de Datos.\n", + /* 21*/ "。Rey de\nla Colina!\n", + /* 22*/ "。Tenemos\nla Colina!\n", + /* 23*/ "。%sha capturado\nla Colina!\n", + /* 24*/ "%ds/Punto\n", + /* 25*/ "。1 Punto!\n", + /* 26*/ "Sin Escudo\n", + /* 27*/ "Autom疸icas\n", + /* 28*/ "Lanzacohetes\n", + /* 29*/ "Simulantes\n", + /* 30*/ "Rey de la Colina\n", + /* 31*/ "Complejo FarSight\n", + /* 32*/ "Mant駭 el Maletn\n", + /* 33*/ "Pistola mata de Un Tiro\n", + /* 34*/ "Captura la Maleta\n", + /* 35*/ "Ocultacin\n", + /* 36*/ "Explosivos del Templo\n", + /* 37*/ "Asesino\n", + /* 38*/ "Tranquilizante\n", + /* 39*/ "C疥ara Lenta\n", + /* 40*/ "Pulsa START\n", + /* 41*/ "Pausa\n", + /* 42*/ "Personalizado\n", + /* 43*/ "Aleatorio\n", + /* 44*/ "Cinco Aleatorias\n", + /* 45*/ "Cuerpo a Cuerpo\n", + /* 46*/ "Minas de Proximidad\n", + /* 47*/ "Lanzacohetes\n", + /* 48*/ "Lanzagranadas\n", + /* 49*/ "Explosivos\n", + /* 50*/ "Magnum Dorada\n", + /* 51*/ "Armas Pesadas\n", + /* 52*/ "Tranquilizantes\n", + /* 53*/ "FarSight\n", + /* 54*/ "Fuerza Bruta\n", + /* 55*/ "Autom疸icas\n", + /* 56*/ "Pistolas\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Nada\n", + /* 60*/ "Escudo\n", + /* 61*/ "Desactivado\n", + /* 62*/ "Objetivos Completados\n", + /* 63*/ "Desconocido\n", + /* 64*/ "Desaparecido\n", + /* 65*/ "Controller Pak Daado\n", + /* 66*/ "est daado o\n", + /* 67*/ "mal insertado.\n", + /* 68*/ "Intentar Reparar\n", + /* 69*/ "Reintentar\n", + /* 70*/ "Continuar sin usar\nel Controller Pak\n", + /* 71*/ "Controller Pak Lleno\n", + /* 72*/ "Est demasiado lleno. Se\nnecesitan 1 nota y 28\np疊inas para guardar.\n", + /* 73*/ "Entra en el Men del\nController Pak para liberar\nespacio (pulsa START\nmientras enciendes.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Puetazos Hurac疣\n", + /* 77*/ "Dispositivo de Ocultacin\n", + /* 78*/ "Invencible\n", + /* 79*/ "Todas las Armas en Solo\n", + /* 80*/ "Municin Ilimitada\n", + /* 81*/ "Municin Ilimitada sin Recargas\n", + /* 82*/ "Un jugador C疥ara Lenta\n", + /* 83*/ "Modo DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Mini-Joanna\n", + /* 87*/ "Mini-Personajes\n", + /* 88*/ "Escudo de Enemigos\n", + /* 89*/ "Escudo de Joanna\n", + /* 90*/ "Sper Escudo\n", + /* 91*/ "Mirilla Cl疽ica\n", + /* 92*/ "Slo Jefes de Equipo\n", + /* 93*/ "Jugar como Elvis\n", + /* 94*/ "Cohetes Enemigos\n", + /* 95*/ "Municin Ilimitada - Arma PC Centinela\n", + /* 96*/ "Reglas del Marqu駸 de Queensbury\n", + /* 97*/ "Oscuridad Perfecta\n", + /* 98*/ "Pugilista\n", + /* 99*/ "Disparo Caliente\n", + /*100*/ "Golpea y Corre\n", + /*101*/ "Aliengena\n", + /*102*/ "Rastreador/Localizacin de armas\n", + /*103*/ "Lanzacohetes\n", + /*104*/ "Rifle Francotirador\n", + /*105*/ "Esc疣er de Rayos-X\n", + /*106*/ "SuperDragn\n", + /*107*/ "Arma PC\n", + /*108*/ "Phoenix\n", + /*109*/ "Pistola Psicosis\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "Klo1313\n", + /*113*/ "KF7 Especial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Diversin\n", + /*120*/ "Jugabilidad\n", + /*121*/ "Armas\n", + /*122*/ "Compaeros\n", + /*123*/ "Armas para Joanna en Solo\n", + /*124*/ "Armas Cl疽icas para Joanna en Solo\n", + /*125*/ "Entrando en dataDyne", + /*126*/ "Extraccin de dataDyne", + /*127*/ "Infiltracin en A51", + /*128*/ "Rescate en A51", + /*129*/ "Escape de A51", + /*130*/ "Dificultad:\n", + /*131*/ "Trucos en Misiones Solo\n", + /*132*/ "Trucos en Simulador de Combate\n", + /*133*/ "Trucos en Cooperativo\n", + /*134*/ "Trucos en Contra-Operativa\n", + /*135*/ "Sin honor\n", + /*136*/ "Trucada\n", + /*137*/ "Truco disponible", + /*138*/ "Completa", + /*139*/ "para el truco:", + /*140*/ "en", + /*141*/ "por debajo de", + /*142*/ " o inserta Perfect Dark de Game Boy (r) en un Transfer Pak (tm), conecta el Transfer Pak a cualquier mando, y sal y vuelve a entrar en el men", + /*143*/ "Elige truco para m疽 informacin\n", + /*144*/ "Camarada disponible", + /*145*/ "Gana Oros en las pruebas de tiro para activar las armas cl疽icas.\n", + /*146*/ "Mirilla en Pantalla\n", + /*147*/ "Blanco\n", + /*148*/ "Alcance de Zoom\n", + /*149*/ "Mostrar Municin\n", + /*150*/ "Funciones del Arma\n", + /*151*/ "Bolas de Pintura\n", + /*152*/ "Subttulos\n", + /*153*/ "Tiempo de la Misin\n", + /*154*/ "Modo\n", + /*155*/ "Corte\n", + /*156*/ "ソQuieres interrumpir\nla misin?\n", + /*157*/ "Joanna en Piel\n", + /*158*/ "Joanna Negociadora\n", + /*159*/ "Elvis (Chaleco)\n", + /*160*/ "Error\n", + /*161*/ "No se puede borrar el fichero\nya que se est usando.\n", + /*162*/ "Cancelar\n", + /*163*/ "Lmite Tiempo:\n", + /*164*/ "Lmite Puntos:\n", + /*165*/ "Lmite P. Equipo:\n", + /*166*/ "。Desafo Completado!\n", + /*167*/ "。Desafo Fallado!\n", + /*168*/ "。Desafo Trucado!\n", + /*169*/ "Subttulos en Escenas\n", + /*170*/ "Subttulos en el Juego\n", + /*171*/ "Pantalla de Ttulo Alternativa\n", + /*172*/ "Empezar Desafo\n", + /*173*/ "Investigacin dataDyne", + /*174*/ "Error\n", + /*175*/ "El Controller Pak\nha sido quitado.\n", + /*176*/ "Intentar Reparacin\n", + /*177*/ "ソEst疽 seguro de que quieres\nintentar reparar este\nController Pak?\n", + /*178*/ "。Puedes perder datos!\n", + /*179*/ "Cancelar\n", + /*180*/ "Reparar\n", + /*181*/ "Reparado con ノxito\n", + /*182*/ "El Controller Pak ha\nsido reparado.\n", + /*183*/ "Reparacin Fallada\n", + /*184*/ "El Controller Pak \nno puede ser reparado.\nNo podr疽 cargar o\nguardar en este\nController Pak.\n", + /*185*/ "Handicaps Jugador\n", + /*186*/ "BOTONES L/R: ", + /*187*/ "BOTモN C ARRIBA: ", + /*188*/ "BOTONES C I./D.: ", + /*189*/ "BOTモN C ABAJO: ", + /*190*/ "BOTモN A: ", + /*191*/ "BOTモN B: ", + /*192*/ "STICK C.: ", + /*193*/ "BモTON Z: ", + /*194*/ "+ PANEL C.: ", + /*195*/ "APUNTAR", + /*196*/ "CAMBIAR A PUNTAR", + /*197*/ "MIRAR ARRIBA", + /*198*/ "MIRAR ABAJO", + /*199*/ "MIRAR ABAJO", + /*200*/ "MIRAR ARRIBA", + /*201*/ "ADELANTE", + /*202*/ "ATRチS", + /*203*/ "DESP. LATERAL", + /*204*/ "ARMA", + /*205*/ "ACCIモN/RECARGA", + /*206*/ "DISPARO", + /*207*/ "CAMINAR/VOLVER", + /*208*/ "MIRAR", + /*209*/ "CAMINAR/DESP.", + /*210*/ "MIRAR/DESP.", + /*211*/ "COMO BOTONES C", + /*212*/ "Mando 1:", + /*213*/ "Mando 2:", + /*214*/ "Estilo de Control %s %s\n", + /*215*/ "(1 Mando)", + /*216*/ "(2 Mandos)", + /*217*/ "Mant駭 Arma para el men r疳ido.\nMant駭 Accin para cambiar funcin.\nAccin+Disparo cambia temp. la funcin.\nApuntar aporta una mayor precisin.\nApuntar + Botn C Abajo te agacha.\nApuntar + Botn C Arriba te levanta.\n", + /*218*/ "Desactiva todos los Trucos\n", + /*219*/ "Filtro de Lenguaje\n", + /*220*/ "USUARIO:\n", + /*221*/ "CLAVE:\n", + /*222*/ "Oscuridad Perfecta\n", + /*223*/ "Elige Opciones:\n", + /*224*/ "Velocidad de Reaccin Enemiga:\n", + /*225*/ "Salud del Enemigo:\n", + /*226*/ "Dao del Enemigo:\n", + /*227*/ "Precisin del Enemigo:\n", + /*228*/ "Aceptar\n", + /*229*/ "Cancelar\n", + /*230*/ "Controller Pak No Encontrado\n", + /*231*/ "Nombre:\n", + /*232*/ "Lugar:\n", + /*233*/ "Nombre de Fichero Duplicado\n", + /*234*/ "ya tiene\n", + /*235*/ "un fichero nombrado\n", + /*236*/ "Renombrar Fichero\n", + /*237*/ "Cambiar Lugar\n", + /*238*/ "Cancelar\n", + /*239*/ "Cambiar Nombre de Fichero\n", + /*240*/ "Introduce nuevo nombre:\n", + /*241*/ "El fichero que est疽 copiando\nno puede ser borrado.\n", + /*242*/ "SimShock:%d\n", + /*243*/ "Tiempo Requerido:\n", + /*244*/ "。Nuevo Truco Disponible!:\n", + /*245*/ "Continua\n", + /*246*/ "Volver a Jugar el Nivel\n", + /*247*/ "Guardar Jugador\n", + /*248*/ "ソGuardar Nuevo jugador\ny estadsticas?\n", + /*249*/ "Guardar Ahora\n", + /*250*/ "。No Gracias!\n", + /*251*/ "Confirmar nombre de jugador:\n", + /*252*/ "El fichero guardado ha\nsido borrado debido\na datos corruptos\no daados.\n", + /*253*/ "Continuar\n", + /*254*/ "Error\n", + /*255*/ "No se puede acceder al Cartucho de GB.\nComprueba las conexiones y asegrate\nde que est疽 usando el cartucho de\nGame Boy correcto.\n", + /*256*/ "Cancelar\n", + /*257*/ "Error\n", + /*258*/ "Los datos guardados\n", + /*259*/ "han sido borrados\n", + /*260*/ "porque estaban daados.\n", + /*261*/ "Cancelar\n", + /*262*/ "Elige tu idioma:\n", + /*263*/ "Ingl駸\n", + /*264*/ "Franc駸\n", + /*265*/ "Alem疣\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "I. Americano\n", + /*269*/ "Idioma:\n", + /*270*/ "Idioma\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/oatE.c b/src/files/lang/pal-beta/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oatJ.c b/src/files/lang/pal-beta/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oatP.c b/src/files/lang/pal-beta/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_f.c b/src/files/lang/pal-beta/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_g.c b/src/files/lang/pal-beta/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_i.c b/src/files/lang/pal-beta/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_s.c b/src/files/lang/pal-beta/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oldE.c b/src/files/lang/pal-beta/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oldJ.c b/src/files/lang/pal-beta/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oldP.c b/src/files/lang/pal-beta/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_f.c b/src/files/lang/pal-beta/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_g.c b/src/files/lang/pal-beta/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_i.c b/src/files/lang/pal-beta/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_s.c b/src/files/lang/pal-beta/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/optionsE.c b/src/files/lang/pal-beta/optionsE.c new file mode 100644 index 000000000..c54dedc98 --- /dev/null +++ b/src/files/lang/pal-beta/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 28.7 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/optionsJ.c b/src/files/lang/pal-beta/optionsJ.c new file mode 100644 index 000000000..4ed3c13c7 --- /dev/null +++ b/src/files/lang/pal-beta/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "JAP Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/optionsP.c b/src/files/lang/pal-beta/optionsP.c new file mode 100644 index 000000000..c54dedc98 --- /dev/null +++ b/src/files/lang/pal-beta/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 28.7 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_f.c b/src/files/lang/pal-beta/options_str_f.c new file mode 100644 index 000000000..431d14267 --- /dev/null +++ b/src/files/lang/pal-beta/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Succ鑚\n", + /* 1*/ "Inachev饅n", + /* 2*/ "Echec\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terre:", + /* 6*/ " pr馼istoire", + /* 7*/ "rare pr駸ente", + /* 8*/ "Rouge\n", + /* 9*/ "Jaune\n", + /* 10*/ "Bleu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Rose\n", + /* 15*/ "Marron\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Robe\n", + /* 19*/ "Joanna Robe courte\n", + /* 20*/ "Joanna Htesse\n", + /* 21*/ "Joanna Plong馥\n", + /* 22*/ "Joanna Scaphandre\n", + /* 23*/ "Joanna Arctique\n", + /* 24*/ "Joanna Laborantin.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Technicien IC H\n", + /* 34*/ "Technicien IC F\n", + /* 35*/ "Soldat IC\n", + /* 36*/ "Commando dataDyne\n", + /* 37*/ "Femme Garde dataDyne\n", + /* 38*/ "S馗urit dataDyne\n", + /* 39*/ "Infanterie dataDyne\n", + /* 40*/ "Troupes dataDyne\n", + /* 41*/ "Secr騁aire\n", + /* 42*/ "Tenue de Bureau\n", + /* 43*/ "Tenue de Bureau\n", + /* 44*/ "N馮ociateur\n", + /* 45*/ "Sniper dataDyne\n", + /* 46*/ "Garde G5\n", + /* 47*/ "Garde SWAT G5\n", + /* 48*/ "Agent CIA\n", + /* 49*/ "Agent FBI\n", + /* 50*/ "Garde Secteur 51\n", + /* 51*/ "Soldat Secteur 51\n", + /* 52*/ "Pilote\n", + /* 53*/ "Ensemble\n", + /* 54*/ "Garde du Corps NSA\n", + /* 55*/ "Technicien Homme\n", + /* 56*/ "Technicien Femelle\n", + /* 57*/ "Technicien dataDyne\n", + /* 58*/ "Bio technicien\n", + /* 59*/ "Garde Alaska\n", + /* 60*/ "Pilote AF One\n", + /* 61*/ "Steward\n", + /* 62*/ "Htesse\n", + /* 63*/ "Chef Htesse\n", + /* 64*/ "Le pr駸ident\n", + /* 65*/ "Groom NSA\n", + /* 66*/ "S馗urit Pr駸ident\n", + /* 67*/ "Clone Pr駸ident\n", + /* 68*/ "Garde Pelagic II\n", + /* 69*/ "Soldat Maian\n", + /* 70*/ "Smoking\n", + /* 71*/ "- Pas de Manette branch馥 dans le port 1 -", + /* 72*/ "Eteindre et brancher une manette", + /* 73*/ "DETECTE", + /* 74*/ "NON DETECTE", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Identification Produit Nintendo 64\n", + /* 78*/ "ID Produit:\n", + /* 79*/ "Code Produit:\n", + /* 80*/ "Variante:\n", + /* 81*/ "D騅eloppeur:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "Le Logo Rareware et Perfect Dark sont des trademarks Rare Ltd.\n", + /* 88*/ "Pr駸ent en Dolby Surround. Dolby et le double-D\nsont des trademarks des laboratoires Dolby.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choisissez votre r饌lit饅n", + /* 97*/ "Nouveau...\n", + /* 98*/ "Nouvel Agent...\n", + /* 99*/ "Fichier\n", + /*100*/ "Copier:\n", + /*101*/ "Effacer:\n", + /*102*/ "Effacer notes de jeu...\n", + /*103*/ "Fichier un joueur agent\n", + /*104*/ "Fichier param鑼res simulateur combat\n", + /*105*/ "Fichier joueur simulateur combat\n", + /*106*/ "Fichier PerfcetHead\n", + /*107*/ "Controller Pak\n", + /*108*/ "Utiliser cet 馘iteur pour effacer les notes de jeu\nde votre Controller Pak.\n", + /*109*/ "Choisir le Controller Pak 馘iter:\n", + /*110*/ "Sortie\n", + /*111*/ "Cartouche\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missions Solo\n", + /*118*/ "Simulateur de Combat\n", + /*119*/ "Coop駻atif\n", + /*120*/ "Contre-Op駻ation\n", + /*121*/ "Cin駑a\n", + /*122*/ "S駘ection Mission\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Missions sp馗iales\n", + /*133*/ "Centre dataDyne", + /*134*/ "- D馭ection", + /*135*/ "Recherche dataDyne", + /*136*/ "- Enqu黎e", + /*137*/ "Centre dataDyne", + /*138*/ "- Extraction", + /*139*/ "Villa Carrington", + /*140*/ "- Otage", + /*141*/ "Chicago", + /*142*/ "- Furtif", + /*143*/ "Immeuble G5", + /*144*/ "- Reconnaissance", + /*145*/ "Secteur 51", + /*146*/ "- Infiltration", + /*147*/ "Secteur 51", + /*148*/ "- Sauvetage", + /*149*/ "Secteur 51", + /*150*/ "- Fuite", + /*151*/ "Base A駻ienne", + /*152*/ "- Espionnage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorisme", + /*155*/ "Site du Crash", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Abysses", + /*160*/ "- Eliminer la menace", + /*161*/ "Institut Carrington", + /*162*/ "- D馭ense", + /*163*/ "Croiseur", + /*164*/ "- Assaut", + /*165*/ "Ruines Skedars", + /*166*/ "- Autel Combat", + /*167*/ "Blonde: la vengeance", + /*168*/ "SOS Maian", + /*169*/ "Sauver l'Institut", + /*170*/ "GUERRE!", + /*171*/ "Le Duel", + /*172*/ "Statut\n", + /*173*/ "Abandonner!\n", + /*174*/ "Attention\n", + /*175*/ "Voulez-vous abandonner la mission?\n", + /*176*/ "Annuler\n", + /*177*/ "Abandonner\n", + /*178*/ "Inventaire\n", + /*179*/ "Armes Disponibles\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Vid駮\n", + /*183*/ "Contrle\n", + /*184*/ "Affichage\n", + /*185*/ "Triche\n", + /*186*/ "Sauvegarder jeu\n", + /*187*/ "Changer d'Agent...\n", + /*188*/ "Attention\n", + /*189*/ "Voulez charger un autre agent?\n", + /*190*/ "Oui\n", + /*191*/ "Non\n", + /*192*/ "Options de contrle\n", + /*193*/ "Contrle Joueur 2\n", + /*194*/ "Style de contrle\n", + /*195*/ "Vis馥 invers馥\n", + /*196*/ "Regard t黎e\n", + /*197*/ "Vue t黎e\n", + /*198*/ "Auto-ciblage\n", + /*199*/ "Contrle ciblage\n", + /*200*/ "Retour\n", + /*201*/ "Maintenu\n", + /*202*/ "Altern饅n", + /*203*/ "Options d'affichage\n", + /*204*/ "Affichage Joueur 2\n", + /*205*/ "Vis馥 sur 馗ran\n", + /*206*/ "Toujours montrer cible\n", + /*207*/ "Montrer port馥 zoom\n", + /*208*/ "Munitions affich馥s\n", + /*209*/ "Montrer fonction arme\n", + /*210*/ "Paintball\n", + /*211*/ "Sous-titre\n", + /*212*/ "Afficher temps mission\n", + /*213*/ "Retour\n", + /*214*/ "Options Vid駮\n", + /*215*/ "Taille 馗ran\n", + /*216*/ "Ratio\n", + /*217*/ "Haute-Res\n", + /*218*/ "S駱aration 馗ran 2 joueurs\n", + /*219*/ "Retour\n", + /*220*/ "Plein\n", + /*221*/ "Large\n", + /*222*/ "Cin駑a\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Options Audio\n", + /*228*/ "Son\n", + /*229*/ "Musique\n", + /*230*/ "Mode Son\n", + /*231*/ "Retour\n", + /*232*/ "Mono", + /*233*/ "St駻駮", + /*234*/ "Casque", + /*235*/ "Surround", + /*236*/ "Contrle\n", + /*237*/ "Simple\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "S駘ection Difficult饅n", + /*249*/ "Difficult饅n", + /*250*/ "Meilleur Temps\n", + /*251*/ "Agent\n", + /*252*/ "Agent Sp馗ial\n", + /*253*/ "Agent Perfect\n", + /*254*/ "Annuler\n", + /*255*/ "Options Coop駻atif\n", + /*256*/ "Radar Actif\n", + /*257*/ "Binme Prot馮饅n", + /*258*/ "Binme Perfect\n", + /*259*/ "Continuer\n", + /*260*/ "Annuler\n", + /*261*/ "Humain", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Options Contre-Op駻ation\n", + /*267*/ "Radar Actif\n", + /*268*/ "Contre-Op駻ation\n", + /*269*/ "Continuer\n", + /*270*/ "Annuler\n", + /*271*/ "Joueur 1", + /*272*/ "Joueur 2", + /*273*/ "Briefing\n", + /*274*/ "Accepter\n", + /*275*/ "Refuser\n", + /*276*/ "Succ鑚\n", + /*277*/ "Echec\n", + /*278*/ "Statut Mission:\n", + /*279*/ "Statut Agent:\n", + /*280*/ "Temps Mission:\n", + /*281*/ "Arme de pr馘ilection:\n", + /*282*/ "Victimes:\n", + /*283*/ "Pr馗ision:\n", + /*284*/ "Total de tir:\n", + /*285*/ " Tirs T黎e:\n", + /*286*/ " Tirs Corps:\n", + /*287*/ " Tirs Membre:\n", + /*288*/ " Autres:\n", + /*289*/ "Appuyer sur START\n", + /*290*/ "D馗馘饅n", + /*291*/ "Actif\n", + /*292*/ "Vir饅n", + /*293*/ "Echec\n", + /*294*/ "Termin饅n", + /*295*/ "Abandon\n", + /*296*/ "Recommencer", + /*297*/ "Prochaine Mission", + /*298*/ "Accepter\n", + /*299*/ "Refuser\n", + /*300*/ "Objectifs\n", + /*301*/ "Appuyer sur START\n", + /*302*/ "Menu petit mais Perfect\n", + /*303*/ "Simulateur de Combat\n", + /*304*/ "Entranement\n", + /*305*/ "Audio / Vid駮\n", + /*306*/ "Changer d'Agent\n", + /*307*/ "Audio / Visuel\n", + /*308*/ "Son\n", + /*309*/ "Musique\n", + /*310*/ "Mode Son\n", + /*311*/ "Ratio\n", + /*312*/ "Retour\n", + /*313*/ "< Vide >\n", + /*314*/ "SUP", + /*315*/ "MAJ", + /*316*/ "ANNULER", + /*317*/ "OK", + /*318*/ "Visages de Simulateurs de Combat\n", + /*319*/ "Visages Mission\n", + /*320*/ "Erreur\n", + /*321*/ "Annuler\n", + /*322*/ "Controller Pak non d騁ect.\n", + /*323*/ "Fichier non sauvegard.\n", + /*324*/ "Fichier non chargeable.\n", + /*325*/ "Impossible d'effacer le fichier.\n", + /*326*/ "Plus de m駑oire.\n", + /*327*/ "Ce joueur est d駛濬ncharg pour cette partie.\n", + /*328*/ "a 騁 enlev.\n", + /*329*/ "Controller Pak est d馭ectueux ou mal ins駻.\n", + /*330*/ "Effacement des notes 馗hou.\n", + /*331*/ "Erreur de chargement de jeu\n", + /*332*/ "Erreur de sauvegarde de jeu\n", + /*333*/ "Erreur de chargement de joueur\n", + /*334*/ "Erreur de sauvegarde de joueur\n", + /*335*/ "Erreur chargement PerfectHead\n", + /*336*/ "Erreur sauvegarde PerfectHead\n", + /*337*/ "Erreur de lecture de fichier\n", + /*338*/ "Erreur d'馗riture de fichier\n", + /*339*/ "Erreur\n", + /*340*/ "Echec Effacement\n", + /*341*/ "Impossible d'effacer le fichier.\n", + /*342*/ "- V駻ifier que le Controller Pak est\nins駻 correctement.\n", + /*343*/ "Annuler\n", + /*344*/ "Il n'y a plus de place.\n", + /*345*/ "Cool!\n", + /*346*/ "Fichier sauvegard.\n", + /*347*/ "OK\n", + /*348*/ "Une erreur est survenue\npendant la sauvegarde.\n", + /*349*/ "Essayer encore\n", + /*350*/ "Sauvegarder dans un autre emplacement\n", + /*351*/ "Annuler\n", + /*352*/ "Une erreur est survenue\npendant le chargement.\n", + /*353*/ "Essayer encore\n", + /*354*/ "Annuler\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Sauvegarde\n", + /*360*/ "Voulez-vous sauvegarder\nvotre fichier ailleurs?\n", + /*361*/ "Oui\n", + /*362*/ "Non\n", + /*363*/ "Ins駻ez le\nController Pak\ncontenant: %s dans une manette.\n", + /*364*/ "Ins駻ez le\nController Pak\nde vos sauvegardes\n dans une manette.\n", + /*365*/ "OK\n", + /*366*/ "Annuler\n", + /*367*/ "S駘ectionner emplacement\n", + /*368*/ "O\n", + /*369*/ "Espaces\n", + /*370*/ "Effacer Fichiers...\n", + /*371*/ "Annuler\n", + /*372*/ "Satur", + /*373*/ "Copier fichiers\n", + /*374*/ "S駘ectionner fichier copier:\n", + /*375*/ "Bouton B pour sortir.\n", + /*376*/ "Effacer Fichier\n", + /*377*/ "S駘ectionner fichier effacer:\n", + /*378*/ "Bouton B pour sortir.\n", + /*379*/ "Attention\n", + /*380*/ "Etes-vous sr de\nvouloir effacer ce fichier?\n", + /*381*/ "Annuler\n", + /*382*/ "OK\n", + /*383*/ "Effacer Notes\n", + /*384*/ "Etes-vous sr\nde vouloir effacer\nces notes?\n", + /*385*/ "Non\n", + /*386*/ "Oui\n", + /*387*/ "Notes de jeu\n", + /*388*/ "Effacer notes de jeu:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Bouton B pour sortir.\n", + /*392*/ "Vide\n", + /*393*/ "--\n", + /*394*/ "Pages Libres: \n", + /*395*/ "Pages libres: %d\n", + /*396*/ "Pages utilis馥s: \n", + /*397*/ "Pages utilis馥s: %d\n", + /*398*/ "Il y a d駛 une sauvegarde Perfect Dark sur ce Controller Pak.\n", + /*399*/ "Il y a suffisement de place pour sauvegarder Perfect Dark.\n", + /*400*/ "Le Controller Pak est trop plein pour sauver: 1 note\net 28 pages requises pour sauver.\n", + /*401*/ "Entrer Nom Agent\n", + /*402*/ "Nouveau...\n", + /*403*/ "Nouvel Agent...\n", + /*404*/ "Nouvelle Recrue", + /*405*/ "Temps Mission:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Sp馗ial\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - Centre dataDyne\n", + /*439*/ "Mission 2 - Villa Carrington\n", + /*440*/ "Mission 3 - Immeuble G5\n", + /*441*/ "Mission 4 - Secteur 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Institut Carrington\n", + /*445*/ "Mission 8 - Croiseur Skedar\n", + /*446*/ "Mission 9 - Ruines Skedars\n", + /*447*/ "Finale\n", + /*448*/ "Jouer Tous\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Op駻ation Dark\n", + /*451*/ "1:1 Conclusion - Descente rapide\n", + /*452*/ "1:2 Intro - En bas\n", + /*453*/ "1:2 Conclusion - Bonjour docteur\n", + /*454*/ "1:3 Intro - Bonne nuit\n", + /*455*/ "1:3 Conclusion - Tu vas o, toi?\n", + /*456*/ "2:1 Intro - N馮ocie-moi 軋!\n", + /*457*/ "2:1 Intro 2 - A un fil\n", + /*458*/ "2:1 Conclusion - Carrington sauv饅n", + /*459*/ "3:1 Intro - Sombre all馥\n", + /*460*/ "3:1 Conclusion - G5 investi\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Sp馗ial - Conspiration\n", + /*463*/ "3:2 Conclusion - Sortie de secours\n", + /*464*/ "4:1 Intro - Sale vid駮\n", + /*465*/ "4:1 Conclusion - A n馮liger\n", + /*466*/ "4:2 Intro - Perles de sagesse\n", + /*467*/ "4:2 Conclusion - Sous la lame\n", + /*468*/ "4:3 Intro - Gaz!\n", + /*469*/ "4:3 Sp馗ial - R騅eil d'Elvis\n", + /*470*/ "4:3 Conclusion - Fuite\n", + /*471*/ "5:1 Intro - Haute altitude\n", + /*472*/ "5:1 Conclusion - D馗ollage\n", + /*473*/ "5:2 Intro - Derni鑽e chance\n", + /*474*/ "5:2 Sp馗ial - Arrimage\n", + /*475*/ "5:2 Conclusion - Plus de choix\n", + /*476*/ "5:3 Intro - Horizons rouges\n", + /*477*/ "5:3 Conclusion - Monstre blond\n", + /*478*/ "6:1 Intro - Infiltration\n", + /*479*/ "6:1 Conclusion - Profondeurs\n", + /*480*/ "6:2 Intro - Plus profond\n", + /*481*/ "6:2 Sp馗ial - Virus!\n", + /*482*/ "6:2 Conclusion - En arri鑽e!\n", + /*483*/ "7:1 Intro - Salut de victoire\n", + /*484*/ "7:1 Conclusion - Course libert饅n", + /*485*/ "8:1 Intro - Piqu!\n", + /*486*/ "8:1 Conclusion - Des ennuis\n", + /*487*/ "9:1 Intro - Air calme\n", + /*488*/ "9:1 Conclusion - J'te tiens!\n", + /*489*/ "Fin de s駲uence\n", + /*490*/ "Cin駑a\n", + /*491*/ "Occulteur %d\n", + /*492*/ "Choisir Cible\n", + /*493*/ "Score de Frags\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_g.c b/src/files/lang/pal-beta/options_str_g.c new file mode 100644 index 000000000..f025aa9ef --- /dev/null +++ b/src/files/lang/pal-beta/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Komplettiert\n", + /* 1*/ "Nicht komplettiert\n", + /* 2*/ "Fehlgeschlagen\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Die Erde:", + /* 6*/ " ...in pr臧istorischer Zeit", + /* 7*/ "Rare pr舖entiert", + /* 8*/ "Rot\n", + /* 9*/ "Gelb\n", + /* 10*/ "Blau\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Braun\n", + /* 16*/ "Joanna im Kampfanzug\n", + /* 17*/ "Joanna im Trenchcoat\n", + /* 18*/ "Joanna im Partykleid\n", + /* 19*/ "Joanna im Kleid (zerrissen)\n", + /* 20*/ "Joanna als Stewardess\n", + /* 21*/ "Joanna im Neoprenanzug\n", + /* 22*/ "Joanna - Tauchger舩\n", + /* 23*/ "Joanna im arktischen Outfit\n", + /* 24*/ "Joanna als Labortechniker\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maianer\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington im Anzug\n", + /* 29*/ "Mr. Blond\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "M舅nlicher CI-Labortechniker\n", + /* 34*/ "Weiblicher CI-Labortechniker\n", + /* 35*/ "CI-Soldat\n", + /* 36*/ "dataDyne Elitesoldat\n", + /* 37*/ "Weibliche dataDyne Wache\n", + /* 38*/ "dataDyne Security-Mann\n", + /* 39*/ "dataDyne Infanterist\n", + /* 40*/ "dataDyne Soldat\n", + /* 41*/ "Sekret舐in\n", + /* 42*/ "Brokleidung\n", + /* 43*/ "lockere Brokleidung\n", + /* 44*/ "Unterh舅dlerin\n", + /* 45*/ "dataDyne Scharfschtze\n", + /* 46*/ "G5-Wache\n", + /* 47*/ "G5-SWAT-Wache\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Wache\n", + /* 51*/ "Area 51 Soldat\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "M舅nlicher Labortechniker\n", + /* 56*/ "Weiblicher Labortechniker\n", + /* 57*/ "dataDyne Labortechniker\n", + /* 58*/ "Biotechniker\n", + /* 59*/ "Alaska-Wache\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Chef-Stewardess\n", + /* 64*/ "Der Pr舖ident\n", + /* 65*/ "NSA Lakai\n", + /* 66*/ "Pr舖identenwache\n", + /* 67*/ "Pr舖ident\"en Klon\n", + /* 68*/ "Pelagic II Wache\n", + /* 69*/ "Maianischer Soldat\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- Kein Controller in Controller-Port 1 -", + /* 72*/ "Schalten Sie aus und schlie゚en Sie einen Controller an.", + /* 73*/ "GEFUNDEN", + /* 74*/ "NICHT GEFUNDEN", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.2 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "W臧le deine Wahrheit\n", + /* 97*/ "Neu...\n", + /* 98*/ "Neuer Agent...\n", + /* 99*/ "Speicherst舅de\n", + /*100*/ "Kopieren:\n", + /*101*/ "Lschen:\n", + /*102*/ "Spielstand wird gelscht...\n", + /*103*/ "Solo-Missionen Speicherst舅de\n", + /*104*/ "Kampfsimulator-Einstellung Speicherst舅de\n", + /*105*/ "Kampfsimulator-Spielerdaten\n", + /*106*/ "PerfectHead-Speicherst舅de\n", + /*107*/ "Controller Pak Men\n", + /*108*/ "Dieses Men dient dazu, Speicherst舅de von den\n Controller Paks zu lschen.\n", + /*109*/ "W臧len sie das Controller Pak:\n", + /*110*/ "Exit\n", + /*111*/ "Spielmodul\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Men\n", + /*117*/ "Solo-Missionen\n", + /*118*/ "Multiplayer\n", + /*119*/ "Teamwork\n", + /*120*/ "Counter Operative-Modus\n", + /*121*/ "Filmsequenzen\n", + /*122*/ "Missionsauswahl\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Spezialmissionen\n", + /*133*/ "dataDyne", + /*134*/ "- Abtrnnig", + /*135*/ "dataDyne", + /*136*/ "- Ermittlung", + /*137*/ "dataDyne", + /*138*/ "- Ausbruch", + /*139*/ "Carrington Villa", + /*140*/ "- Geisel Nr. 1", + /*141*/ "Chicago", + /*142*/ "- Unter Tarnung", + /*143*/ "G5-Building", + /*144*/ "- Aufkl舐ung", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rettung", + /*149*/ "Area 51", + /*150*/ "- Flucht", + /*151*/ "Sttzpunkt", + /*152*/ "- Spionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismus", + /*155*/ "Absturzstelle", + /*156*/ "- Konfrontation", + /*157*/ "Pelagic II", + /*158*/ "- Erforschung", + /*159*/ "Tiefsee", + /*160*/ "- Abwendung", + /*161*/ "Carrington Institut", + /*162*/ "- Verteidigung", + /*163*/ "Das Schiff", + /*164*/ "- Verdeckter Angriff", + /*165*/ "Skedar-Ruinen", + /*166*/ "- Der Schrein", + /*167*/ "Mr. Blonds Rache", + /*168*/ "Maianisches SOS", + /*169*/ "Die ワbernahme", + /*170*/ "KRIEG!", + /*171*/ "Das Duell", + /*172*/ "Status\n", + /*173*/ "Abbruch!\n", + /*174*/ "ACHTUNG!\n", + /*175*/ "Mchten Sie die Mission wirklich abbrechen?\n", + /*176*/ "NEIN\n", + /*177*/ "JA\n", + /*178*/ "Inventar\n", + /*179*/ "Verfgbare Waffen\n", + /*180*/ "Optionen\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Steuerung\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Spiel speichern\n", + /*187*/ "Agent wechseln...\n", + /*188*/ "ACHTUNG!\n", + /*189*/ "Mchten Sie wirklich andere Agenten-Daten laden?\n", + /*190*/ "Ja\n", + /*191*/ "Nein\n", + /*192*/ "Steuerungsoptionen\n", + /*193*/ "Steuerung Spieler 2\n", + /*194*/ "Art der Steuerung\n", + /*195*/ "Blick nach oben/unten vertauschen\n", + /*196*/ "Geradeausschauen\n", + /*197*/ "Kopfbewegung\n", + /*198*/ "Automatisches anvisieren\n", + /*199*/ "Fadenkreuz-Ausrichtung\n", + /*200*/ "Zurck\n", + /*201*/ "Halten\n", + /*202*/ "Umschalten\n", + /*203*/ "Display-Optionen\n", + /*204*/ "Spieler 2 anzeigen\n", + /*205*/ "Sicht on-screen\n", + /*206*/ "Ziel immer anzeigen\n", + /*207*/ "Zoom-Bereich anzeigen\n", + /*208*/ "Munition on-screen\n", + /*209*/ "Waffenfunktion anzeigen\n", + /*210*/ "Farbklecks\n", + /*211*/ "Untertitel\n", + /*212*/ "Missionszeit anzeigen\n", + /*213*/ "Zurck\n", + /*214*/ "Video-Optionen\n", + /*215*/ "Screen-Gr゚e\n", + /*216*/ "Verh舁tnis\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Spieler Splitscreen\n", + /*219*/ "Zurck\n", + /*220*/ "Vollbild\n", + /*221*/ "Breitbild\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertikal\n", + /*227*/ "Audio-Optionen\n", + /*228*/ "Soundeffekte\n", + /*229*/ "Musik\n", + /*230*/ "Sound\n", + /*231*/ "Zurck\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Kopfhrer", + /*235*/ "Surround", + /*236*/ "Steuerung\n", + /*237*/ "Einfach\n", + /*238*/ "Doppelt\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "W臧le den Schwierigkeitsgrad\n", + /*249*/ "Schwierigkeitsgrad\n", + /*250*/ "Beste Zeit\n", + /*251*/ "Agent\n", + /*252*/ "Spezialagent\n", + /*253*/ "Perfekter Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Teamwork-Optionen\n", + /*256*/ "Radar Ein\n", + /*257*/ "Teamspieler verletzbar\n", + /*258*/ "Perfekter Kumpel\n", + /*259*/ "Weiter\n", + /*260*/ "Abbrechen\n", + /*261*/ "Menschlich", + /*262*/ "1 Simulant", + /*263*/ "2 Simulanten", + /*264*/ "3 Simulanten", + /*265*/ "4 Simulanten", + /*266*/ "Counter Operative-Optionen\n", + /*267*/ "Radar Ein\n", + /*268*/ "Counter Operative\n", + /*269*/ "Weiter\n", + /*270*/ "Abbrechen\n", + /*271*/ "Spieler 1", + /*272*/ "Spieler 2", + /*273*/ "ワberblick\n", + /*274*/ "Annehmen\n", + /*275*/ "Ablehnen\n", + /*276*/ "Komplettiert\n", + /*277*/ "Fehlgeschlagen\n", + /*278*/ "Missions-Status:\n", + /*279*/ "Status der Agentin:\n", + /*280*/ "Missions-Zeit:\n", + /*281*/ "Bevorzugte Waffe:\n", + /*282*/ "Eliminierungen:\n", + /*283*/ "Genauigkeit:\n", + /*284*/ "Abgefeuerte Schsse:\n", + /*285*/ " Kopftreffer:\n", + /*286*/ " Rumpftreffer:\n", + /*287*/ " Gliedma゚en:\n", + /*288*/ " Andere:\n", + /*289*/ "Drcke START\n", + /*290*/ "Gefallen\n", + /*291*/ "ワberlebt\n", + /*292*/ "Mission abgebrochen\n", + /*293*/ "Fehlgeschlagen\n", + /*294*/ "Komplettiert\n", + /*295*/ "Mission abgebrochen\n", + /*296*/ "Neuer Versuch", + /*297*/ "N臘hste Mission", + /*298*/ "Akzeptieren\n", + /*299*/ "Ablehnen\n", + /*300*/ "Ziele\n", + /*301*/ "Drcke START\n", + /*302*/ "Kleines aber feines Men\n", + /*303*/ "Kampfsimulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Agent wechseln\n", + /*307*/ "Audio/Video\n", + /*308*/ "Sound\n", + /*309*/ "Musik\n", + /*310*/ "Sound\n", + /*311*/ "Verh舁tnis\n", + /*312*/ "Zurck\n", + /*313*/ "< Leer >\n", + /*314*/ "ENTF", + /*315*/ "SHIFT", + /*316*/ "ABBR", + /*317*/ "OK", + /*318*/ "Kampfsimulator-Kpfe\n", + /*319*/ "Kpfe in den Missionen\n", + /*320*/ "Fehler\n", + /*321*/ "Abbruch\n", + /*322*/ "Es wurde kein Controller Pak\nin den Controllern gefunden.\n", + /*323*/ "Spielstand wurde nicht gespeichert.\n", + /*324*/ "Spielstand wurde nicht geladen.\n", + /*325*/ "Spielstand konnte nicht gelscht werden.\n", + /*326*/ "Zu wenig Speicherplatz.\n", + /*327*/ "Diese Daten sind bereits\ngeladen worden.\n", + /*328*/ "wurde entfernt.\n", + /*329*/ "Controller Pak ist besch臈igt oder nicht richtig eingelegt.\n", + /*330*/ "Lschvorgang konnte nicht durchgefhrt werden.\n", + /*331*/ "Fehler w臧rend des Ladens.\n", + /*332*/ "Fehler w臧rend des Speicherns.\n", + /*333*/ "Fehler w臧rend des Ladens der Spielerdaten.\n", + /*334*/ "Fehler w臧rend des Speicherns der Spielerdaten.\n", + /*335*/ "Fehler w臧rend des Ladens von PerfectHead.\n", + /*336*/ "Fehler w臧rend des Speicherns von PerfectHead.\n", + /*337*/ "Fehler w臧rend des Lesevorgangs.\n", + /*338*/ "Fehler w臧rend des Schreibvorgangs.\n", + /*339*/ "Fehler\n", + /*340*/ "Lschvorgang nicht erfolgreich.\n", + /*341*/ "Spielstand konnte nicht gelscht werden.\n", + /*342*/ "- ワberprfen Sie, ob das Controller Pak is\nkorrekt eingelegt ist.\n", + /*343*/ "Abbrechen\n", + /*344*/ "Es ist nicht genug Platz vorhanden.\n", + /*345*/ "Cool!\n", + /*346*/ "Spielstand wurde gespeichert.\n", + /*347*/ "OK\n", + /*348*/ "W臧rend des Speicherns ereignete\nsich ein Fehler.\n", + /*349*/ "Versuche es nochmals.\n", + /*350*/ "Anderen Speicherplatz w臧len\n", + /*351*/ "Abbrechen\n", + /*352*/ "W臧rend des Ladens ereignete\nsich ein Fehler.\n", + /*353*/ "Wiederholen\n", + /*354*/ "Abbrechen\n", + /*355*/ "Es wird Platz fr den Kopf bentigt.\n", + /*356*/ "W臧len Sie einen Kopf, der berschrieben werden soll:\n", + /*357*/ "OK\n", + /*358*/ "Abbrechen\n", + /*359*/ "Speichern\n", + /*360*/ "Mchten Sie die Daten\nwoanders speichern?\n", + /*361*/ "Ja\n", + /*362*/ "Nein\n", + /*363*/ "Bitte legen Sie das\nController Pak\nmit dem %s ein.\n", + /*364*/ "Bitte legen Sie das\nController Pak ein,\nauf dem Sie speichern mchten.\n", + /*365*/ "OK\n", + /*366*/ "Abbrechen\n", + /*367*/ "W臧le den Speicherplatz\n", + /*368*/ "Wo!\n", + /*369*/ "Pl舩ze\n", + /*370*/ "Speicherst舅de lschen...\n", + /*371*/ "Abbrechen\n", + /*372*/ "Voll", + /*373*/ "Spielstand kopieren\n", + /*374*/ "W臧len Sie den zu kopierenden Spielstand:\n", + /*375*/ "Drcken Sie den B-Knopf, um abzubrechen.\n", + /*376*/ "Spielstand lschen\n", + /*377*/ "W臧len Sie den zu lschenden Spielstand:\n", + /*378*/ "Drcken Sie den B-Knopf, um abzubrechen.\n", + /*379*/ "ACHTUNG!\n", + /*380*/ "Mchten Sie diesen Spielstand\nwirklich lschen?\n", + /*381*/ "Abbrechen\n", + /*382*/ "OK\n", + /*383*/ "Spielerdaten lschen\n", + /*384*/ "Mchten Sie diese Spielerdaten\nwirklich lschen?\n", + /*385*/ "Nein\n", + /*386*/ "Ja\n", + /*387*/ "Spielerdaten\n", + /*388*/ "Spielerdaten lschen:\n", + /*389*/ "Daten\n", + /*390*/ "Seiten\n", + /*391*/ "Drcken Sie den B-Knopf, um abzubrechen.\n", + /*392*/ "Frei\n", + /*393*/ "--\n", + /*394*/ "Freie Pl舩ze: \n", + /*395*/ "Freie Pl舩ze: %d\n", + /*396*/ "Belegte Pl舩ze: \n", + /*397*/ "Belegte Pl舩ze: %d\n", + /*398*/ "Es existiert bereits ein Speicherstand.\n", + /*399*/ "Es steht ausreichend freier\nSpeicher zur Verfgung.\n", + /*400*/ "Das Controller Pak ist zu voll, um\ndas Spiel zu speichern. Es werden 28 freie Pl舩ze bentigt.\n", + /*401*/ "Geben Sie den Namen des Agenten ein!\n", + /*402*/ "Neu...\n", + /*403*/ "Neuer Agent...\n", + /*404*/ "Neuer Rekrut", + /*405*/ "Missionszeit:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Zentrale\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5-Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institut\n", + /*445*/ "Mission 8 - Skedar Schiff\n", + /*446*/ "Mission 9 - Skedar Ruinen\n", + /*447*/ "Finale\n", + /*448*/ "Zeig mir alles!\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Die Dunkelheit\n", + /*451*/ "1:1 Outro - Ein rascher Abstieg\n", + /*452*/ "1:2 Intro - Abw舐ts!\n", + /*453*/ "1:2 Outro - Das Treffen\n", + /*454*/ "1:3 Intro - Licht aus\n", + /*455*/ "1:3 Outro - Wohin gehtエs?\n", + /*456*/ "2:1 Intro - Verhandle DARワBER!\n", + /*457*/ "2:1 Intro 2 - Am seidenen Faden\n", + /*458*/ "2:1 Outro - Carringtons Rettung\n", + /*459*/ "3:1 Intro - Dunkle Gassen\n", + /*460*/ "3:1 Outro - Das Eindringen\n", + /*461*/ "3:2 Intro - Die Perfektion\n", + /*462*/ "3:2 Special - Die Verschwrung\n", + /*463*/ "3:2 Outro - ワber die Feuerleiter\n", + /*464*/ "4:1 Intro - Video-Gemeinheiten\n", + /*465*/ "4:1 Outro - Lose Enden\n", + /*466*/ "4:2 Intro - Perlen der Weisheit\n", + /*467*/ "4:2 Outro - Unterm Messer\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Das Erwachen\n", + /*470*/ "4:3 Outro - Die Flucht\n", + /*471*/ "5:1 Intro - ワber den Wolken\n", + /*472*/ "5:1 Outro - Der Abflug\n", + /*473*/ "5:2 Intro - Die letzte Chance\n", + /*474*/ "5:2 Special - Das Andockmanver\n", + /*475*/ "5:2 Outro - Keine Wahl\n", + /*476*/ "5:3 Intro - Roter Horizont\n", + /*477*/ "5:3 Outro - Der blonde Freak\n", + /*478*/ "6:1 Intro - Wer schleicht da?\n", + /*479*/ "6:1 Outro - In der Tiefe\n", + /*480*/ "6:2 Intro - Noch tiefer\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Der Weg nach oben\n", + /*483*/ "7:1 Intro - Salut\n", + /*484*/ "7:1 Outro - In die Freiheit\n", + /*485*/ "8:1 Intro - Entfhrt\n", + /*486*/ "8:1 Outro - トrger voraus\n", + /*487*/ "9:1 Intro - Ruhe vor dem Sturm\n", + /*488*/ "9:1 Outro - Hab dich!\n", + /*489*/ "Endsequenz\n", + /*490*/ "Cinema\n", + /*491*/ "Tarnung %d\n", + /*492*/ "Zielauswahl\n", + /*493*/ "Treffer\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_i.c b/src/files/lang/pal-beta/options_str_i.c new file mode 100644 index 000000000..98e17edd9 --- /dev/null +++ b/src/files/lang/pal-beta/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Compiuto\n", + /* 1*/ "Incompleto\n", + /* 2*/ "Fallito\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terra:", + /* 6*/ " nella preistoria", + /* 7*/ "Rare presenta", + /* 8*/ "Rosso\n", + /* 9*/ "Giallo\n", + /* 10*/ "Blu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azzurro\n", + /* 13*/ "Arancio\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrone\n", + /* 16*/ "Joanna in tuta da lotta\n", + /* 17*/ "Joanna in impermeabile\n", + /* 18*/ "Joanna in abito da sera\n", + /* 19*/ "Joanna in abito strappato\n", + /* 20*/ "Joanna come hostess\n", + /* 21*/ "Joanna in muta da sub\n", + /* 22*/ "Joanna con bombole da sub\n", + /* 23*/ "Joanna in tenuta polare\n", + /* 24*/ "Joanna in camice\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington in smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Tecnico di lab. CI (uomo)\n", + /* 34*/ "Tecnico di lab. CI (donna)\n", + /* 35*/ "Soldato CI\n", + /* 36*/ "Soldato d'assalto dD\n", + /* 37*/ "Guardia (donna) dD\n", + /* 38*/ "Sicurezza dataDyne\n", + /* 39*/ "Fanteria dataDyne\n", + /* 40*/ "Soldato dataDyne\n", + /* 41*/ "Segretaria\n", + /* 42*/ "Vestito da ufficio\n", + /* 43*/ "Vestito casual\n", + /* 44*/ "Negoziatore\n", + /* 45*/ "Cecchino dataDyne\n", + /* 46*/ "Guardia G5\n", + /* 47*/ "Guardia SWAT G5\n", + /* 48*/ "Agente CIA\n", + /* 49*/ "Agente FBI\n", + /* 50*/ "Guardia Area 51\n", + /* 51*/ "Soldato Area 51\n", + /* 52*/ "Pilota\n", + /* 53*/ "Tute\n", + /* 54*/ "Guardia del corpo NSA\n", + /* 55*/ "Tecnico di lab. (uomo)\n", + /* 56*/ "Tecnico di lab. (donna)\n", + /* 57*/ "Tecnico di lab. dD\n", + /* 58*/ "Tecnico biologico\n", + /* 59*/ "Guardia dell'Alaska\n", + /* 60*/ "Pilota Air Force One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hostess\n", + /* 63*/ "Hostess capo\n", + /* 64*/ "Presidente\n", + /* 65*/ "Lacch NSA\n", + /* 66*/ "Sicurezza presidenziale\n", + /* 67*/ "Clone del Presidente\n", + /* 68*/ "Guardia Pelagic II\n", + /* 69*/ "Soldato Maian\n", + /* 70*/ "Giacca elegante\n", + /* 71*/ "nessun Controller nella presa 1", + /* 72*/ "spegni la console e collega un Controller", + /* 73*/ "TROVATO", + /* 74*/ "NON TROVATO", + /* 75*/ "tm", + /* 76*/ "EXPANSION PAK N64", + /* 77*/ "Identificazione prodotto Nintendo 64\n", + /* 78*/ "ID prodotto:\n", + /* 79*/ "Codice prodotto:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Ideatore:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Versione PAL 8.7 finale\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "I logo Rareware e Perfect Dark sono trademark di Rare Ltd.\n", + /* 88*/ "Presentato in Dolby Surround. Dolby e il simbolo\ndoppia D sono trademark di Dolby Laboratories.", + /* 89*/ "Usa Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback fornito con Miles Sound System da\nRAD Game Tools, Inc. tecnologia di compressione audio MPEG Layer-3\nsu licenza di Fraunhofer IIS e THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "Design Rare nel futuro <<<\n", + /* 94*/ "Edito da Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Scegli la tua realt濬n", + /* 97*/ "Nuovo...\n", + /* 98*/ "Nuovo agente...\n", + /* 99*/ "File di gioco\n", + /*100*/ "Copia:\n", + /*101*/ "Cancella:\n", + /*102*/ "Cancella dati gioco...\n", + /*103*/ "File missioni individuali\n", + /*104*/ "File impostaz. simulatore lotta\n", + /*105*/ "File giocatore simulatore lotta\n", + /*106*/ "File testaPerfect\n", + /*107*/ "Menu Controller Pak\n", + /*108*/ "Usalo per cancellare i dati di gioco\ndai Controller Pak.\n", + /*109*/ "Scegli Controller Pak:\n", + /*110*/ "Esci\n", + /*111*/ "Cassetta gioco\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missioni individuali\n", + /*118*/ "Simulatore lotta\n", + /*119*/ "Collaborazione\n", + /*120*/ "Tutti contro tutti!\n", + /*121*/ "Cinema\n", + /*122*/ "Seleziona Missione\n", + /*123*/ "Missione 1\n", + /*124*/ "Missione 2\n", + /*125*/ "Missione 3\n", + /*126*/ "Missione 4\n", + /*127*/ "Missione 5\n", + /*128*/ "Missione 6\n", + /*129*/ "Missione 7\n", + /*130*/ "Missione 8\n", + /*131*/ "Missione 9\n", + /*132*/ "Missioni speciali\n", + /*133*/ "QG dataDyne", + /*134*/ "- Ribellione", + /*135*/ "Ricerca dataDyne", + /*136*/ "- L'indagine", + /*137*/ "QG dataDyne", + /*138*/ "- Salvataggio", + /*139*/ "Villa Carrington", + /*140*/ "- L'ostaggio nー1", + /*141*/ "Chicago", + /*142*/ "- In incognito", + /*143*/ "Edificio G5", + /*144*/ "- Ricognizione", + /*145*/ "Area 51", + /*146*/ "- L'infiltrazione", + /*147*/ "Area 51", + /*148*/ "- Salvataggio", + /*149*/ "Area 51", + /*150*/ "- La fuga", + /*151*/ "Base aerea", + /*152*/ "- Lo spionaggio", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Luogo del disastro", + /*156*/ "- Lo scontro", + /*157*/ "Pelagic II", + /*158*/ "- L'esplorazione", + /*159*/ "Negli abissi", + /*160*/ "- La minaccia", + /*161*/ "Carrington Institute", + /*162*/ "- La difesa", + /*163*/ "Astronave d'assalto", + /*164*/ "- Attacco coperto", + /*165*/ "Rovine Skedar", + /*166*/ "- Tempio di guerra", + /*167*/ "La vendetta di Mr. Blonde", + /*168*/ "L'SOS Maian", + /*169*/ "Il riscatto dell'istituto", + /*170*/ "GUERRA!", + /*171*/ "Il duello", + /*172*/ "Situazione\n", + /*173*/ "Interruzione!\n", + /*174*/ "Attenzione!\n", + /*175*/ "Vuoi interrompere la missione?\n", + /*176*/ "Annulla\n", + /*177*/ "Interrompi\n", + /*178*/ "Inventario\n", + /*179*/ "Armi disponibili\n", + /*180*/ "Opzioni\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Comandi\n", + /*184*/ "Visualizza\n", + /*185*/ "Trucchi\n", + /*186*/ "Salva gioco\n", + /*187*/ "Cambia agente...\n", + /*188*/ "Attenzione!\n", + /*189*/ "Vuoi caricare un altro agente?\n", + /*190*/ "S\n", + /*191*/ "No\n", + /*192*/ "Opzioni comandi\n", + /*193*/ "Comandi giocatore 2\n", + /*194*/ "Modalit comandi\n", + /*195*/ "Invers. punto di vista\n", + /*196*/ "Vista in avanti\n", + /*197*/ "Rotazione testa\n", + /*198*/ "Mira automatica\n", + /*199*/ "Comando mirino\n", + /*200*/ "Esci\n", + /*201*/ "Tieni premuto\n", + /*202*/ "Attiva/Disattiva\n", + /*203*/ "Visualizza opzioni\n", + /*204*/ "Comandi giocatore 2\n", + /*205*/ "Vista su schermo\n", + /*206*/ "Obiettivo sempre\n", + /*207*/ "Area zoom\n", + /*208*/ "Munizioni\n", + /*209*/ "Funzioni arma\n", + /*210*/ "Macchia colorata\n", + /*211*/ "Didascalia\n", + /*212*/ "Tempo missione\n", + /*213*/ "Esci\n", + /*214*/ "Opzioni video\n", + /*215*/ "Dimensioni schermo\n", + /*216*/ "Rapporto\n", + /*217*/ "Alta risoluzione\n", + /*218*/ "Diviso per 2 giocatori\n", + /*219*/ "Esci\n", + /*220*/ "Intero\n", + /*221*/ "Allargato\n", + /*222*/ "Cinema\n", + /*223*/ "Normale\n", + /*224*/ "16:9\n", + /*225*/ "Orizzontale\n", + /*226*/ "Verticale\n", + /*227*/ "Opzioni audio\n", + /*228*/ "Suono\n", + /*229*/ "Musica\n", + /*230*/ "Modalit suono\n", + /*231*/ "Esci\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Cuffie", + /*235*/ "Surround", + /*236*/ "Comandi\n", + /*237*/ "Singolo\n", + /*238*/ "Doppio\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Istruzioni\n", + /*248*/ "Seleziona difficolt濬n", + /*249*/ "Difficolt濬n", + /*250*/ "Tempo migliore\n", + /*251*/ "Agente\n", + /*252*/ "Agente speciale\n", + /*253*/ "Agente Perfect\n", + /*254*/ "Annulla\n", + /*255*/ "Opzioni collaborazione\n", + /*256*/ "Radar acceso\n", + /*257*/ "Fuoco solo sui nemici\n", + /*258*/ "AmicoPerfect\n", + /*259*/ "Continua\n", + /*260*/ "Annulla\n", + /*261*/ "Umano", + /*262*/ "Un replicante", + /*263*/ "2 replicanti", + /*264*/ "3 replicanti", + /*265*/ "4 replicanti", + /*266*/ "Tutti contro tutti!\n", + /*267*/ "Radar acceso\n", + /*268*/ "Tutti contro tutti!\n", + /*269*/ "Continua\n", + /*270*/ "Annulla\n", + /*271*/ "Giocatore 1", + /*272*/ "Giocatore 2", + /*273*/ "Panoramica\n", + /*274*/ "Accetta\n", + /*275*/ "Decline\n", + /*276*/ "Compiuto\n", + /*277*/ "Fallito\n", + /*278*/ "Risultati missione:\n", + /*279*/ "Stato agente:\n", + /*280*/ "Tempo missione:\n", + /*281*/ "Arma pi usata:\n", + /*282*/ "Vittime:\n", + /*283*/ "Accuratezza:\n", + /*284*/ "Colpi totali:\n", + /*285*/ " Colpi al capo:\n", + /*286*/ " Colpi al corpo:\n", + /*287*/ " Colpi agli arti:\n", + /*288*/ " Altro:\n", + /*289*/ "Premi START\n", + /*290*/ "Deceduto\n", + /*291*/ "Attivo\n", + /*292*/ "Fuggito\n", + /*293*/ "Fallito\n", + /*294*/ "Compiuto\n", + /*295*/ "Interrotto\n", + /*296*/ "Riprova", + /*297*/ "Missione seguente", + /*298*/ "Accetta\n", + /*299*/ "Rifiuta\n", + /*300*/ "Obiettivi\n", + /*301*/ "Premi START\n", + /*302*/ "Menu breve e conciso\n", + /*303*/ "Simulatore\n", + /*304*/ "Addestramento\n", + /*305*/ "Audio/Video\n", + /*306*/ "Cambia agente\n", + /*307*/ "Audio/Video\n", + /*308*/ "Suono\n", + /*309*/ "Musica\n", + /*310*/ "Modalit suono\n", + /*311*/ "Rapporto\n", + /*312*/ "Esci\n", + /*313*/ "< Vuoto >\n", + /*314*/ "CANC", + /*315*/ "MAIU", + /*316*/ "ANNULLA", + /*317*/ "OK", + /*318*/ "Testi simulatore\n", + /*319*/ "Teste missione\n", + /*320*/ "Errore\n", + /*321*/ "Annulla\n", + /*322*/ "Controller Pak assente\nda tutti i Controller.\n", + /*323*/ "File non salvato.\n", + /*324*/ "File non caricato.\n", + /*325*/ "Impossibile cancellare file.\n", + /*326*/ "Memoria esaurita.\n", + /*327*/ "Giocatore gi caricato\nnel gioco.\n", + /*328*/ "rimosso.\n", + /*329*/ "Controller Pak danneggiato o in posizione errata.\n", + /*330*/ "Impossibile cancellare dati gioco.\n", + /*331*/ "Errore di caricamento gioco\n", + /*332*/ "Errore di salvataggio gioco\n", + /*333*/ "Errore di caricamento giocatore\n", + /*334*/ "Errore di salvataggio giocatore\n", + /*335*/ "Errore di caricamento testaPerfect\n", + /*336*/ "Errore di salvataggio testaPerfect\n", + /*337*/ "Errore di lettura file\n", + /*338*/ "Errore di scrittura file\n", + /*339*/ "Errore\n", + /*340*/ "Non cancellato\n", + /*341*/ "Impossibile cancellare.\n", + /*342*/ "- Controlla che il Controller Pak \nsia inserito correttamente.\n", + /*343*/ "Annulla\n", + /*344*/ "Spazio esaurito.\n", + /*345*/ "Perfetto!\n", + /*346*/ "File salvato.\n", + /*347*/ "OK\n", + /*348*/ "Errore durante il \nsalvataggio!\n", + /*349*/ "Riprova\n", + /*350*/ "Salva altrove\n", + /*351*/ "Annulla\n", + /*352*/ "Errore durante il \ncaricamento!\n", + /*353*/ "Riprova\n", + /*354*/ "Annulla\n", + /*355*/ "Serve spazio per la testa\n", + /*356*/ "Scegli una testa da caricare:\n", + /*357*/ "OK\n", + /*358*/ "Annulla\n", + /*359*/ "Salva\n", + /*360*/ "Vuoi salvare il file\naltrove?\n", + /*361*/ "S\n", + /*362*/ "No\n", + /*363*/ "Inserisci il Controller Pak con il tuo %s in un Controller.\n", + /*364*/ "Inserisci il\nController Pak\ndove vuoi salvare in un Controller.\n", + /*365*/ "OK\n", + /*366*/ "Annulla\n", + /*367*/ "Scegli dove!\n", + /*368*/ "Dove?\n", + /*369*/ "Spazi\n", + /*370*/ "Cancella file...\n", + /*371*/ "Annulla\n", + /*372*/ "Pieno", + /*373*/ "Copia file\n", + /*374*/ "Scegli un file da copiare:\n", + /*375*/ "Premi B per uscire.\n", + /*376*/ "Cancella file\n", + /*377*/ "Scegli file da cancellare:\n", + /*378*/ "Premi B per uscire.\n", + /*379*/ "Attenzione!\n", + /*380*/ "Sicuro di voler\ncancellare il file?\n", + /*381*/ "Annulla\n", + /*382*/ "OK\n", + /*383*/ "Cancella dati gioco\n", + /*384*/ "Sicuro di voler\ncancellare\nquesti dati?\n", + /*385*/ "No\n", + /*386*/ "S\n", + /*387*/ "Dati gioco\n", + /*388*/ "Cancella dati:\n", + /*389*/ "Dati\n", + /*390*/ "Spazi\n", + /*391*/ "Premi B per uscire.\n", + /*392*/ "Vuoto\n", + /*393*/ "--\n", + /*394*/ "Spazi vuoti: \n", + /*395*/ "Spazi vuoti: %d\n", + /*396*/ "Spazi pieni: \n", + /*397*/ "Spazi pieni: %d\n", + /*398*/ "Questo Controller Pak contiene gi un gioco in memoria.\n", + /*399*/ "Spazio sufficiente per\ni dati di Perfect Dark.\n", + /*400*/ "Controller Pak pieno: impossibile salvare dati.\nServono 28 spazi per salvare sul Controller Pak.\n", + /*401*/ "Digita nome agente\n", + /*402*/ "Nuovo...\n", + /*403*/ "Nuovo agente...\n", + /*404*/ "Nuova recluta", + /*405*/ "Tempo missione:", + /*406*/ "Sfida 1", + /*407*/ "Sfida 2", + /*408*/ "Sfida 3", + /*409*/ "Sfida 4", + /*410*/ "Sfida 5", + /*411*/ "Sfida 6", + /*412*/ "Sfida 7", + /*413*/ "Sfida 8", + /*414*/ "Sfida 9", + /*415*/ "Sfida 10", + /*416*/ "Sfida 11", + /*417*/ "Sfida 12", + /*418*/ "Sfida 13", + /*419*/ "Sfida 14", + /*420*/ "Sfida 15", + /*421*/ "Sfida 16", + /*422*/ "Sfida 17", + /*423*/ "Sfida 18", + /*424*/ "Sfida 19", + /*425*/ "Sfida 20", + /*426*/ "Sfida 21", + /*427*/ "Sfida 22", + /*428*/ "Sfida 23", + /*429*/ "Sfida 24", + /*430*/ "Sfida 25", + /*431*/ "Sfida 26", + /*432*/ "Sfida 27", + /*433*/ "Sfida 28", + /*434*/ "Sfida 29", + /*435*/ "Sfida 30", + /*436*/ "Speciale\n", + /*437*/ "Prologo\n", + /*438*/ "Missione 1 - QG dataDyne\n", + /*439*/ "Missione 2 - Villa Carrington\n", + /*440*/ "Missione 3 - Edificio G5\n", + /*441*/ "Missione 4 - Area 51\n", + /*442*/ "Missione 5 - Air Force One\n", + /*443*/ "Missione 6 - Pelagic II\n", + /*444*/ "Missione 7 - Carrington Institute\n", + /*445*/ "Missione 8 - Astronave d'assalto Skedar\n", + /*446*/ "Missione 9 - Rovine Skedar\n", + /*447*/ "Finale\n", + /*448*/ "Mostra tutto!\n", + /*449*/ "Prologo\n", + /*450*/ "1:1 Prologo - Al buio\n", + /*451*/ "1:1 Epilogo - Discesa rapida\n", + /*452*/ "1:2 Prologo - Avanti!\n", + /*453*/ "1:2 Epilogo - L'incontro\n", + /*454*/ "1:3 Prologo - A luci spente\n", + /*455*/ "1:3 Epilogo - Dove si va?\n", + /*456*/ "2:1 Prologo - Il negoziato\n", + /*457*/ "2:1 Prologo 2 - Sul filo del rasoio\n", + /*458*/ "2:1 Epilogo - Il salvataggio\n", + /*459*/ "3:1 Prologo - Vicoli bui\n", + /*460*/ "3:1 Epilogo - Irruzione G5\n", + /*461*/ "3:2 Prologo - La perfezione\n", + /*462*/ "3:2 Speciale - La cospirazione\n", + /*463*/ "3:2 Epilogo - Uscita antincendio\n", + /*464*/ "4:1 Prologo - Cattiverie video\n", + /*465*/ "4:1 Epilogo - Questioni aperte\n", + /*466*/ "4:2 Prologo - Perle di saggezza\n", + /*467*/ "4:2 Epilogo - A filo di spada\n", + /*468*/ "4:3 Prologo - Gas!\n", + /*469*/ "4:3 Speciale - Il risveglio\n", + /*470*/ "4:3 Epilogo - La fuga\n", + /*471*/ "5:1 Prologo - Lass in cielo\n", + /*472*/ "5:1 Epilogo - Il decollo\n", + /*473*/ "5:2 Prologo - L'ultima possibilit濬n", + /*474*/ "5:2 Speciale - L'attracco\n", + /*475*/ "5:2 Epilogo - Vicolo cieco\n", + /*476*/ "5:3 Prologo - Orizzonte rosso\n", + /*477*/ "5:3 Epilogo - Il fanatico biondo\n", + /*478*/ "6:1 Prologo - Chi va l?\n", + /*479*/ "6:1 Epilogo - Negli abissi\n", + /*480*/ "6:2 Prologo - Ancora pi gi\n", + /*481*/ "6:2 Speciale - Virus!\n", + /*482*/ "6:2 Epilogo - La risalita\n", + /*483*/ "7:1 Prologo - L'ambasciata\n", + /*484*/ "7:1 Epilogo - Fuga per la libert濬n", + /*485*/ "8:1 Prologo - Rapito\n", + /*486*/ "8:1 Epilogo - Guai in vista\n", + /*487*/ "9:1 Prologo - Venti di guerra\n", + /*488*/ "9:1 Epilogo - Fatto!\n", + /*489*/ "Fine sequenza\n", + /*490*/ "Cinema\n", + /*491*/ "Mimesi %d\n", + /*492*/ "Scegli obiettivo\n", + /*493*/ "Uccisioni\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_s.c b/src/files/lang/pal-beta/options_str_s.c new file mode 100644 index 000000000..a495489ab --- /dev/null +++ b/src/files/lang/pal-beta/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Completado\n", + /* 1*/ "No completado\n", + /* 2*/ "Fallado\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "tierra:", + /* 6*/ " prehistoria", + /* 7*/ "rare presenta", + /* 8*/ "Rojo\n", + /* 9*/ "Amarillo\n", + /* 10*/ "Azul\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azul Claro\n", + /* 13*/ "Naranja\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrn\n", + /* 16*/ "Joanna de Combate\n", + /* 17*/ "Joanna con Gabardina\n", + /* 18*/ "Joanna de Gala\n", + /* 19*/ "Joanna de Fiesta\n", + /* 20*/ "Joanna Azafata\n", + /* 21*/ "Joanna Traje Isot駻mico\n", + /* 22*/ "Joanna con Escafandra\n", + /* 23*/ "Joanna con Traje Polar\n", + /* 24*/ "Joanna Cientfica\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington de Gala\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "T馗nico Masculino del IC\n", + /* 34*/ "T馗nico Femenino del IC\n", + /* 35*/ "Soldado del IC\n", + /* 36*/ "Tropa de Asalto dataDyne\n", + /* 37*/ "Guarda de dataDyne\n", + /* 38*/ "Seguridad de dataDyne\n", + /* 39*/ "Infantera de dataDyne\n", + /* 40*/ "Soldado de dataDyne\n", + /* 41*/ "Secretaria\n", + /* 42*/ "Traje de Oficina\n", + /* 43*/ "Ropa Normal\n", + /* 44*/ "Negociador\n", + /* 45*/ "Francotirador dataDyne\n", + /* 46*/ "Guarda del G5\n", + /* 47*/ "Guarda SWAT del G5\n", + /* 48*/ "Agente de la CIA\n", + /* 49*/ "Agente del FBI\n", + /* 50*/ "Guarda del チrea 51\n", + /* 51*/ "Soldado del チrea 51\n", + /* 52*/ "Piloto\n", + /* 53*/ "Mono de Trabajo\n", + /* 54*/ "Guardaespaldas de la ANS\n", + /* 55*/ "T馗nico Masculino Lab.\n", + /* 56*/ "T馗nico Femenino Lab.\n", + /* 57*/ "T馗nico del Lab. dataDyne\n", + /* 58*/ "Biot馗nico\n", + /* 59*/ "Guarda de Alaska\n", + /* 60*/ "Piloto del Air Force One\n", + /* 61*/ "Auxiliar\n", + /* 62*/ "Azafata\n", + /* 63*/ "Azafata Jefe\n", + /* 64*/ "El Presidente\n", + /* 65*/ "Lacayo de la ANS\n", + /* 66*/ "Seguridad Presidencial\n", + /* 67*/ "Clon del Presidente\n", + /* 68*/ "Guarda del Pelagic II\n", + /* 69*/ "Soldado Maian\n", + /* 70*/ "Esmoquin\n", + /* 71*/ "- no hay mando conectado a la ranura 1 -", + /* 72*/ "por favor, apaga la consola y conecta un mando", + /* 73*/ "DETECTADO", + /* 74*/ "NO DETECTADO", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Elige Tu Realidad\n", + /* 97*/ "Nuevo...\n", + /* 98*/ "Nuevo Agente...\n", + /* 99*/ "Ficheros de Juego\n", + /*100*/ "Copiar:\n", + /*101*/ "Borrar:\n", + /*102*/ "Borrar Notas de Juego...\n", + /*103*/ "Fichero de Agente Un Jugador\n", + /*104*/ "Fichero de Opciones del Simulador\n", + /*105*/ "Ficheros de Jugador del Simulador\n", + /*106*/ "Ficheros PerfectHead\n", + /*107*/ "Men Controller Pak\n", + /*108*/ "Usa este men para borrar notas de juego\nde tus Controller Pak.\n", + /*109*/ "Elige Controller Pak a Editar:\n", + /*110*/ "Salir\n", + /*111*/ "Cartucho\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Men Perfecto\n", + /*117*/ "Misiones Solo\n", + /*118*/ "Simulador de Combate\n", + /*119*/ "Co-Operativo\n", + /*120*/ "Contra-Operativa\n", + /*121*/ "Pelculas\n", + /*122*/ "Selecciona Misin\n", + /*123*/ "Misin 1\n", + /*124*/ "Misin 2\n", + /*125*/ "Misin 3\n", + /*126*/ "Misin 4\n", + /*127*/ "Misin 5\n", + /*128*/ "Misin 6\n", + /*129*/ "Misin 7\n", + /*130*/ "Misin 8\n", + /*131*/ "Misin 9\n", + /*132*/ "Asignaciones Especiales\n", + /*133*/ "Central dataDyne", + /*134*/ "- Comienzo", + /*135*/ "Lab. dataDyne", + /*136*/ "- Investigacin", + /*137*/ "Central dataDyne", + /*138*/ "- Extraccin", + /*139*/ "Villa Carrington", + /*140*/ "- Reh駭 Uno", + /*141*/ "Chicago", + /*142*/ "- Sigilo", + /*143*/ "Edificio G5", + /*144*/ "- Reconocimiento", + /*145*/ "チrea 51", + /*146*/ "- Infiltracin", + /*147*/ "チrea 51", + /*148*/ "- Rescate", + /*149*/ "チrea 51", + /*150*/ "- Escape", + /*151*/ "Base A駻ea", + /*152*/ "- Espionaje", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Lugar del Impacto", + /*156*/ "- Confrontacin", + /*157*/ "Pelagic II", + /*158*/ "- Exploracin", + /*159*/ "Mar Profundo", + /*160*/ "- Anular Amenaza", + /*161*/ "Instituto Carrington", + /*162*/ "- Defensa", + /*163*/ "Nave de Ataque", + /*164*/ "- Asalto", + /*165*/ "Ruinas Skedar", + /*166*/ "- Templo", + /*167*/ "Venganza de Mr. Blonde", + /*168*/ "SOS Maian", + /*169*/ "Retomando el Instituto", + /*170*/ "。GUERRA!", + /*171*/ "El Duelo", + /*172*/ "Estatus\n", + /*173*/ "。Abortar!\n", + /*174*/ "Cuidado\n", + /*175*/ "ソQuieres abortar la misin?\n", + /*176*/ "Cancelar\n", + /*177*/ "Abortar\n", + /*178*/ "Inventario\n", + /*179*/ "Armas Disponibles\n", + /*180*/ "Opciones\n", + /*181*/ "Audio\n", + /*182*/ "Vdeo\n", + /*183*/ "Controles\n", + /*184*/ "Pantalla\n", + /*185*/ "Trucos\n", + /*186*/ "Guardar Juego\n", + /*187*/ "Cambiar Agente...\n", + /*188*/ "Cuidado\n", + /*189*/ "ソQuieres cargar otro agente?\n", + /*190*/ "S\n", + /*191*/ "No\n", + /*192*/ "Opciones de Control\n", + /*193*/ "Controles Jugador 2\n", + /*194*/ "Estilo de Control\n", + /*195*/ "Control Opuesto\n", + /*196*/ "Mirar al Frente\n", + /*197*/ "Giro de Cabeza\n", + /*198*/ "Auto-Apuntar\n", + /*199*/ "Control Apuntar\n", + /*200*/ "Volver\n", + /*201*/ "Mantener\n", + /*202*/ "Cambiar\n", + /*203*/ "Opciones de Pantalla\n", + /*204*/ "Pantalla Jugador 2\n", + /*205*/ "Mirilla en Pantalla\n", + /*206*/ "Siempre Muestra Objetivo\n", + /*207*/ "Mostrar Alcance del Zoom\n", + /*208*/ "Municin en Pantalla\n", + /*209*/ "Mostrar Funcin del Arma\n", + /*210*/ "Bolas de Pintura\n", + /*211*/ "Subttulos\n", + /*212*/ "Mostrar Tiempo de Misin\n", + /*213*/ "Volver\n", + /*214*/ "Opciones de Vdeo\n", + /*215*/ "Tamao de Pantalla\n", + /*216*/ "Ratio\n", + /*217*/ "Alta Resolucin\n", + /*218*/ "Pantalla Partida 2 Jugadores\n", + /*219*/ "Volver\n", + /*220*/ "Completa\n", + /*221*/ "Panor疥ica\n", + /*222*/ "Cine\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Opciones de Audio\n", + /*228*/ "Sonido\n", + /*229*/ "Msica\n", + /*230*/ "Modo de Sonido\n", + /*231*/ "Volver\n", + /*232*/ "Mono", + /*233*/ "Est駻eo", + /*234*/ "Cascos", + /*235*/ "Surround", + /*236*/ "Controles\n", + /*237*/ "Simple\n", + /*238*/ "Doble\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Informe\n", + /*248*/ "Elegir Dificultad\n", + /*249*/ "Dificultad\n", + /*250*/ "Mejor Tiempo\n", + /*251*/ "Agente\n", + /*252*/ "Agente Especial\n", + /*253*/ "Agente Perfecto\n", + /*254*/ "Cancelar\n", + /*255*/ "Opciones Modo Cooperativo\n", + /*256*/ "Radar S\n", + /*257*/ "Fuego Amigo\n", + /*258*/ "Compaero Perfecto\n", + /*259*/ "Continuar\n", + /*260*/ "Cancelar\n", + /*261*/ "Humano", + /*262*/ "1 Simulante", + /*263*/ "2 Simulantes", + /*264*/ "3 Simulantes", + /*265*/ "4 Simulantes", + /*266*/ "Opciones Contra-Operativa\n", + /*267*/ "Radar S\n", + /*268*/ "Contra-Operativa\n", + /*269*/ "Continuar\n", + /*270*/ "Cancelar\n", + /*271*/ "Jugador 1", + /*272*/ "Jugador 2", + /*273*/ "Visin General\n", + /*274*/ "Aceptar\n", + /*275*/ "Declinar\n", + /*276*/ "Completado\n", + /*277*/ "Fallado\n", + /*278*/ "Estatus de Misin:\n", + /*279*/ "Estatus de Agente:\n", + /*280*/ "Tiempo de Misin:\n", + /*281*/ "Arma Preferida:\n", + /*282*/ "Muertos:\n", + /*283*/ "Precisin:\n", + /*284*/ "Total de Disparos:\n", + /*285*/ " Disp. Cabeza:\n", + /*286*/ " Disp. Cuerpo:\n", + /*287*/ " Disp. Miembros:\n", + /*288*/ " Otros:\n", + /*289*/ "Pulsa START\n", + /*290*/ "Difunto\n", + /*291*/ "Activo\n", + /*292*/ "Anulado\n", + /*293*/ "Fallada\n", + /*294*/ "Completada\n", + /*295*/ "Abortada\n", + /*296*/ "Reintentar", + /*297*/ "Sig. Misin", + /*298*/ "Aceptar\n", + /*299*/ "Declinar\n", + /*300*/ "Objetivos\n", + /*301*/ "Pulsa START\n", + /*302*/ "Men Pequeo pero Perfecto\n", + /*303*/ "Simulador de Combate\n", + /*304*/ "Entrenamiento\n", + /*305*/ "Audio/Vdeo\n", + /*306*/ "Cambiar Agente\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sonido\n", + /*309*/ "Msica\n", + /*310*/ "Modo de Sonido\n", + /*311*/ "Ratio\n", + /*312*/ "Volver\n", + /*313*/ "< Vaco >\n", + /*314*/ "SUPR", + /*315*/ "MAY.", + /*316*/ "SALIR", + /*317*/ "OK", + /*318*/ "Cabezas Simulador Combate\n", + /*319*/ "Cabezas de Misiones\n", + /*320*/ "Error\n", + /*321*/ "Cancelar\n", + /*322*/ "El Controller Pak\nno se encontr\nen ningn mando.\n", + /*323*/ "El fichero no ha sido salvado.\n", + /*324*/ "El fichero no se cargar.\n", + /*325*/ "No se puede borrar el fichero.\n", + /*326*/ "Sin memoria.\n", + /*327*/ "Este jugador ya ha sido\ncargado para este juego.\n", + /*328*/ "ha sido quitado.\n", + /*329*/ "El Controller Pak est daado o mal insertado.\n", + /*330*/ "Fall el borrado de la Nota de Juego.\n", + /*331*/ "Error Cargando Juego\n", + /*332*/ "Error Guardando Juego\n", + /*333*/ "Error Cargando Jugador\n", + /*334*/ "Error Guardando Jugador\n", + /*335*/ "Error Cargando PerfectHead\n", + /*336*/ "Error Guardando PerfectHead\n", + /*337*/ "Error Leyendo Fichero\n", + /*338*/ "Error Escribiendo Fichero\n", + /*339*/ "Error\n", + /*340*/ "Borrar Fallado\n", + /*341*/ "No se puede borrar el fichero.\n", + /*342*/ "- Comprueba que el Controller Pak\nest insertado correctamente.\n", + /*343*/ "Cancelar\n", + /*344*/ "No hay espacio.\n", + /*345*/ "。Bien!\n", + /*346*/ "Fichero Guardado.\n", + /*347*/ "Aceptar\n", + /*348*/ "Ha aparecido un error\nal intentar guardar.\n", + /*349*/ "Reintentar\n", + /*350*/ "Guardar en otro Sitio\n", + /*351*/ "Cancelar\n", + /*352*/ "Ha aparecido un error\nal intentar cargar.\n", + /*353*/ "Reintentar\n", + /*354*/ "Cancelar\n", + /*355*/ "Necesitas Espacio para la Cabeza\n", + /*356*/ "Elige una cabeza para cargar encima:\n", + /*357*/ "Aceptar\n", + /*358*/ "Cancelar\n", + /*359*/ "Guardar\n", + /*360*/ "ソQuieres guardar tu\nfichero en otro sitio?\n", + /*361*/ "S\n", + /*362*/ "No\n", + /*363*/ "Por favor, inserta el Controller Pak que contiene tu %s en cualquier mando.\n", + /*364*/ "Por favor, inserta el\nController Pak\ndonde est駸 salvando\nen cualquier mando.\n", + /*365*/ "Aceptar\n", + /*366*/ "Cancelar\n", + /*367*/ "Elige Lugar\n", + /*368*/ "Donde\n", + /*369*/ "Espacios\n", + /*370*/ "Borrar Ficheros...\n", + /*371*/ "Cancelar\n", + /*372*/ "Completo", + /*373*/ "Copiar Fichero\n", + /*374*/ "Elige fichero a copiar:\n", + /*375*/ "Pulsa el Botn B para salir.\n", + /*376*/ "Borrar Fichero\n", + /*377*/ "Elige fichero a borrar:\n", + /*378*/ "Pulsa el Botn B para salir.\n", + /*379*/ "Cuidado\n", + /*380*/ "ソSeguro que quieres\nborrar este fichero?\n", + /*381*/ "Cancelar\n", + /*382*/ "Aceptar\n", + /*383*/ "Borrar Nota de Juego\n", + /*384*/ "ソEst疽 seguro de\nque quieres borrar\nesta nota de juego?\n", + /*385*/ "No\n", + /*386*/ "S\n", + /*387*/ "Notas de Juego\n", + /*388*/ "Borra Notas de Juego:\n", + /*389*/ "Nota\n", + /*390*/ "P疊inas\n", + /*391*/ "Pulsa el Botn B para salir.\n", + /*392*/ "Vaco\n", + /*393*/ "--\n", + /*394*/ "P疊inas Libres: \n", + /*395*/ "P疊inas Libres: %d\n", + /*396*/ "P疊inas Usadas: \n", + /*397*/ "P疊inas Usadas: %d\n", + /*398*/ "Ya existe informacin de Perfect Dark\nen este Controller Pak.\n", + /*399*/ "Hay espacio suficiente para\nnotas de Perfect Dark.\n", + /*400*/ "El Controller Pak est demasiado lleno - 1 nota\ny 28 p疊inas son necesarias para guardar.\n", + /*401*/ "Introduce Nombre del Agente\n", + /*402*/ "Nuevo...\n", + /*403*/ "Nuevo Agente...\n", + /*404*/ "Nuevo Recluta", + /*405*/ "Tiempo de Misin:", + /*406*/ "Desafo 1", + /*407*/ "Desafo 2", + /*408*/ "Desafo 3", + /*409*/ "Desafo 4", + /*410*/ "Desafo 5", + /*411*/ "Desafo 6", + /*412*/ "Desafo 7", + /*413*/ "Desafo 8", + /*414*/ "Desafo 9", + /*415*/ "Desafo 10", + /*416*/ "Desafo 11", + /*417*/ "Desafo 12", + /*418*/ "Desafo 13", + /*419*/ "Desafo 14", + /*420*/ "Desafo 15", + /*421*/ "Desafo 16", + /*422*/ "Desafo 17", + /*423*/ "Desafo 18", + /*424*/ "Desafo 19", + /*425*/ "Desafo 20", + /*426*/ "Desafo 21", + /*427*/ "Desafo 22", + /*428*/ "Desafo 23", + /*429*/ "Desafo 24", + /*430*/ "Desafo 25", + /*431*/ "Desafo 26", + /*432*/ "Desafo 27", + /*433*/ "Desafo 28", + /*434*/ "Desafo 29", + /*435*/ "Desafo 30", + /*436*/ "Especial\n", + /*437*/ "Introduccin\n", + /*438*/ "Misin 1 - Central dataDyne\n", + /*439*/ "Misin 2 - Villa Carrington\n", + /*440*/ "Misin 3 - Edificio G5\n", + /*441*/ "Misin 4 - チrea 51\n", + /*442*/ "Misin 5 - Air Force One\n", + /*443*/ "Misin 6 - Pelagic II\n", + /*444*/ "Misin 7 - Instituto Carrington\n", + /*445*/ "Misin 8 - Nave de Ataque Skedar\n", + /*446*/ "Misin 9 - Ruinas Skedar\n", + /*447*/ "Final\n", + /*448*/ "Mostrar Todo\n", + /*449*/ "Introduccin\n", + /*450*/ "Intro 1:1 - En la Oscuridad\n", + /*451*/ "Final 1:1 - Descenso R疳ido\n", + /*452*/ "Intro 1:2 - Bajando\n", + /*453*/ "Final 1:2 - El Doctor\n", + /*454*/ "Intro 1:3 - Luces Fuera\n", + /*455*/ "Final 1:3 - ソDnde vas?\n", + /*456*/ "Intro 2:1 - 。Negocia esto!\n", + /*457*/ "Intro 2 2:1 - Vida en Lnea\n", + /*458*/ "Final 2:1 - Carrington Rescatado\n", + /*459*/ "Intro 3:1 - Callejn Oscuro\n", + /*460*/ "Final 3:1 - Entrando al G5\n", + /*461*/ "Intro 3:2 - Armas y Poses\n", + /*462*/ "Especial 3:2 - Conspiracin\n", + /*463*/ "Final 3:2 - Salida de Incendios\n", + /*464*/ "Intro 4:1 - Vdeos\n", + /*465*/ "Final 4:1 - Sin Salida\n", + /*466*/ "Intro 4:2 - Perlas de Sabidura\n", + /*467*/ "Final 4:2 - A Cuchillo\n", + /*468*/ "Intro 4:3 - 。Gas!\n", + /*469*/ "Especial 4:3 - Elvis Despierta\n", + /*470*/ "Final 4:3 - Escape\n", + /*471*/ "Intro 5:1 - Gran Altitud\n", + /*472*/ "Final 5:1 - Despegue\n", + /*473*/ "Intro 5:2 - レltima Oportunidad\n", + /*474*/ "Especial 5:2 - Atraque\n", + /*475*/ "Final 5:2 - Sin Opciones\n", + /*476*/ "Intro 5:3 - Horizontes Rojos\n", + /*477*/ "Final 5:3 - Manaco Rubio\n", + /*478*/ "Intro 6:1 - Sube a Bordo\n", + /*479*/ "Final 6:1 - Descendiendo\n", + /*480*/ "Intro 6:2 - M疽 Profundo\n", + /*481*/ "Especial 6:2 - 。Virus!\n", + /*482*/ "Final 6:2 - Saliendo\n", + /*483*/ "Intro 7:1 - Saludo Victorioso\n", + /*484*/ "Final 7:1 - Ayudando a Escapar\n", + /*485*/ "Intro 8:1 - 。Atrapada!\n", + /*486*/ "Final 8:1 - Buscando Problemas\n", + /*487*/ "Intro 9:1 - Aire en Calma\n", + /*488*/ "Final 9:1 - 。Te pill!\n", + /*489*/ "Secuencia Final\n", + /*490*/ "Pelculas\n", + /*491*/ "Oculto %d\n", + /*492*/ "Escoge Objetivo\n", + /*493*/ "Puntuacin\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pamE.c b/src/files/lang/pal-beta/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-beta/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pamJ.c b/src/files/lang/pal-beta/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/pal-beta/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pamP.c b/src/files/lang/pal-beta/pamP.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-beta/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_f.c b/src/files/lang/pal-beta/pam_str_f.c new file mode 100644 index 000000000..c27f4b3eb --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau alien repose au fond de l'oc饌n Pacifique. , Bien que dormant, le vaisseau Cetan est maintenant pris d'assaut parles Skedar et leurs alli駸 contraints, la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant dormant. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif Un: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif Deux: - Neutralisez la Super-Arme Cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif Trois: - S馗urisez la Salle de Contrle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrle afin de pouvoir restaurer la personnalit du Dr. Caroll sans interruption. Nous ne savons pas quelles s馗urit駸 ont 騁 mises en place pour emp鹹her cette op駻ation, alors soyez prudente.\n\n|Objectif Quatre: - Restaurez la personnalit du Dr. Caroll\n\nC'est la derni鑽e 騁ape du plan d'urgence mis en place par le Dr. Carolldurant le debriefing la villa. Restaurer sa personnalit l'I.A. lui permettra de reprendre le contrle de l'enveloppe dou馥 de raison et d'autres parties du vaisseau.\n\n|Objectif Cinq: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 1*/ "VAISSEAU CETAN\n", + /* 2*/ "|Background - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau alien repose au fond de l'oc饌n Pacifique. , Bien que dormant, le vaisseau Cetan est maintenant pris d'assaut parles Skedar et leurs alli駸 contraints, la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant dormant. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif Un: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif Deux: - Neutralisez la Super-Arme Cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif Trois: - S馗urisez la Salle de Contrle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrle afin de pouvoir restaurer la personnalit du Dr. Caroll sans interruption. Nous ne savons pas quelles s馗urit駸 ont 騁 mises en place pour emp鹹her cette op駻ation, alors soyez prudente.\n\n|Objectif Quatre: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 3*/ "|Background - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau alien repose au fond de l'oc饌n Pacifique. , Bien que dormant, le vaisseau Cetan est maintenant pris d'assaut parles Skedar et leurs alli駸 contraints, la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant dormant. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif Un: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif Deux: - Neutralisez la Super-Arme Cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif Trois: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R饌ctiver t駘駱orteurs\n", + /* 6*/ "Neutraliser Super-Arme Cetan\n", + /* 7*/ "S馗uriser la Salle de Contrle\n", + /* 8*/ "Restaurer la personnalit du Dr. Caroll\n", + /* 9*/ "S'馗happer du vaisseau Cetan\n", + /* 10*/ "Cela nous aidera nous d駱lacer plus\n vite dans ce vaisseau.\n", + /* 11*/ "Ce camouflage corporel nous aidera nous\nprot馮er des d馭enses automatiques.\n", + /* 12*/ "Voil le Dr. Caroll. Voyons voir si nous\npouvons inverser le processus.\n", + /* 13*/ "On doit se barrer d'ici!\n", + /* 14*/ "Elvis a 騁 tu.\n", + /* 15*/ "Dr. Caroll a 騁 tu.\n", + /* 16*/ "Evacuation du vaisseau Cetan r騏ssie.\n", + /* 17*/ "Elvis a d騅errouill la porte.\n", + /* 18*/ "Tiens, prends cette arme et tiens ces Skedars distance pendant que je travaille.\n", + /* 19*/ "Camouflage corporel obtenu.\n", + /* 20*/ "Super-Arme Cetan neutralis馥.\n", + /* 21*/ "Salle de Contrle s馗uris馥.\n", + /* 22*/ " Personnalit du Dr. Caroll restaur馥.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disque de sauvegarde\n", + /* 26*/ "Un disque de sauvegarde \n", + /* 27*/ "\n", + /* 28*/ "Un peu de sabotage ne ferait pas de mal\n ce truc.\n", + /* 29*/ "Il est temps de r饌ctiver ces t駘駱orteurs.\n", + /* 30*/ "T駘駱orteurs r饌ctiv駸.\n", + /* 31*/ "C'est bizarre, il n'y a personne dans le coin.\n", + /* 32*/ "Pas de traces de combat. Pas de douilles ou d'impacts d'armes feu.\n", + /* 33*/ "Ca n'a pas de sens. Il devrait au moins y avoir une arri鑽e-garde.\n", + /* 34*/ "Il doit y avoir quelqu'un plus loin. Couvre-moi.\n", + /* 35*/ "C'est parti... J'esp鑽e que la dataDyne n'a rien pr騅u pour emp鹹her 軋...\n", + /* 36*/ "Virus d騁ect.\n", + /* 37*/ "Ca m'apprendra, tiens...\n", + /* 38*/ "Lancement des contre-mesures. Lancem...***ooOOoh!!***aaAAh!!***aaAAAhh!! ***ooOOoh!!***YaaAAAhh!!***YEEAaAaAaAAAaAAaAHHH!!***\n", + /* 39*/ "Dr. Caroll? Avez-vous repris le contrle? Pouvez-vous arr黎er le programme?\n", + /* 40*/ "En effet, me voil de retour, tr鑚 ch鑽e. Le programme est lanc depuis trop longtemps pour que je puisse l'arr黎er. Il n'y a qu'une seule issue maintenant.\n", + /* 41*/ "Que voulez-vous dire?\n", + /* 42*/ "Quand le programme sera termin, j'aurai le contrle d'une arme extr麥ement puissante. Cette arme ne doit pas exister. Je dois par cons駲uent d騁ruire le vaisseau cetan et moi avec, malheureusement. Joanna... Nous n'avons ni le choix ni le temps d'en discuter. Allez-y! Evitez les Skedars et vous aurez le temps de vous 馗happer. Ce fut un honneur de travailler avec vous. Adieu, Joanna Dark.\n", + /* 43*/ "La Super-Arme Cetan a 騁 neutralis馥.\n", + /* 44*/ "Munitions 駱uis馥s - arme ennemie ne peut 黎re d騁ruite.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_g.c b/src/files/lang/pal-beta/pam_str_g.c new file mode 100644 index 000000000..87706f16f --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff.Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr denFall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Zerstren Sie alle Kraftknoten innerhalb des Schiffes. Nur so knnen Sie die Waffe au゚er Kraft setzen. Einige dieser Knoten knnten sich aber au゚erhalb menschlicher Reichweite befinden.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persnlichkeitsprofil ungestrt restaurieren knnen.Wir wissen nicht, welche Sicherheitsvorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Restaurieren Sie Dr. Carolls Persnlichkeitsprofil!\n\nDies ist die letzte Stufe des Notfallplans, ber den uns Dr. Caroll bei seinem Aufenthalt in der Villa informiert hat. Wenn seine Persnlichkeit mit der Codeknacker-Einheit verbunden ist, erlangt er nicht nur wieder die Kontrolle ber den Sapienten, sondern auch ber manche Teile des Cetanischen Schiffs.\n\n|5. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 1*/ "CETANISCHES SCHIFF\n", + /* 2*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff.Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr denFall, dass die Skedar den Zugang zum Kontrollraum blockiert haben,besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls PerSnlichkeitsprofil ungestrt restaurieren knnen.Wir wissen nicht, welche Sicherheitsvorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff.Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr denFall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Reaktivieren Sie die Teleporter!\n", + /* 6*/ "Machen Sie die Waffe funktionsunf臧ig!\n", + /* 7*/ "Sichern Sie den Kontrollraum!\n", + /* 8*/ "Restaurieren Sie Dr. Caroll!\n", + /* 9*/ "Flchten Sie aus dem Schiff!\n", + /* 10*/ "Auf diese Weise kommen wir innerhalb des Schiffs\nschneller voran.\n", + /* 11*/ "Diese Tarnkappe schtzt uns vor den automatischen\nVerteidigungsanlagen.\n", + /* 12*/ "Da ist Dr. Caroll. Wir mssen versuchen,\nseine Persnlichkeit wieder herzustellen.\n", + /* 13*/ "Wir mssen hier raus!\n", + /* 14*/ "Elvis wurde eliminiert.\n", + /* 15*/ "Dr. Caroll wurde zerstrt.\n", + /* 16*/ "Evakuierung erfolgreich.\n", + /* 17*/ "Elvis hat die Tr entriegelt.\n", + /* 18*/ "Hier, nimm diese Waffe und halte mir die Skedar\nvom Leib, w臧rend ich hier arbeite.\n", + /* 19*/ "Tarnkappe wurde aufgenommen.\n", + /* 20*/ "Die Cetanische Waffe wurde funktionsunf臧ig gemacht.\n", + /* 21*/ "Kontrollraum wurde gesichert.\n", + /* 22*/ "Dr. Carolls Presnlichkeitsprofil wurde restauriert.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Sicherungsdiskette\n", + /* 26*/ "Eine Sicherungsdiskette\n", + /* 27*/ "\n", + /* 28*/ "Ich glaube, ein klein wenig Sabotage w舐e hier \ndurchaus angebracht.\n", + /* 29*/ "Wir sollten nun diese Teleporter reaktivieren.\n", + /* 30*/ "Teleporter wurde reaktiviert.\n", + /* 31*/ "Irgendwas ist hier faul. Es ist niemand zu sehen.\n", + /* 32*/ "Keine Spuren eines Kampfes. Keine leeren Patronenhlsen oder Einschusslcher.\n", + /* 33*/ "Aber es sollte zumindest noch eine Wache hier sein. Das macht alles keinen Sinn.\n", + /* 34*/ "Vielleicht finden wir weiter drinnen noch jemanden. Gib mir Deckung.\n", + /* 35*/ "Ich hoffe, dass dataDyne nichts unternommen hat, um zu verhindern, dass...\n", + /* 36*/ "Virus entdeckt.\n", + /* 37*/ "Ich und mein gro゚es Mundwerk.\n", + /* 38*/ "Gegenma゚nahmen werden eingeleitet. Gegenma...*** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Haben Sie sich wieder unter Kontrolle? Knnen Sie das Programm stoppen?\n", + /* 40*/ "Ich habe mich wieder unter Kontrolle. Aber das Programm l舫ft schon zu lange. Ich kann es jetzt nicht mehr unterbrechen. Es gibt jetzt nur noch eine Mglichkeit.\n", + /* 41*/ "Wovon sprechen Sie?\n", + /* 42*/ "Wenn das Programm durchgelaufen ist, bin ich der einzige, der diese schreckliche Waffe kontrollieren kann. Ich darf nicht l舅ger existieren. Das Cetanische Schiff muss mit mit mir zerstrt werden. Es gibt leider keine Alternative, Joanna. Glauben Sie mir! Gehen Sie! Weichen Sie den Skedar aus und flchten Sie! Es war mir eine gro゚e Ehre, mit Ihnen zu arbeiten. Leben Sie wohl, Joanna Dark.\n", + /* 43*/ "Die Cetanische Waffe wurde funktionsunf臧ig gemacht.\n", + /* 44*/ "Munition verschwendet - Die Waffe kann nicht funktionsunf臧ig gemacht werden.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_i.c b/src/files/lang/pal-beta/pam_str_i.c new file mode 100644 index 000000000..ec3b5ca8a --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington - \n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Devi disattivare l'arma distruggendo i punti nevralgici di comando sparsi per l'astronave. Attenta: talvolta le armi normali non fuzioneranno.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Restituisci il cervello al Dr. Caroll\n\nQuesta l'ultima fase del piano di contingenza presentato dal Dr. Caroll durante il suo rapporto alla villa. Riportando il suo cervello alla struttura del decodificatore gli sar restituita la facolt di comando sul Sapiente e su quelle parti dell'astronave Cetan inglobate dal decodificatore. \n\n|Obiettivo 5: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 1*/ "ASTRONAVE CETAN\n", + /* 2*/ "|Situazione - \n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington - \n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscir a sabotare l'unit di comando dell'arma.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington - \n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscir a sabotare l'unit di comando dell'arma.\n\n|Obiettivo 3: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva i teleportali\n", + /* 6*/ "Disattiva la megabomba Cetan \n", + /* 7*/ "Controlla la sala comandi\n", + /* 8*/ "Restituisci il cervello al Dr. Caroll \n", + /* 9*/ "Fuga dall'astronave Cetan\n", + /* 10*/ "Questo ci aiuter a fare il giro \ndell'astronave pi velocemente.\n", + /* 11*/ "Questa immuno-maschera ci protegger \ndalle difese automatiche.\n", + /* 12*/ "Ecco il Dr. Caroll! Vediamo se riusciamo \nancora a recuperarlo.\n", + /* 13*/ "Dobbiamo uscire di qua! Presto!\n", + /* 14*/ "Elvis stato ucciso.\n", + /* 15*/ "Il Dr. Caroll stato ucciso.\n", + /* 16*/ "Evacuazione dall'astronave Cetan riuscita.\n", + /* 17*/ "Elvis ha aperto la porta.\n", + /* 18*/ "To'! Prendi questa e tienimi lontano \nquegli Skedar mentre sto lavorando.\n", + /* 19*/ "Trovata immuno-maschera.\n", + /* 20*/ "Disattivata megabomba Cetan.\n", + /* 21*/ "Sala comandi sotto controllo.\n", + /* 22*/ "Restituito il cervello al Dr. Caroll.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco di backup\n", + /* 26*/ "Disco di backup\n", + /* 27*/ "\n", + /* 28*/ "Sembra che un po' di sabotaggio \nnon possa fargli che bene! \n", + /* 29*/ "ネ ora di riattivare questi teleportali.\n", + /* 30*/ "I teleportali sono stati riattivati.\n", + /* 31*/ "Non normale! Non si vede anima viva!\n", + /* 32*/ "Tutto tranquillo!!! Niente bossoli, niente tracce di proiettili!\n", + /* 33*/ "Ma ci deve essere almeno qualche retroguardia... Non ha senso!!!\n", + /* 34*/ "Ci deve essere qualcuno all'interno. Coprimi!\n", + /* 35*/ "Ecco! Spero solo che la dataDyne non abbia fatto niente per impedire...\n", + /* 36*/ "Trovato un virus.\n", + /* 37*/ "Io e la mia linguaccia!!!\n", + /* 38*/ "Contromisure adottate... Contromi...***(cric... cric... crac... ecc...)*** Non ci posso credere! Quei vandali mi hanno manipolato i circuiti... ***AAAHIIIAAA... cric... crac...\n", + /* 39*/ "Dr. Caroll? Riprenda il controllo dis! Riesce a fermare il programma?\n", + /* 40*/ "S, s, ci sono, mia cara! Ma ho paura che il programma sia andato troppo oltre per poterlo fermare adesso. C' un sola via d'uscita!\n", + /* 41*/ "Cosa significa?\n", + /* 42*/ "Quando il programma avr finito, sar ingrado di comandare una bomba potentissima! Non posso permettermi di restare in vita! Devo distruggere i Cetan e con loro me stesso, sfortunatamente! Mi spiace, Joanna... Non c' altro modo e neanche tempo di discutere la cosa! Ora va! Evita gli Skedar e avrai tutto il tempo di fuggire. ネ stato un onore lavorare con te. Addio, Joanna Dark!\n", + /* 43*/ "La megabomba Cetan stata disattivata.\n", + /* 44*/ "Operazione fallita: megabomba ancora attiva.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_s.c b/src/files/lang/pal-beta/pam_str_s.c new file mode 100644 index 000000000..e5346c7b7 --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Depende de ti: destruye los nodos de energa a lo largo de la nave, y el arma dejar de ser operativa. Algunos estar疣 fuera del alcance de las armas normales.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegrate de que la Sala de Control est libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qu salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, as que ten cuidado.\n\n|Objetivo Cuatro: - Restaurar la Personalidad del Dr. Caroll\n\nノsta es la ltima fase del plan de contingencia que el Dr. Caroll adelant durante su informe en la Villa. Restaurar su personalidad a la del creador de cdigos de apertura reafirmar su control sobre el caparazn inteligente y aquellas partes de la nave Cetan que como 'rompedor de cdigos' es capaz de tomar.\n\n|Objetivo Cinco: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 1*/ "NAVE CETAN\n", + /* 2*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Elvis sabotear los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegrate de que la Sala de Control est libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qu salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, as que ten cuidado.\n\n|Objetivo Cuatro: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Elvis sabotear los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar los teleportales\n", + /* 6*/ "Desactivar la mega-arma Cetan\n", + /* 7*/ "Asegurar la sala de control\n", + /* 8*/ "Restaurar personalidad del Dr. Caroll\n", + /* 9*/ "Escapar de la nave Cetan\n", + /* 10*/ "Esto nos ayudar a recorrer la \nnave m疽 r疳ido.\n", + /* 11*/ "Este disfraz de anticuerpos nos proteger \nde las defensas autom疸icas.\n", + /* 12*/ "Ah est el Dr. Caroll. Veamos si podemos \narreglar lo que le hicieron.\n", + /* 13*/ "。Tenemos que salir de aqu!\n", + /* 14*/ "Elvis ha muerto.\n", + /* 15*/ "El Dr. Caroll ha muerto.\n", + /* 16*/ "Evacuacin de la nave Cetan exitosa.\n", + /* 17*/ "Elvis ha abierto la puerta.\n", + /* 18*/ "Aqu. Coge este arma y mant駭 a los Skedar \nalejados de m mientras trabajo.\n", + /* 19*/ "M疽cara de anticuerpos obtenida.\n", + /* 20*/ "La mega-arma Cetan ha sido desactivada.\n", + /* 21*/ "La Sala de Control ha sido asegurada.\n", + /* 22*/ "La personalidad del Dr. Caroll ha sido restaurada.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco de seguridad\n", + /* 26*/ "Un disco de seguridad\n", + /* 27*/ "\n", + /* 28*/ "Parece que esto puede beneficiarnos para \nun pequeo sabotaje.\n", + /* 29*/ "Es hora de reactivar esos teleportales.\n", + /* 30*/ "Los teleportales han sido reactivados.\n", + /* 31*/ "Esto no es normal. No hay nadie por aqu.\n", + /* 32*/ "No hay seales de lucha. No hay casquillos o agujeros de bala.\n", + /* 33*/ "Pero debera haber un guarda al menos. No tiene sentido.\n", + /* 34*/ "Debe haber alguien m疽 adelante. Cbreme.\n", + /* 35*/ "All vamos. Espero que dataDyne no haya hecho nada para prevenir esto...\n", + /* 36*/ "Virus detectado.\n", + /* 37*/ "。Qu bocaza tengo!\n", + /* 38*/ "Iniciando contramedidas. Inician.....*** 。。ooOOoh!! *** 。。eeEEe!! *** 。。aaAhh!! *** 。。oOOoh!! *** 。。aAArRrgghh!! *** 。。YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "ソDr. Caroll? ソTiene el control de nuevo? ソPuede detener el programa?\n", + /* 40*/ "S, estoy de vuelta, cario. Pero el programa ha estado en marcha demasiado como para detenerlo completamente. Slo existe una manera de acabar con esto...\n", + /* 41*/ "ソQu quiere decir?\n", + /* 42*/ "Cuando el programa haya acabado, tendr el control de un arma devastadoramente poderosa. No puede permitirse mi existencia. As que debo destruir la nave Cetan y a m mismo con ella. Lo siento, Joanna... No hay otra manera, ni tiempo para discutirlo. Vete. Esquiva a los Skedar y tendr疽 tiempo para escapar. Ha sido un honor trabajar contigo. Adis, Joanna Dark.\n", + /* 43*/ "La mega-arma Cetan ha sido inutilizada.\n", + /* 44*/ "Municin desperdiciada - incapaz de desactivar la mega-arma.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/peteE.c b/src/files/lang/pal-beta/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-beta/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/peteJ.c b/src/files/lang/pal-beta/peteJ.c new file mode 100644 index 000000000..dd9f41ca6 --- /dev/null +++ b/src/files/lang/pal-beta/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/peteP.c b/src/files/lang/pal-beta/peteP.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-beta/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_f.c b/src/files/lang/pal-beta/pete_str_f.c new file mode 100644 index 000000000..aef69d827 --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2: - Placer un Pisteur sur la limousine\n\nLa limousine est arriv馥 dans la rue principale peu apr鑚 vous. Toutes les tentatives pour la pister ont 馗hou馥s, il va falloir faire 軋 l'ancienne. Placez le Pisteur sur la limousine. Nous pourrons alors savoir d'o elle vient.\n\n|Objectif 3: - Pr駱arer voie de sortie\n\nIl y a une issue de secours d駸affect馥 l'arri鑽e de l'immeuble du G5 qui vous servira vous enfuir. Pr駱arer le chemin en pla軋nt des explosifs la porte. Pour 騅iter de donner l'alarme, vous devrez d馗lencher la mine une fois le meeting termin.\n\n|Objectif 4: - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 5: - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 1*/ "LES RUES DE CHICAGO\n", + /* 2*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2 - Pr駱arer voie de sortie\n\nIl y a une issue de secours d駸affect馥 l'arri鑽e de l'immeuble du G5 qui vous servira vous enfuir. Pr駱arer le chemin en pla軋nt des explosifs la porte. Pour 騅iter de donner l'alarme, vous devrez d馗lencher la mine une fois le meeting termin.\n\n|Objectif 3 - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 4 - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2: - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 3: - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "R馗up駻er 駲uipement point de largage\n", + /* 10*/ "Placer Pisteur sur limousine\n", + /* 11*/ "Pr駱arer voie de sortie\n", + /* 12*/ "Acqu駻ir cible de diversion\n", + /* 13*/ "Cr馥r diversion\n", + /* 14*/ "Entrer dans l'immeuble du G5\n", + /* 15*/ "Mine bien positionn馥.\n", + /* 16*/ "Mine mal positionn馥.\n", + /* 17*/ "Virus t駘馗harg dans le NavComp.\n", + /* 18*/ "Taxi incontrlable - re-programmation n馗essaire.\n", + /* 19*/ "Acc鑚 au syst鑪e de navigation du taxi.\n", + /* 20*/ "Virus t駘馗harg.\n", + /* 21*/ "Syst鑪e de navigation taxi re-programm.\n", + /* 22*/ "Connexion au taxi perdu.\n", + /* 23*/ "Pisteur bien positionn.\n", + /* 24*/ "Pisteur mal positionn.\n", + /* 25*/ "V馼icule crucial d騁ruit.\n", + /* 26*/ "MISSION ECHOUEE\n", + /* 27*/ "MISSION ACCOMPLIE\n", + /* 28*/ "Limousine DataDyne perdue.\n", + /* 29*/ "Mission 馗hou馥 - trop de pertes civiles.\n", + /* 30*/ "Attention - elle a une arme!\n", + /* 31*/ "Y'a une maniaque dans les rues!\n", + /* 32*/ "Alerte Intrus - Envoyez des renforts.\n", + /* 33*/ "Acc鑚 ascenseur scell.\n", + /* 34*/ "H - Qu'est-ce que vous faites l?\n", + /* 35*/ "Pfff. M麥e pas peur!\n", + /* 36*/ "Pisteur remarqu.\n", + /* 37*/ "Salutations, citoyen.\n", + /* 38*/ "Obtenir Mine t駘馗om.\n", + /* 39*/ "Dr. Caroll: \n", + /* 40*/ "Mine t駘馗om\n", + /* 41*/ "Une mine t駘馗om.\n", + /* 42*/ "Mine t駘馗om. obtenue.\n", + /* 43*/ "Obtenir pisteur.\n", + /* 44*/ "Dr Caroll: \n", + /* 45*/ "Pisteur\n", + /* 46*/ "Un pisteur\n", + /* 47*/ "Pisteur obtenu.\n", + /* 48*/ "Les portes ascenseur ne peuvent plus 黎re ouvertes.\n", + /* 49*/ "Obtenir Re-programmeur.\n", + /* 50*/ "Dr. Caroll: \n", + /* 51*/ "Re-programmeur\n", + /* 52*/ "Un re-programmeur\n", + /* 53*/ "Re-programmeur obtenu.\n", + /* 54*/ "Diversion cr鳬e.\n", + /* 55*/ "Obtenir mine t駘馗om.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Une mine t駘馗om.\n", + /* 59*/ "Mine t駘馗om.\n", + /* 60*/ "Nous avons cach l'駲uipement\ndans une bouche d'馮out.\n", + /* 61*/ "N'importe laquelle de ces portes bloqu馥\npeut servir de sortie.\n", + /* 62*/ "Re-programmer ce taxi - c'est un type 2 \nil devrait 黎re compatible.\n", + /* 63*/ "Cet ascenseur voiture est votre \nseul point d'entr馥.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Une autre diversion a 騁 cr鳬e!\n", + /* 67*/ "Pisteur 騁 d馗ouvert.\n", + /* 68*/ "Nous pensons que le G5 n'est qu'une \ncouverture de la dataDyne et qu'il est \nimpliqu dans ce complot. Je pense que \nCassandra de Vries sera l, mais j'ai besoin \nde savoir qui d'autre sera l et de quoi ils \nvont parler. Le temps que vous sortiez de l \nles renforts que j'ai demand seront arriv駸.\n", + /* 69*/ "Une cavalerie va venir me sauver, \n qui avez-vous fait appel?\n", + /* 70*/ "Je ne peux rien dire pour l'instant. \nSilence radio! Bonne chance, Joanna!\n", + /* 71*/ "Merci, chef ador.\n", + /* 72*/ "Mine t駘馗om. g稍h馥.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_g.c b/src/files/lang/pal-beta/pete_str_g.c new file mode 100644 index 000000000..c6766d702 --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Truppenmobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Befestigen Sie das Peilger舩 an der Limousine!\n\nDie Limousine, die auf der Hauptstra゚e steht, ist kurz vor Ihnen eingetroffen. Alle Versuche, ein Peilger舩 anzubringen, sind fehlgeschlagen. Daher muss die Sache wohl auf die altmodische Weise geregelt werden. Platzieren Sie ein Peilger舩 am Wagen, damit wir ihren Weg verfolgen knnen.\n\n|3. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rckseite des G5-Buildings ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als 舫゚erst ntzlich erweisen. In weiterer Folge mssen Sie einen blockierten Durchgang frei sprengen. Sie drfen die Minen allerdings erst znden, wenn der ワberwachungszyklus komplettiert worden ist.\n\n|4. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|5. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 1*/ "STRASSEN VON CHICAGO\n", + /* 2*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Truppenmobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rckseite des G5-Building ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als 舫゚erst ntzlich erweisen. In weiterer Folge mssen Sie einen blockierten Durchgang frei sprengen. Sie drfen die Minen allerdings erst znden, wenn der ワberwachungszyklus komplettiert worden ist.\n\n|3. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|4. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Truppenmobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|3. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie die Ausrstung!\n", + /* 10*/ "Befestigen Sie das Peilger舩 am Wagen!\n", + /* 11*/ "Bereiten Sie Ihren Fluchtweg vor!\n", + /* 12*/ "W臧len Sie ein Objekt fr das Ablenkungsmanver!\n", + /* 13*/ "Sorgen Sie fr ein Ablenkungsmanver!\n", + /* 14*/ "Betreten Sie das G5-Building!\n", + /* 15*/ "Mine wurde korrekt platziert.\n", + /* 16*/ "Mine wurde nicht korrekt platziert.\n", + /* 17*/ "Virus wurde bereits installiert.\n", + /* 18*/ "Hover-Cab reagiert nicht - Reprogrammierung erforderlich.\n", + /* 19*/ "Zugriff auf das Navigationssystem erfolgt.\n", + /* 20*/ "Virus wurde erfolgreich installiert.\n", + /* 21*/ "Navigationssystem wurde reprogrammiert.\n", + /* 22*/ "Verbindung zum Hover-Cab wurde unterbrochen.\n", + /* 23*/ "Peilsender wurde korrekt platziert.\n", + /* 24*/ "Peilsender wurde nicht korrekt platziert.\n", + /* 25*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 26*/ "MISSION FEHLGESCHLAGEN\n", + /* 27*/ "MISSION ERFOLGREICH\n", + /* 28*/ "Die dataDyne-Limousine befindet sich au゚er Reichweite.\n", + /* 29*/ "Mission fehlgeschlagen - Unakzeptable zivile Verluste.\n", + /* 30*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 31*/ "Da l舫ft wohl ein Spinner frei herum!\n", + /* 32*/ "Eindringling geortet - Verst舐kung ist unterwegs.\n", + /* 33*/ "Zugriff zum Aufzug ist versiegelt.\n", + /* 34*/ "Hey - Was machen Sie da?\n", + /* 35*/ "Sie machen mir keine Angst.\n", + /* 36*/ "Peilsender wurde gefunden.\n", + /* 37*/ "Sei mir gegr゚t, Brger.\n", + /* 38*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 39*/ "Dr. Carolls\n", + /* 40*/ "Fernznder-Mine\n", + /* 41*/ "Eine Fernznder-Mine\n", + /* 42*/ "Fernznder-Mine aufgenommen.\n", + /* 43*/ "Erlangen Sie den Peilsender.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Peilsender\n", + /* 46*/ "Ein Peilsender\n", + /* 47*/ "Peilsender aufgenommen.\n", + /* 48*/ "Aufzugstr kann nicht wieder geffnet werden.\n", + /* 49*/ "Erlangen Sie den Programm-Overrider.\n", + /* 50*/ "Dr. Carolls\n", + /* 51*/ "Programm-Overrider\n", + /* 52*/ "Ein Programm-Overrider\n", + /* 53*/ "Programm-Overrider aufgenommen.\n", + /* 54*/ "Ablenkungsmanver erfolgreich.\n", + /* 55*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Eine Fernznder-Mine\n", + /* 59*/ "Fernznder-Mine aufgenommen.\n", + /* 60*/ "Der einzige Ort, an dem wir die Ausrstung sicher unterbringen \nkonnten, ist ein Kanal.\n", + /* 61*/ "Jede dieser blockierten Tren eignet \nsich als Fluchtweg.\n", + /* 62*/ "Reprogrammieren Sie das Taxi! Der Wagen ist vom Typ Mark 2 \nund sollte kompatibel sein.\n", + /* 63*/ "Der einzige Zutritt fr Sie ist der \nAufzug am Parkdeck.\n", + /* 64*/ "EEPROM-Flag wurde gesetzt.\n", + /* 65*/ "EEPROM-Flag wurde gelscht.\n", + /* 66*/ "Es wurde ein alternatives Ablenkungsmanver durchgefhrt!\n", + /* 67*/ "Peilsender wurde entdeckt.\n", + /* 68*/ "Wir vermuten, dass die G5 Corporation nur \nals Tarnung fr dataDyne fungiert. Ich wei゚, \ndass Cassandra de Vries anwesend sein wird. \naber ich muss wissen, wer au゚erdem an dem \nTreffen teilnimmt und worber gesprochen wird. \nWenn Sie das Geb舫de verlassen, sollte die Hilfe, \ndie ich angefordert habe, eingetroffen sein.\n", + /* 69*/ "Wer ist diese 'Hilfe', auf die Sie sich \nbeziehen?\n", + /* 70*/ "Nicht jetzt, Joanna. Ab jetzt herrscht absolute \nFunkstille. Viel Glck!\n", + /* 71*/ "Hm, herzlichen Dank.\n", + /* 72*/ "Fernznder-Mine wurde verschwendet.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_i.c b/src/files/lang/pal-beta/pete_str_i.c new file mode 100644 index 000000000..008b6730a --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington - \n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei tombini di scolo: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Attacca una microspia alla limousine\n\nLa limousine sulla strada principale arrivata poco prima di te. Tutti i tentativi di ricostruirne il percorso sono falliti, quindi bisogner agire nel modo tradizionale. Attacca una microspia alla limousine per poter scoprirne la provenienza.\n\n|Obiettivo 3: - Prepara la via di fuga\n\nDietro all'Edificio G5 c' un'uscita antincendio abbandonata che ti sar sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 4: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 5: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 1*/ "STRADE DI CHICAGO\n", + /* 2*/ "|Situazione - \n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington - \n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei tombini di scolo: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Prepara la via di fuga\n\nDietro all'Edificio G5 c' un'uscita antincendio abbandonata che ti sar sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 3: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 4: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington - \n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei tombini di scolo: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 3: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Va a prendere l'attrezzatura\n", + /* 10*/ "Attacca una microspia alla limousine\n", + /* 11*/ "Prepara la via di fuga\n", + /* 12*/ "Identifica obiettivo di distrazione\n", + /* 13*/ "Distrai le forze di sicurezza\n", + /* 14*/ "Entra nell'Edificio G5\n", + /* 15*/ "Mina piazzata correttamente\n", + /* 16*/ "Mina in posizione errata\n", + /* 17*/ "Virus gi scaricato nel computer.\n", + /* 18*/ "Computer non risponde: serve riprogrammatore.\n", + /* 19*/ "Accesso al sistema di navigazione.\n", + /* 20*/ "Virus scaricato correttamente.\n", + /* 21*/ "Computer di navigazione riprogrammato.\n", + /* 22*/ "Interrotto collegamento al computer.\n", + /* 23*/ "Microspia piazzata correttamente.\n", + /* 24*/ "Microspia in posizione errata.\n", + /* 25*/ "Distrutto veicolo essenziale alla missione.\n", + /* 26*/ "MISSIONE FALLITA\n", + /* 27*/ "MISSIONE COMPIUTA\n", + /* 28*/ "La limousine dataDyne riuscita a scappare.\n", + /* 29*/ "Missione fallita - Vittime civili inaccettabili.\n", + /* 30*/ "Attenzione! Ha una pistola!\n", + /* 31*/ "ネ pazza! ネ pazza! Rinchiudetela!!!\n", + /* 32*/ "Allarme intrusione - Mandate rinforzi!\n", + /* 33*/ "Bloccato l'accesso all'ascensore.\n", + /* 34*/ "Ehi, cosa stai facendo?\n", + /* 35*/ "Non mi fai paura!\n", + /* 36*/ "La microspia stata scoperta.\n", + /* 37*/ "Saluti!!!\n", + /* 38*/ "Procurati mina a distanza.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina a distanza\n", + /* 41*/ "Mina a distanza\n", + /* 42*/ "Presa mina a distanza.\n", + /* 43*/ "Procurati microspia.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "Microspia\n", + /* 46*/ "Microspia\n", + /* 47*/ "Presa microspia.\n", + /* 48*/ "Impossibile riaprire porta ascensore.\n", + /* 49*/ "Procurati riprogrammatore.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Riprogrammatore\n", + /* 52*/ "Riprogrammatore\n", + /* 53*/ "Preso riprogrammatore.\n", + /* 54*/ "Creata la distrazione.\n", + /* 55*/ "Procurati mina a distanza.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Mina a distanza\n", + /* 59*/ "Presa mina a distanza.\n", + /* 60*/ "L'unico posto in cui stato possibile \nnascondere gli strumenti era il tombino.\n", + /* 61*/ "Una di quelle porte bloccate pu \nessere un'ottima via di fuga.\n", + /* 62*/ "Riprogramma quel taxi: un Mark 2, \ndovrebbe essere compatibile!\n", + /* 63*/ "Quell'ascensore nel parcheggio \n l'unica entrata possibile!\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Creata distrazione alternativa!\n", + /* 67*/ "La microspia stata scoperta.\n", + /* 68*/ "Sospettiamo che la G5 Corporation sia \nsolo una copertura per la dataDyne e per \nchiunque altro sia coinvolto in questo \ncomplotto. So per certo che sar presente \nCassandra de Vries, ma devo anche scoprire \nchi altro ci sar e di che cosa si parler. \nAl momento che uscirai i rinforzi che ho \nrichiesto saranno gi arrivati.\n", + /* 69*/ "Solo una cosa, chi sono questi \n'rinforzi'?\n", + /* 70*/ "Non adesso, Joanna. ネ ora del silenzio \nradio. In bocca al lupo!\n", + /* 71*/ "Grazie tante!!!\n", + /* 72*/ "Sprecata mina a distanza.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_s.c b/src/files/lang/pal-beta/pete_str_s.c new file mode 100644 index 000000000..a33dcac4f --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Colocar el Rastreador en la Limusina\n\nLa limusina de la calle principal lleg poco antes que t. Todos los intentos de rastrearla han sido intiles, as que tendremos que hacerlo a la vieja usanza. Coloca un 'bicho' en la limusina para que as podamos rastrear adnde se dirige.\n\n|Objetivo Tres: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detr疽 del Edificio G5 que nos puede ser til para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Cuatro: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cinco: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 1*/ "CALLES DE CHICAGO\n", + /* 2*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detr疽 del Edificio G5 que nos puede ser til para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Tres: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cuatro: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Tres: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Recuperar el equipo\n", + /* 10*/ "Colocar el rastreador en la limusina\n", + /* 11*/ "Preparar la ruta de escape\n", + /* 12*/ "Adquirir blancos de distraccin\n", + /* 13*/ "Crear distraccin mvil\n", + /* 14*/ "Entrar en el edificio G5\n", + /* 15*/ "Mina colocada correctamente.\n", + /* 16*/ "Mina colocada incorrectamente.\n", + /* 17*/ "Virus ya implantado en el Navegador.\n", + /* 18*/ "El aerotaxi no responde: requiere Reprogramacin.\n", + /* 19*/ "Accediendo al sistema de navegacin del aerotaxi.\n", + /* 20*/ "Virus descargado satisfactoriamente.\n", + /* 21*/ "Sistema de navegacin del taxi reprogramado.\n", + /* 22*/ "Conexin con el aerotaxi perdida.\n", + /* 23*/ "'Bicho' Rastreador colocado correctamente.\n", + /* 24*/ "'Bicho' Rastreador colocado incorrectamente.\n", + /* 25*/ "Vehculo crtico de la misin destruido.\n", + /* 26*/ "MISIモN FALLADA\n", + /* 27*/ "MISIモN CONSEGUIDA\n", + /* 28*/ "La limusina de dataDyne ha escapado.\n", + /* 29*/ "Misin fallada: bajas civiles inaceptables.\n", + /* 30*/ "Cuidado. 。Tiene un arma!\n", + /* 31*/ "。Hay un manaco suelto!\n", + /* 32*/ "Alerta de Intruso: refuerzos enviados.\n", + /* 33*/ "Acceso del ascensor sellado.\n", + /* 34*/ "。Hey! ソQu haces?\n", + /* 35*/ "No me asustas.\n", + /* 36*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 37*/ "Bienvenido, ciudadano.\n", + /* 38*/ "Obt駭 la Mina Remota.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Una Mina Remota\n", + /* 42*/ "Mina Remota obtenida.\n", + /* 43*/ "Obt駭 el 'Bicho' Rastreador.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "'Bicho' Rastreador\n", + /* 46*/ "Un 'Bicho' Rastreador\n", + /* 47*/ "'Bicho' Rastreador obtenido.\n", + /* 48*/ "La puerta del ascensor no puede reabrirse.\n", + /* 49*/ "Obt駭 el Reprogramador.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Reprogramador\n", + /* 52*/ "Un Reprogramador\n", + /* 53*/ "Reprogramador obtenido.\n", + /* 54*/ "Distraccin en marcha.\n", + /* 55*/ "Obt駭 la Mina Remota.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Una Mina Remota\n", + /* 59*/ "Mina Remota obtenida.\n", + /* 60*/ "El nico lugar donde pudimos asegurar \nel equipo fue en un desage.\n", + /* 61*/ "Cada una de esas puertas bloqueadas \npuede ser una ruta de escape.\n", + /* 62*/ "Reprograma ese taxi: es un Mark 2 \ny debe ser compatible.\n", + /* 63*/ "Ese elevador de coches es el \nnico punto de acceso.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "。Una distraccin alternativa ha sido creada!\n", + /* 67*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 68*/ "Sospechamos que la Corporacin G5 es slo una \ntapadera de dataDyne y que est tambi駭 \nenvuelta en este complot. S que Cassandra \nDe Vries va a estar aqu, pero necesito \nsaber qui駭 m疽 va a venir y sobre qu \nvan a discutir. Una vez salgas, la ayuda \nque solicit estar llegando.\n", + /* 69*/ "ソPero a qu ayuda te est疽 \nrefiriendo?\n", + /* 70*/ "Ahora no, Joanna. Mant駭 la radio en silencio. \n。Buena suerte!\n", + /* 71*/ "Muchas gracias.\n", + /* 72*/ "La Mina Remota ha sido desperdiciada.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobjE.c b/src/files/lang/pal-beta/propobjE.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-beta/propobjE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobjJ.c b/src/files/lang/pal-beta/propobjJ.c new file mode 100644 index 000000000..fc459a214 --- /dev/null +++ b/src/files/lang/pal-beta/propobjJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "ammo", + /* 3*/ "cartridge", + /* 4*/ "magnum bullet", + /* 5*/ "golden bullet", + /* 6*/ "hand grenade", + /* 7*/ "grenade round", + /* 8*/ "rocket", + /* 9*/ "homing rocket", + /* 10*/ "remote mine", + /* 11*/ "proximity mine", + /* 12*/ "timed mine", + /* 13*/ "combat ", + /* 14*/ "knife", + /* 15*/ "knives", + /* 16*/ "s", + /* 17*/ "dart", + /* 18*/ "n-bomb", + /* 19*/ "drugs", + /* 20*/ "explosive pen", + /* 21*/ "explosive case", + /* 22*/ "flare", + /* 23*/ "piton", + /* 24*/ "of dynamite", + /* 25*/ "stick ", + /* 26*/ "sticks ", + /* 27*/ "bug", + /* 28*/ "micro camera", + /* 29*/ "GoldenEye key", + /* 30*/ "token", + /* 31*/ "plastique", + /* 32*/ "Picked up a key.\n", + /* 33*/ "Picked up a shield.\n", + /* 34*/ "A shield.\n", + /* 35*/ "Picked up something.\n", + /* 36*/ "This door is locked.\n", + /* 37*/ "bolt", + /* 38*/ "orb", + /* 39*/ "Reaper ammo", + /* 40*/ "cloaking device", + /* 41*/ "speed pill", + /* 42*/ "your ", + /* 43*/ "YOUR some ", + /* 44*/ "Some ", + /* 45*/ "a ", + /* 46*/ "A ", + /* 47*/ "an ", + /* 48*/ "An ", + /* 49*/ "the ", + /* 50*/ "The ", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, + /* 68*/ NULL, + /* 69*/ NULL, + /* 70*/ NULL, + /* 71*/ NULL, + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, + /* 76*/ NULL, + /* 77*/ NULL, + /* 78*/ NULL, + /* 79*/ NULL, + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobjP.c b/src/files/lang/pal-beta/propobjP.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-beta/propobjP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_f.c b/src/files/lang/pal-beta/propobj_str_f.c new file mode 100644 index 000000000..db63eb0db --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtenu.\n", + /* 1*/ "%s obtenue.\n", + /* 2*/ "", + /* 3*/ "", + /* 4*/ "%s obtenus.\n", + /* 5*/ "%s obtenues.\n", + /* 6*/ "", + /* 7*/ "", + /* 8*/ "Double ", + /* 9*/ "Munitions", + /* 10*/ "Cartouche", + /* 11*/ "Balle de Magnum", + /* 12*/ "balle en or", + /* 13*/ "Grenade", + /* 14*/ "Munit. grenade", + /* 15*/ "Roquette", + /* 16*/ "Roquette t黎e cher.", + /* 17*/ "Mine t駘馗ommand馥", + /* 18*/ "Mine de proximit", + /* 19*/ "Mine retardement", + /* 20*/ "Couteau de combat", + /* 21*/ "Couteaux de combat", + /* 22*/ "Fl馗hette", + /* 23*/ "Bombe-N", + /* 24*/ "S馘atif", + /* 25*/ "stylo explosif", + /* 26*/ "malle explosive", + /* 27*/ "fus馥", + /* 28*/ "piton", + /* 29*/ "de dynamite", + /* 30*/ "b穰on ", + /* 31*/ "b穰ons ", + /* 32*/ "mouchard", + /* 33*/ "micro camera", + /* 34*/ "Cl GoldenEye", + /* 35*/ "jeton", + /* 36*/ "plastique", + /* 37*/ "Cl obtenue.\n", + /* 38*/ "Bouclier obtenu.\n", + /* 39*/ "Un bouclier.\n", + /* 40*/ "El駑ent obtenu.\n", + /* 41*/ "Cette porte est ferm馥.\n", + /* 42*/ "Carreau", + /* 43*/ "Orbe", + /* 44*/ "Munitions pour Reaper", + /* 45*/ "Occulteur", + /* 46*/ "Pilule boost", + /* 47*/ "votre ", + /* 48*/ "Votre ", + /* 49*/ "des ", + /* 50*/ "Des ", + /* 51*/ "des ", + /* 52*/ "Des ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "une ", + /* 60*/ "Une ", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Carreaux", + /* 66*/ "Orbes", + /* 67*/ "Munitions pour Reaper", + /* 68*/ "Occulteurs", + /* 69*/ "Pilules boost", + /* 70*/ "Munitions", + /* 71*/ "Cartouches", + /* 72*/ "Balles de Magnum", + /* 73*/ "golden bullets", + /* 74*/ "Grenades", + /* 75*/ "Munit. grenades", + /* 76*/ "Roquettes", + /* 77*/ "Roquettes t黎e cher.", + /* 78*/ "Mines t駘馗ommand馥s", + /* 79*/ "Mines de proximit", + /* 80*/ "Mines retardement", + /* 81*/ "Fl馗hettes", + /* 82*/ "Bombes-N", + /* 83*/ "S馘atifs", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_g.c b/src/files/lang/pal-beta/propobj_str_g.c new file mode 100644 index 000000000..47a3e6658 --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s aufgenommen.\n", + /* 1*/ "%s aufgenommen.\n", + /* 2*/ "%s aufgenommen.\n", + /* 3*/ "%s aufgenommen.\n", + /* 4*/ "%s aufgenommen.\n", + /* 5*/ "%s aufgenommen.\n", + /* 6*/ "%s aufgenommen.\n", + /* 7*/ "%s aufgenommen.\n", + /* 8*/ "Doppel ", + /* 9*/ "Munition", + /* 10*/ "Magazin", + /* 11*/ "Magnum-Kugel", + /* 12*/ "goldene Kugel", + /* 13*/ "Granate", + /* 14*/ "Granatwerfer-Munition", + /* 15*/ "Rakete", + /* 16*/ "Zielsuch-Rakete", + /* 17*/ "Fernznder-Mine", + /* 18*/ "Ann臧erungs-Mine", + /* 19*/ "Zeitznder-Mine", + /* 20*/ "Kampfmesser", + /* 21*/ "Kampfmesser", + /* 22*/ "Pfeil", + /* 23*/ "N-Bombe", + /* 24*/ "Bet舫bungsgeschoss", + /* 25*/ "Explosiver Kugelschreiber", + /* 26*/ "Explosiver Koffer", + /* 27*/ "Leuchtkugel", + /* 28*/ "Felshaken", + /* 29*/ "of dynamite", + /* 30*/ "Stock ", + /* 31*/ "Stcke ", + /* 32*/ "Peilsender", + /* 33*/ "Mikro-Kamera", + /* 34*/ "GoldenEye-Schlssel", + /* 35*/ "Symbol", + /* 36*/ "Plastik", + /* 37*/ "Schlssel aufgenommen.\n", + /* 38*/ "Schild aufgenommen.\n", + /* 39*/ "Ein Schild.\n", + /* 40*/ "Etwas wurde aufgenommen.\n", + /* 41*/ "Diese Tr ist verschlossen.\n", + /* 42*/ "Bolzen", + /* 43*/ "Kraftzelle", + /* 44*/ "Reaper-Munition", + /* 45*/ "Tarnkappe", + /* 46*/ "St舐kungs-Pille", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Bolzen", + /* 66*/ "Kraftzellen", + /* 67*/ "Reaper-Munition", + /* 68*/ "Tarnkappen", + /* 69*/ "St舐kungs-Pillen", + /* 70*/ "Munition", + /* 71*/ "Magazin", + /* 72*/ "Magnum-Kugeln", + /* 73*/ "golden bullets", + /* 74*/ "Granaten", + /* 75*/ "Granatwerfer-Munition", + /* 76*/ "Raketen", + /* 77*/ "Zielsuch-Raketen", + /* 78*/ "Ferntnder-Minen", + /* 79*/ "Ann臧erungs-Minen", + /* 80*/ "Zeitznder-Minen", + /* 81*/ "Pfeile", + /* 82*/ "N-Bomben", + /* 83*/ "Bet舫bungsgeschosse", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_i.c b/src/files/lang/pal-beta/propobj_str_i.c new file mode 100644 index 000000000..77da5bdd6 --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Preso %s.\n", + /* 1*/ "Presa %s.\n", + /* 2*/ "Presa %s.\n", + /* 3*/ "Preso %s.\n", + /* 4*/ "Presi %s.\n", + /* 5*/ "Prese %s.\n", + /* 6*/ "Prese %s.\n", + /* 7*/ "Prese %s.\n", + /* 8*/ "Doppio ", + /* 9*/ "munizioni", + /* 10*/ "cartuccia", + /* 11*/ "pallottola magnum", + /* 12*/ "pallottola d'oro", + /* 13*/ "granata", + /* 14*/ "granata a giro", + /* 15*/ "missile", + /* 16*/ "missile di ritorno", + /* 17*/ "mina a distanza", + /* 18*/ "mina di prossimit", + /* 19*/ "mina a tempo", + /* 20*/ "pugnale da lotta", + /* 21*/ "pugnali da lotta", + /* 22*/ "freccia", + /* 23*/ "bomba-n", + /* 24*/ "sedativi", + /* 25*/ "penna esplosiva", + /* 26*/ "cassa esplosiva", + /* 27*/ "fiamma", + /* 28*/ "chiodo", + /* 29*/ "di dinamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "cimice", + /* 33*/ "micro camera", + /* 34*/ "chiave GoldenEye", + /* 35*/ "buono", + /* 36*/ "plastica", + /* 37*/ "Presa chive.\n", + /* 38*/ "Preso scudo.\n", + /* 39*/ "uno scudo.\n", + /* 40*/ "Preso qualcosa.\n", + /* 41*/ "La porta chiusa.\n", + /* 42*/ "dardo", + /* 43*/ "globo", + /* 44*/ "munizioni Falciatore", + /* 45*/ "Dispositivo mimetico", + /* 46*/ "Pillola booster", + /* 47*/ "la ", + /* 48*/ "La ", + /* 49*/ "dei ", + /* 50*/ "Dei ", + /* 51*/ "delle ", + /* 52*/ "Delle ", + /* 53*/ "delle", + /* 54*/ "Delle", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "un'", + /* 62*/ "Un'", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "dardi", + /* 66*/ "globi", + /* 67*/ "munizioni Falciatore", + /* 68*/ "Dispositivo mimetico", + /* 69*/ "Pillole booster", + /* 70*/ "munizioni", + /* 71*/ "cartucce", + /* 72*/ "pallottole magnum", + /* 73*/ "golden bullets", + /* 74*/ "granate", + /* 75*/ "granate a giro", + /* 76*/ "missili", + /* 77*/ "missili a giro", + /* 78*/ "mine a distanza", + /* 79*/ "mine di prossimit", + /* 80*/ "mine a tempo", + /* 81*/ "frecce", + /* 82*/ "bombe-n", + /* 83*/ "sedativi", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_s.c b/src/files/lang/pal-beta/propobj_str_s.c new file mode 100644 index 000000000..2f5a09012 --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Recogiste %s.\n", + /* 1*/ "Recogiste %s.\n", + /* 2*/ "Recogiste %s.\n", + /* 3*/ "Recogiste %s.\n", + /* 4*/ "Recogiste %s.\n", + /* 5*/ "Recogiste %s.\n", + /* 6*/ "Recogiste %s.\n", + /* 7*/ "Recogiste %s.\n", + /* 8*/ "Doble ", + /* 9*/ "municin", + /* 10*/ "cartucho", + /* 11*/ "bala de magnum", + /* 12*/ "balas doradas", + /* 13*/ "granada", + /* 14*/ "cinto de granadas", + /* 15*/ "cohete", + /* 16*/ "cohete buscador", + /* 17*/ "mina remota", + /* 18*/ "mina de proximidad", + /* 19*/ "mina de tiempo", + /* 20*/ "cuchillo de combate", + /* 21*/ "cuchillos de combate", + /* 22*/ "dardo", + /* 23*/ "bomba-N", + /* 24*/ "sedante", + /* 25*/ "Boli Explosivo", + /* 26*/ "Caja de Explosivos", + /* 27*/ "Bengalas", + /* 28*/ "Pitn", + /* 29*/ "", + /* 30*/ "Cartucho de Dinamita", + /* 31*/ "Cartuchos de Dinamita", + /* 32*/ "Bicho", + /* 33*/ "Microc疥ara", + /* 34*/ "Llave GoldenEye", + /* 35*/ "Ficha", + /* 36*/ "Explosivo Pl疽tico", + /* 37*/ "Has cogido una Llave.\n", + /* 38*/ "Has cogido un Escudo.\n", + /* 39*/ "Un Escudo.\n", + /* 40*/ "Has cogido algo.\n", + /* 41*/ "Esta puerta est cerrada.\n", + /* 42*/ "saeta", + /* 43*/ "orbe", + /* 44*/ "municin Segadora", + /* 45*/ "disp. de ocultacin", + /* 46*/ "reforzador", + /* 47*/ "tu ", + /* 48*/ "Tu ", + /* 49*/ "algunos ", + /* 50*/ "Algunos ", + /* 51*/ "algunas ", + /* 52*/ "Algunas ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "unos", + /* 62*/ "Unos", + /* 63*/ "unas", + /* 64*/ "Unas", + /* 65*/ "saetas", + /* 66*/ "orbes", + /* 67*/ "municin Segadora", + /* 68*/ "disp. de ocultacin", + /* 69*/ "reforzadores", + /* 70*/ "Algo de municin", + /* 71*/ "cartuchos", + /* 72*/ "balas de magnum", + /* 73*/ "golden bullets", + /* 74*/ "granadas", + /* 75*/ "cintos de granadas", + /* 76*/ "cohetes", + /* 77*/ "cohetes buscadores", + /* 78*/ "minas remotas", + /* 79*/ "minas de proximidad", + /* 80*/ "minas de tiempo", + /* 81*/ "dardos", + /* 82*/ "bombas-N", + /* 83*/ "sedantes", + /* 84*/ "fichas", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/refE.c b/src/files/lang/pal-beta/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/refJ.c b/src/files/lang/pal-beta/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/refP.c b/src/files/lang/pal-beta/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_f.c b/src/files/lang/pal-beta/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_g.c b/src/files/lang/pal-beta/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_i.c b/src/files/lang/pal-beta/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_s.c b/src/files/lang/pal-beta/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ritE.c b/src/files/lang/pal-beta/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-beta/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ritJ.c b/src/files/lang/pal-beta/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/pal-beta/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ritP.c b/src/files/lang/pal-beta/ritP.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-beta/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_f.c b/src/files/lang/pal-beta/rit_str_f.c new file mode 100644 index 000000000..a50d78aa5 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser et r馗up駻er l'駲uipement\n\nTrouvez l'駲uipement dissimul dans la soute bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'駲uipe de s馗urit Pr駸identiel est neutre et qu'elle ne doit pas 黎re attaqu馥.\n\n|Objectif 2: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connue. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 3: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - S馗urisez le plan de vol de Air Force One\n\nLes d騁ails du plan de Trent sont encore inconnus, mais nous pensons que l'駲uipage de l'avion sera en danger. Vous devrez acc馘er la cabine de pilotage pour d馗ouvrir ce qu'il pr駱are. Si la situation 馗happe votre contrle, activez l'auto-pilote.\n\n|Objectif 5: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One! La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser et r馗up駻er l'駲uipement\n\nTrouvez l'駲uipement dissimul dans la soute bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'駲uipe de s馗urit Pr駸identiel est neutre et qu'elle ne doit pas 黎re attaqu馥.\n\n|Objectif 2: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connue. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 3: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One! La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connue. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 2: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 3: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One! La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localiser et r馗up駻er 駲uipement\n", + /* 6*/ "Localiser Pr駸ident\n", + /* 7*/ "Placer Pr駸ident dans capsule\n", + /* 8*/ "S馗uriser plan de vol de Air Force One\n", + /* 9*/ "D騁acher OVNI de Air Force One\n", + /* 10*/ "Obtenir Valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir Arbal鑼e.\n", + /* 16*/ "\n", + /* 17*/ "Arbal鑼e\n", + /* 18*/ "Arbal鑼e\n", + /* 19*/ "Arbal鑼e obtenue.\n", + /* 20*/ "Trop de victimes neutres provoqu馥s.\n", + /* 21*/ "Connexion l'OVNI d騁ruite.\n", + /* 22*/ "Impossible de d騁ruire connexion OVNI.\n", + /* 23*/ "Auto-pilote enclench.\n", + /* 24*/ "Air Force One stabilis.\n", + /* 25*/ "Syst鑪e Auto-pilote d騁ruit.\n", + /* 26*/ "Le Pr駸ident a 騁 incapacit.\n", + /* 27*/ "Pilotes tu駸.\n", + /* 28*/ "Pilotes sauv駸.\n", + /* 29*/ "Air Force One va s'馗raser.\n", + /* 30*/ "Obtenir mine t駘馗om.\n", + /* 31*/ "\n", + /* 32*/ "Mine t駘馗om.\n", + /* 33*/ "Mine t駘馗om.\n", + /* 34*/ "Mine t駘馗om. obtenue.\n", + /* 35*/ "Qui 黎es-vous, jeune fille?\n", + /* 36*/ "Securit, SECURITE!!\n", + /* 37*/ "Mr. Le Pr駸ident, vous 黎es en danger. Trent va essayer \nde vous kidnapper.\n", + /* 38*/ "Comment 軋? Qu'est-ce que 軋 veut dire!\n", + /* 39*/ "Vous devez gagnez sans tarder la capsule de secours! \nSuivez-moi!\n", + /* 40*/ "Avez-vous des preuves pour avancer de tels propos?\n Vos accusations sont tr鑚 graves.\n", + /* 41*/ "Voici l'enregistrement de la r騏nion entre\nTrent et ses sbires conspirateurs.\n", + /* 42*/ "C'est effrayant... Je vous crois.\nQue fait-on maintenant?\n", + /* 43*/ "H, ce n'est pas...\n", + /* 44*/ "C'est un intrus...\n", + /* 45*/ "Comment avez-vous fait pour monter bord?\n", + /* 46*/ "Bien, r馗up駻ons les preuves.\n", + /* 47*/ "Le bureau du Pr駸ident est dans\nce niveau, Joanna.\n", + /* 48*/ "Il y a quelque chose de bizarre... Foncez la cabine de pilotage!\n", + /* 49*/ "Peut-黎re une mine pourrait d騁ruire la connexion l'OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pilule d'adr駭aline\n", + /* 53*/ "Pilule d'adr駭aline\n", + /* 54*/ "Pilule d'adr駭aline obtenue.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Carte\n", + /* 58*/ "Carte\n", + /* 59*/ "Carte obtenue.\n", + /* 60*/ "Soute baiss馥.\n", + /* 61*/ "Soute lev馥.\n", + /* 62*/ "Objet crucial d騁ruit.\n", + /* 63*/ "Acc鑚 refus - Carte ascenseur requise.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Carte ascenseur\n", + /* 67*/ "Carte ascenseur \n", + /* 68*/ "Carte ascenseur obtenue.\n", + /* 69*/ "Mine retardement.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "C'est trop tard, tu ne pourras pas le sauver.\n", + /* 72*/ "Le Pr駸ident est attaqu.\n", + /* 73*/ "Avez-vous r馭l馗hi la proposition que je vous ai pr駸ent馥, monsieur?\n", + /* 74*/ "Ma r駱onse est toujours la m麥e: d駸ol Trent, c'est non. Je ne confierai pas le Pelagic II la dataDyne. Changeons de sujet, voulez-vous!\n", + /* 75*/ "Mais c'est l'occasion en or de montrer que l'Am駻ique a foi en son industrie et que vous 黎es pr黎 les...\n", + /* 76*/ "Ca suffit, quand je dis non c'est non! Je ne vais pas changer d'avis sur ce sujet! Je veux que mes conseillers soient impartiaux, et vous ne me donnez pas cette impression, Trent. Le sujet est clos. C'est votre derni鑽e chance. Je ne reviendrai pas sur ma d馗ision.\n", + /* 77*/ "Comme vous voulez, monsieur.\n", + /* 78*/ "Ma derni鑽e chance? Ha! Pauvre fou. C'騁ait plutt la tienne, cr騁in!\n", + /* 79*/ "Elvis! Elvis! Je n'arrive pas d騁acher ce tube du fuselage! Peux-tu t'en charger?\n", + /* 80*/ "Un jeu d'enfant, Joanna. Regarde-moi faire!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "Regarder quoi? Et si tu faisais dans l'efficace pour une fois, ouvre le feu!\n", + /* 83*/ "Je n'ai plus le choix... Joanna, accroche-toi, 軋 va secouer!\n", + /* 84*/ "Les pilotes ont stabilis Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_g.c b/src/files/lang/pal-beta/rit_str_g.c new file mode 100644 index 000000000..8c47bbfe5 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen, ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identenvorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrstung!\n\nFinden Sie die Ausrstung, die im Gep臘kraum im Bauch des Flugzeugs fr Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Pr舖identen um neutrale Personen handelt, denen kein Schaden zugefgt werden darf.\n\n|2. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie demPr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|4. Ziel: - Sichern Sie die Flugroute der Air Force One!\n\nGenauere Informationen ber Trents Plan sind uns nicht bekannt. Wir vermuten aber, dass sich das Flugpersonal in hchster Gefahr befindet. Gehen Sie ins Cockpit und versichern Sie sich, dass es der Crew gut geht. Im schlimmsten anzunehmenden Fall mssen Sie den Autopiloten aktivieren.\n\n|5. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identenvorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrstung!\n\nFinden Sie die Ausrstung, die im Gep臘kraum im Bauch des Flugzeugs fr Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Pr舖identen um neutrale Personen handelt, denen kein Schaden zugefgt werden darf.\n\n|2. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie demPr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|4. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identenvorlegen.\n\n|1. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie demPr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|2. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|3. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden und bergen Sie die Ausrstung!\n", + /* 6*/ "Finden Sie den Pr舖identen!\n", + /* 7*/ "Bringen Sie den Pr舖identen zur Kapsel!\n", + /* 8*/ "Sichern Sie die Flugroute!\n", + /* 9*/ "Lsen Sie die Verankerung des UFOs!\n", + /* 10*/ "Finden Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer wurde aufgenommen.\n", + /* 15*/ "Erlangen Sie die Armbrust!\n", + /* 16*/ "\n", + /* 17*/ "Armbrust\n", + /* 18*/ "Armbrust\n", + /* 19*/ "Armbrust wurde aufgenommen.\n", + /* 20*/ "Es sind zu viele neutrale Verluste zu beklagen.\n", + /* 21*/ "Verankerung wurde zerstrt.\n", + /* 22*/ "Verankerung kann nicht gelst werden.\n", + /* 23*/ "Autopilot wurde aktiviert.\n", + /* 24*/ "Der Flug der Air Force One wurde stabilisiert.\n", + /* 25*/ "Der Autopilot wurde zerstrt.\n", + /* 26*/ "Der Pr舖ident wurde schwer verletzt.\n", + /* 27*/ "Die Piloten wurden eliminiert.\n", + /* 28*/ "Die Piloten befinden sich in Sicherheit.\n", + /* 29*/ "Die Air Force One ist im Begriff, abzustrzen.\n", + /* 30*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 31*/ "\n", + /* 32*/ "Fernznder-Mine\n", + /* 33*/ "Fernznder-Mine\n", + /* 34*/ "Fernznder-Mine aufgenommen.\n", + /* 35*/ "Wer sind Sie, junge Dame?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, Sie befinden sich in Gefahr. Trent versucht, \nSie zu kidnappen.\n", + /* 38*/ "Was, zur Hlle, war das?\n", + /* 39*/ "Rasch! Wir mssen zur Fluchtkapsel. \nFolgen Sie mir!\n", + /* 40*/ "Sie knnen solche Anschuldigungen nicht vorbringen, ohne\n stichhaltige Beweise zu haben.\n", + /* 41*/ "Ich habe eine Aufzeichnung des Meetings von\nTrent und den anderen Verschwrern.\n", + /* 42*/ "Das ist mehr als berzeugend. Ich vertraue Ihnen.\nWas sollen wir jetzt tun?\n", + /* 43*/ "Hey, das ist nicht...\n", + /* 44*/ "Ein Eindringling...\n", + /* 45*/ "Wie sind Sie an Bord gekommen?\n", + /* 46*/ "Dann suchen wir mal nach dem Beweis.\n", + /* 47*/ "Das Bro des Pr舖identen befindet \nsich auf diesem Level.\n", + /* 48*/ "Irgendetwas stimmt nicht... Sie mssen zum Cockpit!\n", + /* 49*/ "Vielleicht kann das UFO mit einer Mine gelst werden.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalin-Kapsel\n", + /* 53*/ "Adrenalin-Kapsel\n", + /* 54*/ "Adrenalin-Kapsel aufgenommen.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Schlsselkarte\n", + /* 58*/ "Schlsselkarte\n", + /* 59*/ "Schlsselkarte aufgenommen.\n", + /* 60*/ "Laderaum wurde abgesenkt.\n", + /* 61*/ "Laderaum wurde angehoben.\n", + /* 62*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 63*/ "Zugriff verweigert - Aufzugs-Karte erforderlich.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Aufzugs-Karte\n", + /* 67*/ "Aufzugs-Karte\n", + /* 68*/ "Aufzugs-Karte aufgenommen.\n", + /* 69*/ "Die Zeitznder-Mine wurde ineffektiv eingesetzt.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "Jetzt kannst du ihn nicht mehr retten.\n", + /* 72*/ "Der Pr舖ident wird attackiert.\n", + /* 73*/ "Haben Sie nochmals ber meinen Vorschlag nachgedacht, Sir?\n", + /* 74*/ "Meine Antwort bleibt unver舅dert. Es tut mir leid, Trent, aber ich sage nein. Ich werde die Pelagic II nicht an dataDyne verleihen. Knnen wir uns jetzt bitte anderen Themen zuwenden?\n", + /* 75*/ "Aber das w舐e die beste Gelegenheit, um zu beweisen, dass die Regierung Vertrauen in die amerikanische Industrie hat, und...\n", + /* 76*/ "Verdammt noch mal! Wenn ich nein sage, dann meine ich nein! Ich werde meine Meinung dahingehend nicht 舅dern. Ich brauche meine Berater, um unvoreingenommen zu bleiben. In letzter Zeit haben Sie mir nicht unbedingt unparteiische Ratschl臠e erteilt. Hren Sie nun endlich damit auf. Das ist Ihre letzte Chance.\n", + /* 77*/ "Wie Sie wnschen, Sir.\n", + /* 78*/ "Meine letzte Chance? Ha! Du dummer Narr. Das war DEINE letzte Chance!\n", + /* 79*/ "Elvis! Elvis! Ich kann die Verankerung des UFOs nicht lsen! Kannst du das erledigen?\n", + /* 80*/ "Das ist ein Kinderspiel, Joanna. Pass auf und lerne!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Lerne was? Kannst du endlich mit dem Quatsch aufhren und schie゚en?\n", + /* 83*/ "Ende der Fahnenstange... Joanna, bereite dich auf den Aufprall vor!\n", + /* 84*/ "Die Piloten konnten die Air Force One stabilisieren.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_i.c b/src/files/lang/pal-beta/rit_str_i.c new file mode 100644 index 000000000..20f4d8933 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington - \n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, n tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Va col Presidente alla capsula d'emergenza\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Accerta rotta di volo Air Force One\n\nNon siamo a conoscenza dei dettagli del piano di Trent, ma riteniamo che il personale di volo sia in pericolo. Va nella cabina di pilotaggio e assicurati che stiano bene. Se accaduto l'irreparabile, attiva il pilota automatico!\n\n|Obiettivo 5: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Situazione - \n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington - \n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, n tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Va col Presidente alla capsula d'emergenza\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington - \n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 2: - Va col Presidente alla capsula d'emergenza\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 3: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Trova e recupera l'attrezzatura\n", + /* 6*/ "Localizza il Presidente\n", + /* 7*/ "Va col Presidente alla capsula d'emergenza\n", + /* 8*/ "Accerta rotta di volo Air Force One\n", + /* 9*/ "Stacca la capsula dall'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati balestra.\n", + /* 16*/ "\n", + /* 17*/ "Balestra\n", + /* 18*/ "Balestra\n", + /* 19*/ "Presa balestra.\n", + /* 20*/ "Implicate vittime civili.\n", + /* 21*/ "Danneggiato collegamento a capsula.\n", + /* 22*/ "Impossibile staccare capsula.\n", + /* 23*/ "Attivato pilota automatico.\n", + /* 24*/ "L'Air Force One stato stabilizzato.\n", + /* 25*/ "Distrutto pilota automatico.\n", + /* 26*/ "Il Presidente stato ucciso.\n", + /* 27*/ "I piloti sono stati uccisi.\n", + /* 28*/ "I piloti sono stati salvati.\n", + /* 29*/ "L'Air Force One sta per schiantarsi.\n", + /* 30*/ "Procurati mina a distanza.\n", + /* 31*/ "\n", + /* 32*/ "Mina a distanza\n", + /* 33*/ "Mina a distanza\n", + /* 34*/ "Presa mina a distanza.\n", + /* 35*/ "E lei chi sarebbe?\n", + /* 36*/ "Sicurezza, SICUREZZA!!!\n", + /* 37*/ "Signor Presidente, lei in pericolo. Trent sta \ntentando di rapirla!\n", + /* 38*/ "Come sarebbe a dire?!\n", + /* 39*/ "Dobbiamo raggiungere la capsula di salvataggio! \nMi segua!\n", + /* 40*/ "Non pu mica andare in giro a fare certe accuse \nsenza prove concrete!!! Spero che abbia \nuna valida spiegazione!\n", + /* 41*/ "Questa una registrazione della riunione \ntra Trent e gli altri cospiratori!\n", + /* 42*/ "Una prova schiacciante... Sono nelle sue mani! \nCosa dobbiamo fare?\n", + /* 43*/ "Ehi, non ...\n", + /* 44*/ "ネ un'intruso...\n", + /* 45*/ "Come diavolo sei salita a bordo?\n", + /* 46*/ "ネ ora di recuperare le prove!\n", + /* 47*/ "L'ufficio del Presidente su \nquesto piano, Joanna!\n", + /* 48*/ "C' qualcosa che non quadra... Devi andare nella cabina di pilotaggio, presto!\n", + /* 49*/ "Forse la capsula si pu staccare con una mina.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Compressa di adrenalina\n", + /* 53*/ "Compressa di adrenalina\n", + /* 54*/ "Presa compressa di adrenalina.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Tessera magnetica\n", + /* 58*/ "Tessera magnetica\n", + /* 59*/ "Presa tessera magnetica.\n", + /* 60*/ "Abbassato bagagliaio.\n", + /* 61*/ "Alzato bagagliaio.\n", + /* 62*/ "Distrutto strumento essenziale alla missione.\n", + /* 63*/ "Accesso negato - Serve tessera ascensore.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Tessera ascensore\n", + /* 67*/ "Tessera ascensore\n", + /* 68*/ "Presa tessera ascensore.\n", + /* 69*/ "La mina a orologeria stata sprecata.\n", + /* 70*/ "Ah, ah, ah , ah!!!\n", + /* 71*/ "Oramai non puoi pi salvarlo!\n", + /* 72*/ "Stanno attaccando il Presidente!!!\n", + /* 73*/ "Ha pi pensato alla proposta che le ho fatto, Signore?\n", + /* 74*/ "La mia risposta sempre la stessa, Trent! No, mi dispiace! Non metter il Pelagic II a disposizione della dataDyne. Ora possiamo cambiare argomento, per favore?\n", + /* 75*/ "Ma questa un'occasione d'oro per dimostrare che l'America ha piena fiducia nel suo tessuto industriale e che lo sostiene...\n", + /* 76*/ "Maledizione! Ho detto NO ed NO! Non mi far cambiare idea su questo punto Trent! I miei consiglieri devono essere imparziali e negli ultimi tempi non si pu propriodire che lei lo sia stato! Lasciamo perdere e dimentichiamo l'accaduto! Questa la sua ultima possibilit, Trent!\n", + /* 77*/ "Come preferisce, signor Presidente!\n", + /* 78*/ "La MIA ultima possibilit? Si sbaglia di grosso: questa era la SUA!\n", + /* 79*/ "Elvis! Elvis! Non riesco a staccare il tubo dalla fusoliera! Tu ce la fai?\n", + /* 80*/ "Elementare, Joanna. Guarda qua!\n", + /* 81*/ "Eee... hop!\n", + /* 82*/ "Guarda cosa? La vuoi piantare di giocare e sparare una buona volta?!\n", + /* 83*/ "Non abbiamo scelta... Joanna, preparati all'impatto!\n", + /* 84*/ "I piloti hanno stabilizzato l'Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_s.c b/src/files/lang/pal-beta/rit_str_s.c new file mode 100644 index 000000000..40e064de7 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, deber疽 sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avin, y tr疇lo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser daados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Cuatro: - Asegurar la Trayectoria de Vuelo del Air Force One\n\nNo se conocen los detalles especficos del plan de Trent, pero se cree que la tripulacin est en peligro. Llega hasta la cabina y asegrate de su bienestar. Si ocurre lo peor, activa el piloto autom疸ico.\n\n|Objetivo Cinco: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avin, y tr疇lo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser daados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Cuatro: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Dos: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Tres: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localizar y recuperar el equipo\n", + /* 6*/ "Localizar al Presidente\n", + /* 7*/ "Llevar al Presidente a la c疳sula\n", + /* 8*/ "Asegurar trayectora del Air Force One\n", + /* 9*/ "Separar el OVNI del Air Force One\n", + /* 10*/ "Obt駭 la Maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obt駭 la Ballesta.\n", + /* 16*/ "\n", + /* 17*/ "Ballesta\n", + /* 18*/ "Ballesta\n", + /* 19*/ "Ballesta obtenida.\n", + /* 20*/ "Has causado demasiadas bajas neutrales.\n", + /* 21*/ "Conexin del OVNI daado.\n", + /* 22*/ "Incapaz de separar el OVNI.\n", + /* 23*/ "El Piloto Autom疸ico ha sido activado.\n", + /* 24*/ "El Air Force One ha sido estabilizado.\n", + /* 25*/ "El Piloto Autom疸ico ha sido destruido.\n", + /* 26*/ "El Presidente ha sido incapacitado.\n", + /* 27*/ "Los pilotos han muerto.\n", + /* 28*/ "Los pilotos han sido salvados.\n", + /* 29*/ "El Air Force One est a punto de estrellarse.\n", + /* 30*/ "Obt駭 la mina remota.\n", + /* 31*/ "\n", + /* 32*/ "Mina remota\n", + /* 33*/ "Mina remota\n", + /* 34*/ "Mina remota obtenida.\n", + /* 35*/ "ソQui駭 es usted, jovencita?\n", + /* 36*/ "。。Seguridad, SEGURIDAD!!\n", + /* 37*/ "Sr. Presidente, est usted en peligro. Trent intenta \nsecuestrarle.\n", + /* 38*/ "。Qu demonios es eso!\n", + /* 39*/ "Debemos llevarle a la c疳sula de escape. \nSgame.\n", + /* 40*/ "No puede hacer acusaciones como 駸a sin evidencias.\n ソAsumo que tendr alguna?\n", + /* 41*/ "Esta es una grabacin de una reunin entre \nTrent y los otros conspiradores.\n", + /* 42*/ "Parece abrumador... Estoy en sus manos. \nソQu hacemos ahora?\n", + /* 43*/ "Hey, eso no es...\n", + /* 44*/ "Es un intruso...\n", + /* 45*/ "ソCmo ha subido a bordo?\n", + /* 46*/ "Ahora, recuperemos la evidencia.\n", + /* 47*/ "La habitacin del Presidente est en \neste nivel, Joanna.\n", + /* 48*/ "Algo va mal... 。Debes llegar a la cabina!\n", + /* 49*/ "Quiz una mina separe el OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pastilla de Adrenalina\n", + /* 53*/ "Pastilla de Adrenalina\n", + /* 54*/ "Pastilla de Adrenalina obtenida.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Llave magn騁ica\n", + /* 58*/ "Llave magn騁ica \n", + /* 59*/ "Llave magn騁ica obtenida.\n", + /* 60*/ "La baha de carga ha sido bajada.\n", + /* 61*/ "La baha de carga ha sido subida.\n", + /* 62*/ "Objeto crtico de la misin destruido.\n", + /* 63*/ "Acceso denegado: llave magn騁ica del ascensor requerida.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Llave magn騁ica del ascensor\n", + /* 67*/ "Llave magn騁ica del ascensor \n", + /* 68*/ "Llave magn騁ica del ascensor obtenida.\n", + /* 69*/ "La mina de tiempo ha sido desperdiciada.\n", + /* 70*/ "Ja, ja, ja, ja, ja.\n", + /* 71*/ "Ahora ya no podr疽 salvarle.\n", + /* 72*/ "Est疣 atacando al Presidente.\n", + /* 73*/ "ソHa reconsiderado algo m疽 la propuesta que le hice, seor?\n", + /* 74*/ "Mi respuesta es la misma: lo siento, Trent, pero no. No quiero prestar el Pelagic II a dataDyne. Por favor, ソpodemos ahora tratar otras cuestiones?\n", + /* 75*/ "Pero esta es una oportunidad de oro para demostrar que Am駻ica tiene fe en sus industrias y que las apoya...\n", + /* 76*/ "。Maldicin! 。He dicho no y significa no! 。No pienso cambiar de opinin! Necesito que mis asesores sean imparciales, y ahora no me est疽 dando la imparcialidad que necesito. D駛alo, y no hablemos m疽 de ello. Es tu ltima oportunidad.\n", + /* 77*/ "Como quiera, seor.\n", + /* 78*/ "ソMi ltima oportunidad? 。Ja! Idiota. Fue la tuya...\n", + /* 79*/ "。Elvis! 。Elvis! 。No puedo soltar ese tubo del fuselaje! ソPuedes hacerlo t?\n", + /* 80*/ "Pan comido, Joanna. 。Mira esto!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "ソMirar, qu? ソQuieres dejar de juguetear? 。Dispara!\n", + /* 83*/ "No hay m疽 opciones... 。Joanna, prep疵ate para el impacto!\n", + /* 84*/ "Los pilotos han estabilizado el Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/runE.c b/src/files/lang/pal-beta/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/runJ.c b/src/files/lang/pal-beta/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/runP.c b/src/files/lang/pal-beta/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_f.c b/src/files/lang/pal-beta/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_g.c b/src/files/lang/pal-beta/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_i.c b/src/files/lang/pal-beta/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_s.c b/src/files/lang/pal-beta/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevE.c b/src/files/lang/pal-beta/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-beta/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevJ.c b/src/files/lang/pal-beta/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/pal-beta/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevP.c b/src/files/lang/pal-beta/sevP.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-beta/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_f.c b/src/files/lang/pal-beta/sev_str_f.c new file mode 100644 index 000000000..9fff9ccaa --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur Maian UN (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Saboter le labo d'exp駻imentation ennemi\n\nDes exp駻iences sont conduites sur le corps de l'ambassadeur. Je dois mener bien ma t稍he de Protecteur, pour cela je dois d騁ruire ce corps.\n\n|Objectif 2: - D騁ruire le vaisseau maian captur饅n\nMon dernier objectif sera de d騁ruire les restes du vaisseau avec lequel je suis arriv sur Terre. Si quelqu'un d馗ouvre la ressemblance entre nos technologies et celles de l'Institut Carrington nos alli駸 seront en danger et j'aurai 馗hou dans ma mission.\n\n|Objectif 3: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 1*/ "SECTEUR 51, NEVADA, TERRE\n", + /* 2*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur Maian UN (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Saboter le labo d'exp駻imentation ennemi\n\nDes exp駻iences sont conduites sur le corps de l'ambassadeur. Je dois mener bien ma t稍he de Protecteur, pour cela je dois d騁ruire ce corps.\n\n|Objectif 2: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur Maian UN (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 4*/ "Saboter labo de tests\n", + /* 5*/ "D騁ruire vaisseau maian captur饅n", + /* 6*/ "Activer le signal de d騁resse\n", + /* 7*/ "Labo de tests sabot.\n", + /* 8*/ "Vaisseau maian captur d騁ruit.\n", + /* 9*/ "Signal de d騁resse activ.\n", + /* 10*/ "Objet crucial d騁ruit.\n", + /* 11*/ "Mission 馗hou馥 - impossible de quitter labo de tests.\n", + /* 12*/ "Voie de sortie alternative activ馥.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_g.c b/src/files/lang/pal-beta/sev_str_g.c new file mode 100644 index 000000000..7a92d4f8f --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nNotfall-Aufzeichnung aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibenden Ausrstungsgegenst舅de, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, fr die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Krper Experimente durchgefhrt werden. Um meine Pflicht als Maianischer Protektor zu erfllen, muss ich dafr Sorge tragen, dass der Krper zerstrt wird.\n\n|2. Ziel: - Zerstren Sie das Maianische Schiff!\n\nMein letzter Akt der Pflichterfllung besteht darin, das Schiff, mit dem ich die Erde erreicht habe, zu zerstren. Sollte irgendjemand feststellen, dass die sich an Bord befindliche Technologie der des Carrington Instituts 臧nlich ist, geraten unsere Verbndeten auf der Erde in Gefahr, und meine Mission ist gescheitert.\n\n|3. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 1*/ "AREA 51, NEVADA, ERDE\n", + /* 2*/ "|Hintergrund - \n\nNotfall-Aufzeichnung aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibenden Ausrstungsgegenst舅de, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, fr die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Krper Experimente durchgefhrt werden. Um meine Pflicht als Maianischer Protektor zu erfllen, muss ich dafr Sorge tragen, dass der Krper zerstrt wird.\n\n|2. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nNotfall-Aufzeichnung aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibenden Ausrstungsgegenst舅de, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 4*/ "Sabotieren Sie das Experiment!\n", + /* 5*/ "Zerstren Sie das Maianische Schiff!\n", + /* 6*/ "Senden Sie ein Notsignal!\n", + /* 7*/ "Medizinisches Experiment wurde sabotiert.\n", + /* 8*/ "Das Maianische Schiff wurde zerstrt.\n", + /* 9*/ "Notsignal wurde gesendet.\n", + /* 10*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 11*/ "MISSION FEHLGESCHLAGEN - Flucht ist nicht mehr mglich.\n", + /* 12*/ "Es wurde eine alternative Fluchtroute gefunden.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_i.c b/src/files/lang/pal-beta/sev_str_i.c new file mode 100644 index 000000000..94e0f0719 --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Elimina la navicella Maian sequestrata\n\nL'ultimo mio dovere sar quello di distruggere quel che rimane della navicella Maian con cui sono arrivato sulla Terra. Se qualcuno scoprisse che la tecnologia di costruzione simile a quella delle 'invenzioni' del Carrington Institute, i nostri alleati sulla Terra sarebbero in grave pericolo e io avrei fallito la mia missione.\n\n|Obiettivo 3: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stesso.\n\nFINE\n", + /* 1*/ "AREA 51, NEVADA, TERRA\n", + /* 2*/ "|Situazione - \n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stesso.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stesso.\n\nFINE\n", + /* 4*/ "Sabotaggio esperimento medico nemico\n", + /* 5*/ "Elimina la navicella Maian sequestrata\n", + /* 6*/ "Invia segnale di pericolo\n", + /* 7*/ "L'esperimento medico stato sabotato.\n", + /* 8*/ "La navicella Maian stata distrutta.\n", + /* 9*/ "Il segnale di pericolo stato inviato.\n", + /* 10*/ "Distrutto strumento essenziale alla missione.\n", + /* 11*/ "Missione fallita - Impossibile uscire dal laboratorio\n", + /* 12*/ "Trovata via di fuga alternativa.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_s.c b/src/files/lang/pal-beta/sev_str_s.c new file mode 100644 index 000000000..bae650920 --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento M馘ico Enemigo\n\nEst疣 experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme de que el cuerpo es destruido.\n\n|Objetivo Dos: - Destruir la Nave Maian capturada\n\nMi ltimo acto y mi deber ser destruir lo que queda del vehculo en el que llegu a la Tierra. Si alguien descubre que su tecnologa es similar a la de las 'invenciones' del Instituto Carrington, nuestros aliados terrcolas estar疣 en peligro, y habremos fallado.\n\n|Objetivo Tres: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 1*/ "チREA 51, NEVADA, TIERRA\n", + /* 2*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento M馘ico Enemigo\n\nEst疣 experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme que el cuerpo es destruido.\n\n|Objetivo Dos: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 4*/ "Sabotear experimento m馘ico enemigo\n", + /* 5*/ "Destruir platillo Maian capturado\n", + /* 6*/ "Activar la seal de socorro\n", + /* 7*/ "El experimento m馘ico ha sido saboteado.\n", + /* 8*/ "El platillo Maian ha sido destruido.\n", + /* 9*/ "La seal de socorro ha sido enviada.\n", + /* 10*/ "Objeto crtico de la misin ha sido destruido.\n", + /* 11*/ "Misin fallada: no puedes escapar del laboratorio.\n", + /* 12*/ "Ruta de escape alternativa encontrada.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevbE.c b/src/files/lang/pal-beta/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevbJ.c b/src/files/lang/pal-beta/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevbP.c b/src/files/lang/pal-beta/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_f.c b/src/files/lang/pal-beta/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_g.c b/src/files/lang/pal-beta/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_i.c b/src/files/lang/pal-beta/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_s.c b/src/files/lang/pal-beta/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevxE.c b/src/files/lang/pal-beta/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxJ.c b/src/files/lang/pal-beta/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxP.c b/src/files/lang/pal-beta/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_f.c b/src/files/lang/pal-beta/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_g.c b/src/files/lang/pal-beta/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_i.c b/src/files/lang/pal-beta/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_s.c b/src/files/lang/pal-beta/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxbE.c b/src/files/lang/pal-beta/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxbJ.c b/src/files/lang/pal-beta/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxbP.c b/src/files/lang/pal-beta/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_f.c b/src/files/lang/pal-beta/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_g.c b/src/files/lang/pal-beta/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_i.c b/src/files/lang/pal-beta/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_s.c b/src/files/lang/pal-beta/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/shoE.c b/src/files/lang/pal-beta/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-beta/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/shoJ.c b/src/files/lang/pal-beta/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/pal-beta/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/shoP.c b/src/files/lang/pal-beta/shoP.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-beta/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_f.c b/src/files/lang/pal-beta/sho_str_f.c new file mode 100644 index 000000000..a8a666c2d --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion Skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situ la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna - Je veux que vous posiez des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlacez une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilisez un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, nous pouvons seulement garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Acc馘er au Centre du Sanctuaire\n\nTu dois parcourir et explorer le d馘ale de corridors pour trouver le Sanctuaire. Tu va certainement te heurter une r駸istance acharn馥. Tu va te d駱lacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Eliminer l'arm馥 Skedar\n\nLe haut commandement Maian pense que des soldats Skedars sont gard駸 dans des champs de stase l'int駻ieur de cette installation. Si cela est vrai, il faudra les d騁ruire. La derni鑽e chose dont nous avons besoin c'est une arm馥 de fanatiques psychotiques.\n\n|Objectif 5: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 1*/ "AUTEL DE BATAILLE SKEDAR\n", + /* 2*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion Skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes skedars se cache dans un Temple de la guerre plac la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna - Je veux que vous marquiez des parties du Temple pour guider un bombardement strat馮ique. De plus je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlacez une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilisez un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, je peux seulement vous garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Acc馘er au centre du Sanctuaire\n\nTu dois parcourir et explorer le d馘ale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter une r駸istance acharn馥. Tu vas te d駱lacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion Skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situ la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna - Je veux que vous marquiez des parties du temple pour guider un bombardement strat馮ique. De plus je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlacez une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilisez un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, je peux seulement vous garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Identifier les cibles du Temple\n", + /* 6*/ "Activer le pont\n", + /* 7*/ "Acc馘er au centre du sanctuaire\n", + /* 8*/ "D騁ruire l'arm馥 secr鑼e Skedar\n", + /* 9*/ "Assassiner le chef des Skedars\n", + /* 10*/ "Obtenir Vision nocturne.\n", + /* 11*/ "\n", + /* 12*/ "Vision nocturne\n", + /* 13*/ "Vision nocturne\n", + /* 14*/ "Vison nocturne obtenue.\n", + /* 15*/ "Obtenir scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner obtenu.\n", + /* 20*/ "Obtenir Amplificateur cible.\n", + /* 21*/ "\n", + /* 22*/ "Amplificateur cible\n", + /* 23*/ "Amplificateur cible\n", + /* 24*/ "Amplificateur cible obtenu.\n", + /* 25*/ "Amplificateur cible positionn correctement.\n", + /* 26*/ "Amplificateur cible mal positionn.\n", + /* 27*/ "G駭駻ateur activ.\n", + /* 28*/ "Centre du sanctuaire Skedar atteint.\n", + /* 29*/ "Arm馥 secr鑼e Skedar d騁ruite.\n", + /* 30*/ "Ca ressemble un des piliers que je suis cens馥 trouver.\n", + /* 31*/ "Cette zone est plus stable.\nLe sanctuaire doit 黎re proche.\n", + /* 32*/ "OH, NON!!! Une arm馥 Skedar en animation suspendue!\n", + /* 33*/ "Tr鑚 bien, il faut trancher la t黎e...le reste p駻ira lentement.\n", + /* 34*/ "Voici le saint des saints des fanatiques skedars. Ils pensent que cette plan鑼e est sacr馥. L'Autel de Bataille est le lieu le plus v駭駻 de cette plan鑼e.\n", + /* 35*/ "Je vois. Cet endroit est sacr pour eux. Mais ce n'est pas tout, il y a autre chose, n'est-ce pas?", + /* 36*/ "En effet. Depuis le temps que les Maians se battent contre les Skedars, nous n'avons jamais pu trouver cet endroit. Sa destruction est la cl de la victoire. Nous avons combattu jusqu' obtenir un cessez-le-feu, mais nous avons toujours 騁 sur nos gardes. La destruction de cet endroit pourra enfin donner une chance la paix.\n", + /* 37*/ "Nous devons 黎re certains qu'aucun fanatique ne survivra. Je vais m'occuper du chef. Il faudra que tu pr駱are l'armada maian pour pulv駻iser ce satan temple.\n", + /* 38*/ "Il faudra que tu t'enfuies avant les bombardements, nous n'allons pas faire dans le d騁ail.\n", + /* 39*/ "Je ne compte pas vraiment m'騁erniser.\n", + /* 40*/ "Ouiii...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Par ici.\n", + /* 43*/ "Pas de probl鑪e. Attrape mon bras. On va te sortir de l.\n", + /* 44*/ "Non, vite! Donne-moi une arme!\n", + /* 45*/ "Fous le camp!\n", + /* 46*/ "J'ai r騏ssi retarder le bombardement, la flotte est en attente. Ils vont commencer d鑚 que nous serons partis.\n", + /* 47*/ "Je m'en serais tir馥 si ce gros lourdaud ne m'avait pas attrap le pied.\n", + /* 48*/ "J'en suis sr, Joanna, j'en suis sr.\n", + /* 49*/ "Non, je te dis que je l'aurais fait.\n", + /* 50*/ "Mais je te crois.\n", + /* 51*/ "Fais tes pri鑽es au dieu de la guerre.\n", + /* 52*/ "Plus de grenades - Impossible d'entrer dans le Temple.\n", + /* 53*/ "Autre acc鑚 au Temple cr鳬.\n", + /* 54*/ "O es-tu? Tout va bien?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_g.c b/src/files/lang/pal-beta/sho_str_g.c new file mode 100644 index 000000000..16de7b3b2 --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth fhrt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gl舫big.\n\n|4. Ziel: - Vernichten Sie die geheime Skedar-Armee!\n\nDas Hohe Kommando der Maianer vermutet, dass eine gro゚e Anzahl von sich in Stasis befindlichen Skedar an geheimen Orten untergebracht ist. DerSchrein knnte einer dieser Orte sein. Wenn das der Fall ist, muss er zerstrt werden. Das Letzte, was wir jetzt brauchen knnen, ist ein nicht enden wollender Strom von psychotischen Fanatikern.\n\n|5. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth fhrt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gl舫big.\n\n|4. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt habe, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Identifizieren Sie die Ziele!\n", + /* 6*/ "Aktivieren Sie die Brcke!\n", + /* 7*/ "Gelangen Sie in den inneren Bereich!\n", + /* 8*/ "Vernichten Sie die geheime Armee!\n", + /* 9*/ "Eliminieren Sie den Anfhrer!\n", + /* 10*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 11*/ "\n", + /* 12*/ "Nachtsichtger舩\n", + /* 13*/ "Nachtsichtger舩\n", + /* 14*/ "Nachtsichtger舩 aufgenommen.\n", + /* 15*/ "Erlangen Sie den Scanner!\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner aufgenommen.\n", + /* 20*/ "Erlangen Sie das Peilger舩!\n", + /* 21*/ "\n", + /* 22*/ "Peilger舩\n", + /* 23*/ "Peilger舩\n", + /* 24*/ "Peilger舩 aufgenommen.\n", + /* 25*/ "Peilger舩 wurde korrekt platziert.\n", + /* 26*/ "Peilger舩 wurde nicht korrekt platziert.\n", + /* 27*/ "Generator wurde reaktiviert.\n", + /* 28*/ "Der innere Bereich des Schreins wurde erreicht.\n", + /* 29*/ "Die geheime Skedar-Armee wurde vernichtet.\n", + /* 30*/ "Das scheint eine der drei S舫len zu sein.\n", + /* 31*/ "Die Stromversorgung in diesem Bereich wird immer konstanter.\nDer innere Bereich kann nicht weit entfernt sein.\n", + /* 32*/ "OH NEIN!!! Die geheime Armee befindet sich tats臘hlich in dem Schrein!\n", + /* 33*/ "Okay, es muss sein... Wenn der Kopf abgeschnitten wird, \nstirbt auch der Krper.\n", + /* 34*/ "Dies ist der heiligste Ort der Skedar. Der Planet scheint ihr heiliges Landzu sein. Der Schrein befindet sich amheiligsten Ort dieses heiligen Planeten.\n", + /* 35*/ "Lass mich mal resmieren: Hier ist es heilig. Aber das kann noch nicht alles sein, oder?\n", + /* 36*/ "Stimmt. In all der Zeit, in der die Maianer gegen die Skedar gek舂pft haben, konnten wir diesen Ort nicht ausfindig machen. Wir wussten, dass, solange dieser Ort besteht, der Krieg niemals enden wrde. Zwar konnten wir einen Waffenstillstand erzielen, mussten aber trotzdem stets wachsam sein. Die Zerstrung des Schreins w舐e eine Chance, wieder Frieden zu erlangen.\n", + /* 37*/ "Also mssen wir dafr sorgen, dass kein Skedar berlebt. Ich gehe rein und kmmere mich um den Anfhrer, und du koordinierst inzwischen den Angriff der Maianischen Flotte.\n", + /* 38*/ "Aber wenn du nicht rechtzeitig von dort ver- schwindest, hast du keine Chance.\n", + /* 39*/ "Das ist ein Fehler, den ich nicht begehen werde.\n", + /* 40*/ "Jaaa...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Hier drben!\n", + /* 43*/ "OK! Halt dich an mir fest! Wir bringen dich sofort hier raus.\n", + /* 44*/ "Nein! Rasch! Gib mir eine Waffe!\n", + /* 45*/ "Lass! Mich! Endlich! In! Frieden!!!\n", + /* 46*/ "Ich konnte das Bombardement der Flotte einstellen, um nach dir zu suchen. Der Angriff geht weiter, wenn wir hier raus sind.\n", + /* 47*/ "Ich h舩te es rechtzeitig geschafft, wenn mich der Kerl hier nicht erwischt h舩te.\n", + /* 48*/ "Natrlich, Joanna, natrlich.\n", + /* 49*/ "Ich h舩te es geschafft!\n", + /* 50*/ "Ich glaube dir.\n", + /* 51*/ "Bring dem Gott des Krieges dein Opfer dar!\n", + /* 52*/ "Granaten verbraucht - Zutritt unmglich.\n", + /* 53*/ "Es wurde ein alternativer Eingang erschaffen.\n", + /* 54*/ "Wo bist du? Bist du verletzt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_i.c b/src/files/lang/pal-beta/sho_str_i.c new file mode 100644 index 000000000..82a8bc767 --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi, che stato danneggiato ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Distruggi l'esercito segreto Skedar \n\nIl Comandante Supremo Maian sospetta la presenza di altri guerrieri Skedar conservati in stasi in luoghi a noi ignoti e questo potrebbe essere uno di quelli, perci lo dovrai distruggere. L'ultima cosa di cui abbiamo bisogno ora un'orda di fanatici psicotici.\n\n|Obiettivo 5: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente regner la pace!\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA SKEDAR\n", + /* 2*/ "|Situazione - \n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi, che stato danneggiato ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sar la pace!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi, che stato danneggiato ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sar la pace!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Identifica gli obiettivi nel tempio\n", + /* 6*/ "Attiva il ponte retrattile\n", + /* 7*/ "Trova l'accesso al Santuario Interno\n", + /* 8*/ "Distruggi l'esercito segreto Skedar\n", + /* 9*/ "Elimina il capo degli Skedar\n", + /* 10*/ "Procurati Vista Notturna.\n", + /* 11*/ "\n", + /* 12*/ "Vista Notturna\n", + /* 13*/ "Vista Notturna\n", + /* 14*/ "Presa Vista Notturna.\n", + /* 15*/ "Procurati scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Preso scanner.\n", + /* 20*/ "Procurati bersaglio.\n", + /* 21*/ "\n", + /* 22*/ "Bersaglio\n", + /* 23*/ "Bersaglio\n", + /* 24*/ "Preso bersaglio.\n", + /* 25*/ "Bersaglio piazzato correttamente.\n", + /* 26*/ "Bersaglio in posizione errata.\n", + /* 27*/ "Il generatore stato riattivato.\n", + /* 28*/ "Raggiunto Santuario Interno Skedar.\n", + /* 29*/ "Distrutto esercito segreto Skedar.\n", + /* 30*/ "Questo sembra uno degli obelischi.\n", + /* 31*/ "Qui il campo energetico sembra pi costante. \nIl Santuario Interno non pu essere lontano.\n", + /* 32*/ "OH, NO!!! Un esercito Skedar in stato di morte apparente!\n", + /* 33*/ "Benissimo, ecco fatto! Mozzandogli il capo \nil corpo morir!\n", + /* 34*/ "Questo il luogo pi SACRO per quei fanatici degli Skedar! Credono che questo pianeta sia SACRO ed inviolabile. Il Tempio di Guerra si trova nella parte pi SACRA di questo pianeta SACRO!\n", + /* 35*/ "Fammi capire bene... Ma, allora SACRO! Per c' anche dell'altro, vero?\n", + /* 36*/ "S! In tutto il tempo che noi Maian abbiamo lottato contro gli Skedar non siamo mai riusciti a scoprire questo posto. Sapevamo che la guerra non sarebbe mai finita finch non fosse stato distrutto: abbiamo costretto gli Skedar a una tregua, li abbiamo piegati a cessare il fuoco, ma comunque non potevamo mai abbassare la guardia. La distruzione di questo posto implicher una pace vera! \n", + /* 37*/ "Allora dobbiamo accertarci che non ci sfugga nessun fanatico: io entro e porto fuori il capo; tu chiami a raccolta la flotta Maian per radere al suolo il tempio!\n", + /* 38*/ "Se ti trovi ancora in giro quando fa irruzione la flotta, non avrai pi possibilit di salvezza!\n", + /* 39*/ "ネ un errore che intendo evitare!\n", + /* 40*/ "Proprio cos...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Da questa parte!\n", + /* 43*/ "Nessun problema! Afferra il mio braccio! Ti tireremo fuori in un batter d'occhio!\n", + /* 44*/ "No, presto! Dammi la pistola!\n", + /* 45*/ "VUOI LASCIARMI ANDARE?! PER LA MISERIA?!!\n", + /* 46*/ "La flotta ha interrotto il bombardamento per darmi il tempo di trovarti. Andranno avanti non appena saremo fuori di qui!\n", + /* 47*/ "Sarei riuscita a svignarmela in tempo, se quello non mi si fosse aggrappato al piede!\n", + /* 48*/ "Ma certo, Joanna, naturalmente!\n", + /* 49*/ "No, veramente!!!\n", + /* 50*/ "S, s, ti credo!\n", + /* 51*/ "Compi il tuo sacrificio in onore del Dio della Guerra.\n", + /* 52*/ "Granate esaurite - Impossibile entrare nel tempio.\n", + /* 53*/ "Creata entrata alternativa al tempio.\n", + /* 54*/ "Dove sei? Sei ferita?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_s.c b/src/files/lang/pal-beta/sho_str_s.c new file mode 100644 index 000000000..7aed90ab8 --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos en el Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca a trav駸 del laberinto de corredores subterr疣eos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fan疸ica. ノste es un templo a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Destruir el Ej駻cito Secreto Skedar\n\nEl Alto Comando Maian sospecha que m疽 guerreros Skedar est疣 en estado de hibernacin en lugares desconocidos. ノste puede ser uno de esos lugares. Si as es, destryelos. La ltima cosa que necesitamos es enfrentarnos a una oleada de refuerzos sicticos.\n\n|Objetivo Cinco: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca en el laberinto de corredores subterr疣eos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fan疸ica. ノste es un templo dedicado a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Posicionar blancos del templo\n", + /* 6*/ "Activar el puente\n", + /* 7*/ "Acceder al Interior Sacro\n", + /* 8*/ "Destruir ej駻cito secreto Skedar\n", + /* 9*/ "Eliminar al lder Skedar\n", + /* 10*/ "Obt駭 la Visin Nocturna.\n", + /* 11*/ "\n", + /* 12*/ "Visin Nocturna\n", + /* 13*/ "Visin Nocturna\n", + /* 14*/ "Visin Nocturna obtenida.\n", + /* 15*/ "Obt駭 el Esc疣er.\n", + /* 16*/ "\n", + /* 17*/ "Esc疣er\n", + /* 18*/ "Esc疣er\n", + /* 19*/ "Esc疣er obtenido.\n", + /* 20*/ "Obt駭 el Amplificador de Blancos.\n", + /* 21*/ "\n", + /* 22*/ "Amplificador\n", + /* 23*/ "Amplificador\n", + /* 24*/ "Amplificador de Blancos obtenido.\n", + /* 25*/ "Amplificador colocado correctamente.\n", + /* 26*/ "Amplificador colocado incorrectamente.\n", + /* 27*/ "El Generador ha sido reactivado.\n", + /* 28*/ "El Interior Sacro Skedar ha sido alcanzado.\n", + /* 29*/ "El ej駻cito secreto Skedar ha sido derrotado.\n", + /* 30*/ "ノste parece ser uno de los pilares especiales.\n", + /* 31*/ "La energa es m疽 constante en este 疵ea. \nEl Interior Sacro no puede estar muy lejos.\n", + /* 32*/ "。。。OH, NO!!! 。Un ej駻cito Skedar en animacin suspendida!\n", + /* 33*/ "Vale, entonces... Cort駑osle la cabeza y el \ncuerpo perecer.\n", + /* 34*/ "ノste es el lugar m疽 sagrado de los fan疸icos Skedar. Ellos creen que este planeta es tierra sagrada. El Templo de Batalla est situado en la parte m疽 sagrada de este 'santo' planeta.\n", + /* 35*/ "A ver si me aclaro. Es sagrado, ソno? Pero hay bastante m疽 que eso, ソno es as?\n", + /* 36*/ "S. En todo el tiempo que los Maian hemos luchado contra los Skedar, no encontramos este lugar. Sabamos que hasta que no fuera destruido, la guerra no terminara. Luchamos con los Skedar hasta llegar a un punto muerto donde obtuvimos un alto el fuego, pero hay que estar en guardia. La destruccin de este lugar puede significar una paz verdadera.\n", + /* 37*/ "As que tenemos que asegurarnos de que ningn fan疸ico sobreviva. Entrar a por el lder. Tu tienes que traer a la flota Maian para derribar el Templo.\n", + /* 38*/ "Si est疽 en tierra cuando la flota llegue aqu, no tendr疽 ninguna oportunidad.\n", + /* 39*/ "ノse es un error que no pienso cometer.\n", + /* 40*/ "Siiii...\n", + /* 41*/ "。Joanna! 。Joanna! \n", + /* 42*/ "。Elvis! 。Elvis! Aqu.\n", + /* 43*/ "Ningn problema. Ag疵rate a mis brazos. Te sacar enseguida.\n", + /* 44*/ "。No, r疳ido! 。Dame tu arma!\n", + /* 45*/ "。Quieres! 。Soltarme! 。De! 。Una! 。Vez!\n", + /* 46*/ "He podido detener el bombardeo de la flota mientras te buscaba. Empezar疣 de nuevo cuando estemos a salvo.\n", + /* 47*/ "Hubiera salido a tiempo si ese m... no me hubiera cogido del pie.\n", + /* 48*/ "Por supuesto, Joanna, por supuesto.\n", + /* 49*/ "No, de verdad.\n", + /* 50*/ "Te creo.\n", + /* 51*/ "Haz tu sacrificio al Dios de la Guerra.\n", + /* 52*/ "Granadas utilizadas. No puedes entrar al Templo.\n", + /* 53*/ "Creada entrada alternativa al Templo.\n", + /* 54*/ "ソDnde est疽? ソEst疽 herida?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/siloE.c b/src/files/lang/pal-beta/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/siloJ.c b/src/files/lang/pal-beta/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/siloP.c b/src/files/lang/pal-beta/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_f.c b/src/files/lang/pal-beta/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_g.c b/src/files/lang/pal-beta/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_i.c b/src/files/lang/pal-beta/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_s.c b/src/files/lang/pal-beta/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/statE.c b/src/files/lang/pal-beta/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-beta/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/statJ.c b/src/files/lang/pal-beta/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/pal-beta/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/statP.c b/src/files/lang/pal-beta/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-beta/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_f.c b/src/files/lang/pal-beta/stat_str_f.c new file mode 100644 index 000000000..798cdc560 --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi Skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi Skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'arm馥 skedar.\n\n|Objectif 2: - R馮icide Acte deux\n\nIl y a un autre clone! Un d馭aut de fonctionnement des cuves g駭itrices a provoqu l'activation simultan馥 de deux Rois Skedar. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son fr鑽e. Une fois que vous l'aurez d騁ruit, la menace sera 馗art馥.\n\n|Objectif 3: - R馮icide Acte trois\n\nPardon, d駸ol, Il y a un troisi鑪e Roi. Nos d騁ecteurs n'ont pu le rep駻er auparavant en raison de fortes perturbations dues aux bombardements massifs de la flotte. Ce Roi est mieux pr駱ar que les deux autres, il est imp駻atif qu'il soit 駘imin dans les plus brefs d駘ais. D駱鹹hez-vous, il ne faut pas qu'il rassemble ses arm馥s.\n\nFIN\n", + /* 1*/ "AUTEL DE COMBAT\n", + /* 2*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi Skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi Skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'arm馥 skedar.\n\n|Objectif 2: - R馮icide Acte deux\n\nIl y a un autre clone! Un d馭aut de fonctionnement des cuves g駭itrices a provoqu l'activation simultan馥 de deux Rois Skedar. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son fr鑽e. Une fois que vous l'aurez d騁ruit, la menace sera 馗art馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi Skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi Skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne regroupe les restes de l'arm馥 Skedar.\n\nFIN\n", + /* 4*/ "Tuer Roi Skedar\n", + /* 5*/ "Tuer Roi Skedar 2\n", + /* 6*/ "Tuer Roi Skedar 3\n", + /* 7*/ "Le Dirigeant maian a 騁 tu.\n", + /* 8*/ "Le Roi Skedar a 騁 tu.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_g.c b/src/files/lang/pal-beta/stat_str_g.c new file mode 100644 index 000000000..ca69f207e --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Knigsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Beh舁ter hat dazu gefhrt, dass zwei Knige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gef臧rlicher ist. Wird er eliminiert, ist die Bedrohung vorber.\n\n|3. Ziel: - Knigsmord Teil Drei\n\nEs tut uns leid, aber es sieht so aus, als g臙e es noch einen dritten Knig. Aufgrund der starken Interferenzen nach dem Bombardement, konnten ihn unsere Scanner nicht erfassen. Dieser Knig konnte sich noch weiter entwickeln, als die beiden anderen. Das bedeutet, dass er noch gef臧rlicher ist. Die Notwendigkeit, ihn zu eliminieren, ist daher noch gr゚er.\n\nENDE\n", + /* 1*/ "KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Knigsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Beh舁ter hat dazu gefhrt, dass zwei Knige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gef臧rlicher ist. Wird er eliminiert, ist die Bedrohung vorber.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\nENDE\n", + /* 4*/ "Vernichten Sie den Skedar-Knig!\n", + /* 5*/ "Vernichten Sie den Skedar-Knig 2!\n", + /* 6*/ "Vernichten Sie den Skedar-Knig 3!\n", + /* 7*/ "Der Maianische Anfhrer wurde eliminiert.\n", + /* 8*/ "Der Skedar-Knig wurde eliminiert.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_i.c b/src/files/lang/pal-beta/stat_str_i.c new file mode 100644 index 000000000..b15bb9ff6 --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto pi tempo per ambientarsi e per questo motivo anche pi pericoloso. Una volta che lo avrai eliminato la minaccia non sussister pi.\n\n|Obiettivo 3: - Regicidio - Parte terza\n\nMi rincresce doverti comunicare che esiste un terzo clone del re. I nostri scanner hanno incontrato difficolt nel riconoscerlo a causa delle forti interferenze della superficie dovute alla veemenza dei bombardamenti. Attenzione questo re pi pericoloso degli altri due! ネ pertanto di vitale importanza che venga soppresso al pi presto.\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA\n", + /* 2*/ "|Situazione - \n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto pi tempo per ambientarsi e per questo motivo anche pi pericoloso. Una volta che lo avrai eliminato la minaccia non al pi presto.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra al pi presto.\n\nFINE\n", + /* 4*/ "Uccidi il re degli Skedar\n", + /* 5*/ "Uccidi il 2ー re degli Skedar\n", + /* 6*/ "Uccidi il 3ー re degli Skedar\n", + /* 7*/ "Il capo dei Maian stato ucciso.\n", + /* 8*/ "Il re degli Skedar stato ucciso.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_s.c b/src/files/lang/pal-beta/stat_str_s.c new file mode 100644 index 000000000..4aaf6f579 --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n。Hay otro clon! Un fallo en los tanques de clonacin Skedar hizo que dos Reyes fueran activados al mismo tiempo. ノste ha tenido m疽 tiempo para aclimatarse, por lo tanto es m疽 peligroso. Una vez sea destruido, la amenaza habr terminado.\n\n|Objetivo Tres: - Regicidio Parte Tres\n\nPerdn, perdn... Parece que existe un tercer Rey. Nuestros esc疣eres han tenido problemas de deteccin debido a la enorme cantidad de perturbaciones causadas por el bombardeo de la flota. A causa de ello, este Rey est m疽 preparado que los otros dos; esto hace que sea vital que el Rey sea destruido.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA\n", + /* 2*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n。Hay otro clon! Un fallo en los tanques de clonacin Skedar hizo que dos Reyes fueran activados al mismo tiempo. ノste ha tenido m疽 tiempo para aclimatarse, por lo tanto es m疽 peligroso. Una vez sea destruido, la amenaza habr terminado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\nFIN\n", + /* 4*/ "Eliminar al Rey Skedar.\n", + /* 5*/ "Eliminar al Rey Skedar 2.\n", + /* 6*/ "Eliminar al Rey Skedar 3.\n", + /* 7*/ "El lder Maian ha muerto.\n", + /* 8*/ "El Rey Skedar ha muerto.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/titleE.c b/src/files/lang/pal-beta/titleE.c new file mode 100644 index 000000000..561257e86 --- /dev/null +++ b/src/files/lang/pal-beta/titleE.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/titleJ.c b/src/files/lang/pal-beta/titleJ.c new file mode 100644 index 000000000..a796fe944 --- /dev/null +++ b/src/files/lang/pal-beta/titleJ.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons animator\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "(is watching)\n", + /* 15*/ "b jones\n", + /* 16*/ "(unknown purpose)\n", + /* 17*/ "steve malpass\n", + /* 18*/ "edge wrangler\n", + /* 19*/ "brian marshall\n", + /* 20*/ "code janitor\n", + /* 21*/ "russell irwin\n", + /* 22*/ "pak man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "pad jockey\n", + /* 25*/ "ross bury\n", + /* 26*/ "pixel pusher\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonsz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "background artist\n", + /* 35*/ "additional\n", + /* 36*/ "dean smith\n", + /* 37*/ "kevin bayliss\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "lee musgrave\n", + /* 45*/ "mark betteridge\n", + /* 46*/ "chris marlow\n", + /* 47*/ "phillip dunne\n", + /* 48*/ "johnni christensen\n", + /* 49*/ "robin beanland\n", + /* 50*/ "steven hurst\n", + /* 51*/ "voice talent\n", + /* 52*/ "eveline fischer\n", + /* 53*/ "chris sutherland\n", + /* 54*/ "chris seavor\n", + /* 55*/ "john silke\n", + /* 56*/ "development tools\n", + /* 57*/ "richard gale\n", + /* 58*/ "mark green\n", + /* 59*/ "mark wilson\n", + /* 60*/ "hardware support\n", + /* 61*/ "pete cox\n", + /* 62*/ "paul mikell\n", + /* 63*/ "doug crouch\n", + /* 64*/ "thanks\n", + /* 65*/ "neil gallagher\n", + /* 66*/ "jonathon o'conner\n", + /* 67*/ "gareth glover\n", + /* 68*/ "motion capture\n", + /* 69*/ "alan tipper\n", + /* 70*/ "des easen\n", + /* 71*/ "jim ballard\n", + /* 72*/ "michelle tipper\n", + /* 73*/ "testing (rare)\n", + /* 74*/ "huw ward\n", + /* 75*/ "david wong\n", + /* 76*/ "adam munton\n", + /* 77*/ "luke munton\n", + /* 78*/ "garry phelps\n", + /* 79*/ "jon silke\n", + /* 80*/ "matthew carter\n", + /* 81*/ "gavin price\n", + /* 82*/ "gareth stevenson\n", + /* 83*/ "joe stamper\n", + /* 84*/ "stephen stamper\n", + /* 85*/ "testing (noa)\n", + /* 86*/ "nintendo guy\n", + /* 87*/ "nintendo gal\n", + /* 88*/ "rare miami\n", + /* 89*/ "eileen hochberg\n", + /* 90*/ "joel hochberg\n", + /* 91*/ "rare twycross\n", + /* 92*/ "chris stamper\n", + /* 93*/ "tim stamper\n", + /* 94*/ "nintendo\n", + /* 95*/ "ken lobb\n", + /* 96*/ "howard lincoln\n", + /* 97*/ "mr arrakawa\n", + /* 98*/ "mr yamauchi\n", + /* 99*/ "copyright rare 2000\n", + /*100*/ "perfect dark, the pd device and\n", + /*101*/ "perfecthead are trademarks\n", + /*102*/ "rare\n", + /*103*/ "designs on the future\n", + /*104*/ "t&a support\n", + /*105*/ "emma scully\n", + /*106*/ "claire phelan\n", + /*107*/ "joanna dark is forever\n", + /*108*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, + /*112*/ NULL, + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/titleP.c b/src/files/lang/pal-beta/titleP.c new file mode 100644 index 000000000..561257e86 --- /dev/null +++ b/src/files/lang/pal-beta/titleP.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_f.c b/src/files/lang/pal-beta/title_str_f.c new file mode 100644 index 000000000..669348998 --- /dev/null +++ b/src/files/lang/pal-beta/title_str_f.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "attitude adjuster\n", + /* 15*/ "b jones\n", + /* 16*/ "textured guru\n", + /* 17*/ "steve malpass\n", + /* 18*/ "edge wrangler\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "background artist\n", + /* 35*/ "additional\n", + /* 36*/ "dean smith\n", + /* 37*/ "kevin bayliss\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "lee musgrave\n", + /* 45*/ "mark betteridge\n", + /* 46*/ "chris marlow\n", + /* 47*/ "phillip dunne\n", + /* 48*/ "johnni christensen\n", + /* 49*/ "robin beanland\n", + /* 50*/ "steven hurst\n", + /* 51*/ "voice talent\n", + /* 52*/ "eveline fischer\n", + /* 53*/ "chris sutherland\n", + /* 54*/ "chris seavor\n", + /* 55*/ "john silke\n", + /* 56*/ "ben cullum\n", + /* 57*/ "louise tilston\n", + /* 58*/ "alistair lindsay\n", + /* 59*/ "development tools\n", + /* 60*/ "richard gale\n", + /* 61*/ "mark green\n", + /* 62*/ "mark wilson\n", + /* 63*/ "hardware support\n", + /* 64*/ "pete cox\n", + /* 65*/ "paul mikell\n", + /* 66*/ "doug crouch\n", + /* 67*/ "thanks\n", + /* 68*/ "neil gallagher\n", + /* 69*/ "jonathon o'conner\n", + /* 70*/ "gareth glover\n", + /* 71*/ "motion capture\n", + /* 72*/ "alan tipper\n", + /* 73*/ "des easen\n", + /* 74*/ "jim ballard\n", + /* 75*/ "michelle tipper\n", + /* 76*/ "sue fell\n", + /* 77*/ "testing (rare)\n", + /* 78*/ "huw ward\n", + /* 79*/ "david wong\n", + /* 80*/ "adam munton\n", + /* 81*/ "luke munton\n", + /* 82*/ "gary phelps\n", + /* 83*/ "jon silke\n", + /* 84*/ "matthew carter\n", + /* 85*/ "gavin price\n", + /* 86*/ "gareth stevenson\n", + /* 87*/ "bushbaby\n", + /* 88*/ "stephen stamper\n", + /* 89*/ "ross bullimore\n", + /* 90*/ "justin cook\n", + /* 91*/ "dale murchie\n", + /* 92*/ "testing (noa)\n", + /* 93*/ "nintendo guy\n", + /* 94*/ "nintendo gal\n", + /* 95*/ "rare miami\n", + /* 96*/ "eileen hochberg\n", + /* 97*/ "joel hochberg\n", + /* 98*/ "rare twycross\n", + /* 99*/ "chris stamper\n", + /*100*/ "wombat\n", + /*101*/ "nintendo\n", + /*102*/ "ken lobb\n", + /*103*/ "howard lincoln\n", + /*104*/ "mr arakawa\n", + /*105*/ "mr yamauchi\n", + /*106*/ "copyright rare 2000\n", + /*107*/ "perfect dark, the pd device and\n", + /*108*/ "perfecthead are trademarks\n", + /*109*/ "rare\n", + /*110*/ "designs on the future\n", + /*111*/ "Joanna Dark est 騁ernelle\n", + /*112*/ "Perfect Dark 2 est pr黎, il sortira le...\n", + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_g.c b/src/files/lang/pal-beta/title_str_g.c new file mode 100644 index 000000000..02519b400 --- /dev/null +++ b/src/files/lang/pal-beta/title_str_g.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "waffen und visuelle hhepunkte\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "bewegung und erschtterung\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality-techniker\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs der zukunft\n", + /* 11*/ "chris darling\n", + /* 12*/ "waffenspezialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grauzonen\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "locations und stimmen\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manisch-walisischer designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "hintergrnde\n", + /* 27*/ "martin penny\n", + /* 28*/ "maestro grande\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "der maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dynamische backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "die schrecklichen vier\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trents vasallen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "stimmen in der dunkelheit\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techniker\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hardware-support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'ich falleeeee' fell\n", + /* 91*/ "doug 'duck dich' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminatoren\n", + /* 94*/ "huw ward\n", + /* 95*/ "david wong\n", + /* 96*/ "adam munton\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "jon silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dunkle kommandanten\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in der sonne\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "der perfekte kern\n", + /*129*/ "- dunkler als du\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfekte rechtschreibung\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark fr immer\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_i.c b/src/files/lang/pal-beta/title_str_i.c new file mode 100644 index 000000000..f935d0916 --- /dev/null +++ b/src/files/lang/pal-beta/title_str_i.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armi e orgasmi visivi\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "muovi e sbatti\n", + /* 7*/ "darkmark\n", + /* 8*/ "tecnico effetti reali\n", + /* 9*/ "chris tilston\n", + /* 10*/ "design futuristico\n", + /* 11*/ "chris darling\n", + /* 12*/ "specialista armi\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "area grigia\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "dio di voci e luoghi\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "designer Galles-mania\n", + /* 25*/ "ross bury\n", + /* 26*/ "sfondi bionici\n", + /* 27*/ "martin penny\n", + /* 28*/ "guru suoni\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "musica, maestro! \n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "sfondi dinamici\n", + /* 35*/ "cecchini dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "i terribili quattro\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "gli scagnozzi di trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voci nell'oscurit濬n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "tecnici ci\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "supporto hardware\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "squadra dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "fermo immagine\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "tra le immagini\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "sterminatori rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "commandanti dark\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare al luce del sole\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "il cuore perfect\n", + /*129*/ "-pi buio di te!\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "ortografia perfect \n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_s.c b/src/files/lang/pal-beta/title_str_s.c new file mode 100644 index 000000000..85e50b19f --- /dev/null +++ b/src/files/lang/pal-beta/title_str_s.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armas y orgasmos visuales\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mueve y menea\n", + /* 7*/ "darkmark\n", + /* 8*/ "ingeniero de animacin\n", + /* 9*/ "chris tilston\n", + /* 10*/ "diseos futuristas\n", + /* 11*/ "chris darling\n", + /* 12*/ "especialista en armas\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "zona gris\n", + /* 15*/ "b jones\n", + /* 16*/ "culto al cuerpo\n", + /* 17*/ "steve malpass\n", + /* 18*/ "lugares perfectos\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "hombre bien empaquetado\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manaco diseador gal駸\n", + /* 25*/ "ross bury\n", + /* 26*/ "escenarios binicos\n", + /* 27*/ "martin penny\n", + /* 28*/ "to del sonido\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "maestro musical\n", + /* 31*/ "david clynick\n", + /* 32*/ "incondicional del ruido\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "artista de escenarios\n", + /* 35*/ "francotiradores dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "los cuatro terribles\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "secuaces de trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voces en la oscuridad\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "t馗nicos ic\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "soporte hard\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "equipo dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "captura de movimientos\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "en movimiento\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "exterminadores rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandantes oscuros\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare en el sol\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testeo (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testeo (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "el ncleo perfecto\n", + /*129*/ "- m疽 oscuro que t -\n", + /*130*/ "casa en el tronco\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "deletreo perfecto\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark y el dispositivo pd\n", + /*147*/ "son marcas registradas\n", + /*148*/ "rare\n", + /*149*/ "diseando el futuro\n", + /*150*/ "perfect dark es para siempre\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/traE.c b/src/files/lang/pal-beta/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-beta/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/traJ.c b/src/files/lang/pal-beta/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/pal-beta/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/traP.c b/src/files/lang/pal-beta/traP.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-beta/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_f.c b/src/files/lang/pal-beta/tra_str_f.c new file mode 100644 index 000000000..c7ac116d1 --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash on 騁騁ransf駻駸 dans le secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans levaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Localiser l'Auto-chirurgien\n\nTous les vaisseaux Maian sont 駲uip駸 d'une 'capsule auto-chirurgicale'. C'est le moyen le plus rapide de ranimer votre compagnon. Ces appareils sont r馮l駸 sur la physiologie Maian. Vous trouverez ce dispositif dans l'駱ave ou dans les restes du vaisseau transf駻駸 aux labos.\n\n|Objectif 2: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objective 3: - Entrer dans le Hangar Secret\n\nNotre agent n'a pas pu p駭騁rer dans le Hangar auparavant, cela aurait griller sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan pendant qu'il essaiera d'ouvrir la porte du hangar o nous pensons qu'il se trouve un vaisseau Maian.\n\n|Objectif 4: - Ranimer le Garde du Corps Maian\n\nRanimez le Maian avant de vous enfuire - une civi鑽e anti-grave pourrait se r騅駘 assez encombrante en cas de crise. Une fois qu'il sera debout et op駻ationnel, il pourra piloter le vaisseau Maian hors du secteur 51.\n\n|Objecti 5: - Quitter le secteur 51\n\nAmenez le garde du corps Maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ駸 auparavant.\n\nFIN\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash on 騁騁ransf駻駸 dans le secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans levaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objective 2: - Entrer dans le Hangar Secret\n\nNotre agent n'a pas pu p駭騁rer dans le Hangar auparavant, cela aurait griller sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan pendant qu'il essaiera d'ouvrir la porte du hangar o nous pensons qu'il se trouve un vaisseau Maian.\n\n|Objectif 3: - Ranimer le Garde du Corps Maian\n\nRanimez le Maian avant de vous enfuire - une civi鑽e anti-grave pourrait se r騅駘 assez encombrante en cas de crise. Une fois qu'il sera debout et op駻ationnel, il pourra piloter le vaisseau Maian hors du secteur 51.\n\n|Objecti 4: - Quitter le secteur 51\n\nAmenez le garde du corps Maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ駸 auparavant.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash on 騁騁ransf駻駸 dans le secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans levaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objective 2: - Entrer dans le Hangar Secret\n\nNotre agent n'a pas pu p駭騁rer dans le Hangar auparavant, cela aurait griller sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan pendant qu'il essaiera d'ouvrir la porte du hangar o nous pensons qu'il se trouve un vaisseau Maian.\n\n|Objecti 3: - Quitter le secteur 51\n\nAmenez le garde du corps Maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ駸 auparavant.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localiser Medkit extraterrestre\n", + /* 10*/ "Rencontrer l'espion de l'IC\n", + /* 11*/ "Ranimer Elvis avec le Medkit\n", + /* 12*/ "Localiser le hangar secret\n", + /* 13*/ "Quitter le secteur 51\n", + /* 14*/ "Joanna - Ici Jonathan. Vous 黎es en grave danger.\n", + /* 15*/ "Ils ont inond cette zone avec du gaz empoisonn.\n", + /* 16*/ "Allez dans le labo o se trouve notre ami.\nIl y a une cache.\n", + /* 17*/ "Je vous contacterai quand vous y serez! Bonne chance!\n", + /* 18*/ "Bon travail, Jo. Nous devons nous rejoindre. Ils \ndeviennent m馭iants.\n", + /* 19*/ "Passez par le conduit ouvert \ndans un des labos. D駱鹹hez-vous.\n", + /* 20*/ "Obtenir Medkit extraterr.\n", + /* 21*/ "Cassandra De Vries: \n", + /* 22*/ "Medkit extraterr.\n", + /* 23*/ "", + /* 24*/ "Medkit extraterr. obtenu.\n", + /* 25*/ "Joanna - par ici.\n", + /* 26*/ "Nous devons retrouver notre ami.\n", + /* 27*/ "Bien, nous y sommes presque. Couvrez-moi, Jo...\n", + /* 28*/ "Ok - Restez derri鑽e.\n", + /* 29*/ "Jonathan a 騁 tu.\n", + /* 30*/ "Elvis a 騁 tu.\n", + /* 31*/ "Le hangar secret a 騁 d馗ouvert.\n", + /* 32*/ "Ok, Jo - allons-y.\n", + /* 33*/ "Medkit extraterr. activ.\n", + /* 34*/ "Op駻ation Medkit annul馥.\n", + /* 35*/ "Medkit administr.\n", + /* 36*/ "Objet crucial d騁ruit.\n", + /* 37*/ "Ouverture porte ext駻ieure hangar.\n", + /* 38*/ "Fermeture porte ext駻ieure hangar.\n", + /* 39*/ "Ouverture porte int駻ieure hangar.\n", + /* 40*/ "fermeture porte int駻ieure hangar.\n", + /* 41*/ "C'est la seule sortie possible.\n", + /* 42*/ "Tu es le seul pouvoir piloter, Elvis alors au boulot.\n", + /* 43*/ "Mais nous ne pouvons pas te laisser derri鑽e.\n", + /* 44*/ "Il doit y avoir une solution.\n", + /* 45*/ "L'un de nous devra rester en arri鑽e pour\nouvire le hangar.\n", + /* 46*/ "Je vais prendre cette hoverbike. Couvrez-moi\nj'ouvre les portes.\n", + /* 47*/ "Jonathan, allez avec Elvis. Je vais voir les consoles.\n", + /* 48*/ "C'est trop dangereux, Jo...\n", + /* 49*/ "Je devrais m'en sortir... Aie confiance.\n", + /* 50*/ "...Ok.\n", + /* 51*/ "Merde, Joanna... Couvrez-moi!\n", + /* 52*/ "Je vais bloquer les marches - Occupez-vous de la rampe.\n", + /* 53*/ "Les portes du hangar sont ouvertes.\n", + /* 54*/ "Les portes du bloc m馘ical sont ouvertes.\n", + /* 55*/ "Le Medkit doit se trouver par-l.\n", + /* 56*/ "Il faut rejoindre Jonathan, avant qu'il ne\nsoit trop tard.\n", + /* 57*/ "Cette odeur... de l'huile... je l'ai senti dans\nles autres hangars.\n", + /* 58*/ "Avec cette Jetbike je vais pouvoir m'enfuir\navant la fermeture des portes.\n", + /* 59*/ "Quelle horreur cette trottinette! En plus il n'y a\n", + /* 60*/ "qu'un si鑒e. Il n'y de la place que pour deux\n", + /* 61*/ "Aucun style, c'est d駱rimant.\n", + /* 62*/ "Ce sp馗imen est la propri騁 du gouvernement. Il ne doit pas quitter cette base.\n", + /* 63*/ "Voyons voir comment cette petite voleuse va s'en sortir avec les gaz. Elle y repensera deux fois avant de venir semer le bordel ici!\n", + /* 64*/ "C'est quoi ce bruit? Mais, mais... du gaz!\n", + /* 65*/ "Ah non! C'est pas 軋 qui 騁ait pr騅u!\n", + /* 66*/ "Non, arr黎er! Je veux pas mourir. Elle... Arggghhh!\n", + /* 67*/ "Pauvre idiot! Allons nous-en.\n", + /* 68*/ "Eternuements, toussotements, pleures.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Je suis vivant. Je pensais 黎re mort comme les autres. Vous 黎es de l'Institut? Je vous reconnais. Vous m'avez aid. Merci beaucoup.\n", + /* 71*/ "Vous... Vous parlez notre langue?\n", + /* 72*/ "Impressionnante d馘uction.\n", + /* 73*/ "Nnnghhh... \n", + /* 74*/ "Qu'avez-vous?\n", + /* 75*/ "J'ai mal au cr穗e. Chez nous c'est assez douloureux, nous avons une grosse t黎e.\n", + /* 76*/ "Pouvez-vous marcher? Nous devons partir au plus vite.\n", + /* 77*/ "Je suis d'accord. Quel est votre nom?\n", + /* 78*/ "Agent Dark, Joanna pour les intimes.\n", + /* 79*/ "Tr鑚 bien, Joanna, je suis Gardien Prime. Mais vous pouvez m'appeler... Elvis!\n", + /* 80*/ "La console est d饕ranch馥.\n", + /* 81*/ "Mais, qu'est-ce que vous faites? \nCette pi鐵e est cens馥 黎re scell馥! \nVous ne connaissez pas les proc馘ures \nd'autopsie?\n", + /* 82*/ "Le Directeur Easton sera mis au courant, \njeune fille.\n", + /* 83*/ "Vous ne pouvez pas prendre 軋! Ca appartient au \nGouvernement! C'est intol駻able! C'est... c'est... \ntotalement anti-professionnel !!\n", + /* 84*/ "Les proc馘ures, c'est trop barbant pour moi!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_g.c b/src/files/lang/pal-beta/tra_str_g.c new file mode 100644 index 000000000..f802acac3 --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Hintergrundinformationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Finden Sie die den Auto-Chirugen der Aliens!\n\nAlle Maianischen Schiffe sind mit einem Ger舩 ausgestattet, das man als automatischen Chirurgen bezeichnen knnte. Da dieses Ger舩 auf Maianische Physiologie ausgerichtet ist, stellt es den einfachsten und sichersten Weg dar, den Bodyguard wieder zu Bewusstsein zu bringen. Das Ger舩 befindet sich entweder unter den Trmmern des Schiffs, oder es wurde bereits ins Labor zur Analyse gebracht.\n\n|2. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|3. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|4. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, mssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umst舅den nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|5. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 1*/ "AREA 51 - FLUCHT\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Hintergrundinformationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, mssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umst舅den nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|4. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Hintergrundinformationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie das extraterrestrische Medipack!\n", + /* 10*/ "Treffen Sie sich mit unserem Agenten!\n", + /* 11*/ "Wiederbeleben Sie den Maianischen Bodyguard!\n", + /* 12*/ "Finden Sie den geheimen Hangar!\n", + /* 13*/ "Flchten Sie aus der Area 51\n", + /* 14*/ "Joanna - Hier spricht Jonathan. Du befindest dich in Gefahr.\n", + /* 15*/ "Die gesamte Zone wurde mit Nervengas kontaminiert.\n", + /* 16*/ "Bring unseren Freund ins Sicherheitslabor.\nDort kannst du ihn verstecken.\n", + /* 17*/ "Ich kontaktiere dich, wenn du dort bist. Viel Glck!\n", + /* 18*/ "Gute Arbeit, Jo. Wir mssen uns treffen. Ich \nglaube, sie haben mich erkannt.\n", + /* 19*/ "Geh durch den Wartungsschacht, den ich in einem \nder Sicherheitslabors gefffnet habe. Beeil dich!\n", + /* 20*/ "Erlangen Sie das extraterrestrische Medipack!\n", + /* 21*/ "Cassandra De Vries\n", + /* 22*/ "Medipack\n", + /* 23*/ "", + /* 24*/ "Medipack aufgenommen.\n", + /* 25*/ "Joanna! Hier drben.\n", + /* 26*/ "Wir mssen zu unserem Freund zurck.\n", + /* 27*/ "Wir sind schon ganz nahe. Gib mir Deckung, Jo...\n", + /* 28*/ "Okay - Bleib zurck!\n", + /* 29*/ "Jonathan wurde eliminiert.\n", + /* 30*/ "Elvis wurde eliminiert.\n", + /* 31*/ "Der geheime Hangar wurde gefunden.\n", + /* 32*/ "Okay, Jo - gehen wir.\n", + /* 33*/ "Medipack aktiviert.\n", + /* 34*/ "Medipack-Atkivit舩 unterbrochen.\n", + /* 35*/ "Medipack wurde verabreicht.\n", + /* 36*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 37*/ "トu゚eres Hangartor wird geffnet.\n", + /* 38*/ "トu゚eres Hangartor wird geschlossen.\n", + /* 39*/ "Inneres Hangartor wird geffnet.\n", + /* 40*/ "Inneres Hangartor wird geschlossen.\n", + /* 41*/ "Das ist der einzige Weg hier raus.\n", + /* 42*/ "Du bist der einzige, der das Ding fliegen kann, Elvis, also los!\n", + /* 43*/ "Aber wir knnen dich nicht zurcklassen.\n", + /* 44*/ "Es muss doch einen Weg hier raus geben.\n", + /* 45*/ "Einer von uns muss hier bleiben, um die \nHangartore zu ffnen.\n", + /* 46*/ "Ich flchte mit dem Hoverbike. Gebt mir Deckung, \nw臧rend ich die Tore ffne!\n", + /* 47*/ "Jonathan, geh mit Elvis. Ich kmmere mich um die Konsolen.\n", + /* 48*/ "Es ist gef臧rlich, Jo...\n", + /* 49*/ "Ich komme schon klar... Vertrau mir.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Verdammt, Joanna... Gib mir Deckung!\n", + /* 52*/ "Ich sichere die Treppe - kmmere du dich um die Rampe.\n", + /* 53*/ "Die Hangartore sind jetzt offen.\n", + /* 54*/ "Die Tren zum Sicherheitslabor wurden entriegelt.\n", + /* 55*/ "Das Medipack muss hier irgendwo sein.\n", + /* 56*/ "Ich muss mich mit Jonathan treffen, bevor\ner noch tiefer in Schwierigkeiten ger舩.\n", + /* 57*/ "Dieser Geruch... ヨl... Ich habe es schon in den \nanderen Hangars gerochen.\n", + /* 58*/ "Ich sollte auf dem Hoverbike entkommen, bevor\nalle Ausg舅ge geschlossen werden.\n", + /* 59*/ "Oh nein! Wir haben ein Problem. Hier ist nur fr EINEN Platz!\n", + /* 60*/ "Zwei passen rein, aber das warエs dann schon.\n", + /* 61*/ "Und es ist nicht sehr stilvoll - wenn du wei゚t, wovon ich spreche.\n", + /* 62*/ "Ich lasse das nicht zu. Dieses Exemplar ist Regierungseigentum und darf die Basis nicht verlassen.\n", + /* 63*/ "Mal sehen, wie dieser selbstgef舁lige Dieb mit Nervengas klarkommt. Sie wird es sich in Zukunft berlegen, sich mit mir anzulegen!\n", + /* 64*/ "Was ist das fr ein Ger舫sch! Es ist... GAS!\n", + /* 65*/ "Neeiiin! Das war anders geplant!\n", + /* 66*/ "Aufhren! Ich will noch nicht... Sie... Arggghhh!\n", + /* 67*/ "Du Idiot! Wir mssen raus hier.\n", + /* 68*/ "Keuchen, rcheln und husten.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Ich bin am Leben. Ich dachte, ich wrde so wie die anderen auseinandergenommen. Sie mssen vom Institut sein. Ich habe Sie schon mal gesehen. Danke, dass Sie mir geholfen haben.\n", + /* 71*/ "Sie... sie sprechen unsere Sprache?\n", + /* 72*/ "Vorsicht, mit ihr ist nicht zu scherzen.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "Was ist los?\n", + /* 75*/ "Ich habe Kopfschmerzen. Und mit einem Kopf von dieser Gr゚e will das was hei゚en.\n", + /* 76*/ "Knnen Sie gehen? Wir mssen hier weg, bevor sie uns noch dichter auf den Fersen sind.\n", + /* 77*/ "Ich denke schon. Wie hei゚en Sie?\n", + /* 78*/ "Ich bin Agent Dark. Oder Joanna, falls Sie das bevorzugen.\n", + /* 79*/ "Gut, Joanna, ich bin der Protektor Eins. Aber nennen Sie... nenn mich einfach Elvis!\n", + /* 80*/ "Konsole ist nicht aktiv.\n", + /* 81*/ "Was zur Hlle machen Sie hier? \nDieser Raum ist nur fr autorisiertes Personal! \nWissen Sie den gar nichts ber die Vorschriften \nbei Autopsien?\n", + /* 82*/ "Direktor Easton wird darber informiert werden, \njunge Dame.\n", + /* 83*/ "Sie drfen das nicht! Das ist Regierungseigentum! \nDas ist nicht tolerabel! Das ist... das ist... \nunprofessionell!!!\n", + /* 84*/ "Ich habe fr Vorschriften nicht viel brig!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_i.c b/src/files/lang/pal-beta/tra_str_i.c new file mode 100644 index 000000000..544a23c1f --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Trova dispositivo AutoChirurgo alieno\n\nTutti i mezzi Maian portano un dispositivo chiamato AutoChirurgo. Il suo uso il modo pi veloce e sicuro per svegliare un Maian dal momento che progettato per agire sulla fisiologia Maian. Dovrebbe trovarsi tra i resti del velivolo o altrimenti tra gli oggetti portati al laboratorio per l'analisi.\n\n|Obiettivo 2: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 3: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi di questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 4: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poich un idrovolante non la cosa pi semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 5: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 1*/ "AREA 51 - FUGA\n", + /* 2*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi di questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poich un idrovolante non la cosa pi semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 4: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington - \n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi di questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Trova l'AutoChirurgo alieno\n", + /* 10*/ "Appuntamento con l'agente segreto\n", + /* 11*/ "Rivitalizza guardia del corpo Maian\n", + /* 12*/ "Raggiungi l'hangar segreto\n", + /* 13*/ "Fuga dall'Area 51\n", + /* 14*/ "Joanna, questo Jonathan. Sei in grave pericolo!\n", + /* 15*/ "Hanno inondato l'area di gas nervino.\n", + /* 16*/ "Porta il nostro amico al laboratorio \ndi contenimento. L c' un nascondiglio.\n", + /* 17*/ "Mi metter di nuovo in contatto con te \nquando sei sul posto. In bocca al lupo!\n", + /* 18*/ "Bel lavoro, Jo! Dobbiamo incontrarci. Stanno \niniziando a sospettare di me.\n", + /* 19*/ "Usa lo sportello di manutenzione che \nho aperto in uno dei laboratori. Veloce!\n", + /* 20*/ "Procurati AutoChirurgo\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "AutoChirurgo\n", + /* 23*/ "", + /* 24*/ "Preso AutoChirurgo\n", + /* 25*/ "Joanna! Da questa parte!\n", + /* 26*/ "Dobbiamo trovare il nostro amico!\n", + /* 27*/ "Bene, siamo in zona! Coprimi, Jo...\n", + /* 28*/ "Bene, ora sta indietro!\n", + /* 29*/ "Jonathan stato ucciso!\n", + /* 30*/ "Elvis stato ucciso!\n", + /* 31*/ "Localizzato hangar segreto.\n", + /* 32*/ "Perfetto, Jo! Andiamo!\n", + /* 33*/ "Attivato AutoChirurgo alieno.\n", + /* 34*/ "Interrotta operazione AutoChirurgo.\n", + /* 35*/ "Trovato AutoChirurgo alieno.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Porta esterna hangar in apertura.\n", + /* 38*/ "Porta esterna hangar in chiusura.\n", + /* 39*/ "Porta interna hangar in apertura.\n", + /* 40*/ "Porta interna hangar in chiusura.\n", + /* 41*/ "ネ l'unico modo per uscire di qui!\n", + /* 42*/ "Sei l'unico in grado di pilotarlo, Elvis, e allora fallo!\n", + /* 43*/ "Non possiamo mica lasciarti qui!\n", + /* 44*/ "Ci dev'essere un altro modo per uscire di qui!\n", + /* 45*/ "Uno di noi deve rimane indietro \nper aprire le porte dell'hangar.\n", + /* 46*/ "Ci andr io con l'aeromoto! Coprimi \nmentre apro le porte!\n", + /* 47*/ "Jonathan, va con Elvis. Io mi occupo dei quadri comando.\n", + /* 48*/ "ネ pericoloso, Jo...\n", + /* 49*/ "Tutto sotto controllo! Fidati!\n", + /* 50*/ "Va bene!\n", + /* 51*/ "Dannazione, Joanna... coprimi!\n", + /* 52*/ "Io copro le scale, tu prendi la rampa!\n", + /* 53*/ "Le porte dell'hangar sono aperte.\n", + /* 54*/ "Aperte porte sala di contenimento.\n", + /* 55*/ "L'AutoChirurgo deve essere qui da qualche parte.\n", + /* 56*/ "Meglio che mi metta in contatto con Jonathan, prima che \nsi cacci in qualche altro guaio!\n", + /* 57*/ "Questo odore... petrolio... l'ho gi sentito \nnegli altri hangar.\n", + /* 58*/ "L'aeromoto dovrebbe farcela a portarmi fuori \nprima che chiudano la base.\n", + /* 59*/ "Oh, no! Abbiamo un problema. ネ una monoposto!\n", + /* 60*/ "Ce ne stanno al massimo due e non di pi!\n", + /* 61*/ "E poi... non ha stile! Non so se rendo...\n", + /* 62*/ "Non lo ammetto! Quell'esemplare propriet governativa e non pu assolutamente uscire dalla base.\n", + /* 63*/ "Vediamo come se la cava questa sfacciata criminale con l'impianto di difesa a gas. Ci penser due volte la prossima volta prima di fare la furba con me!\n", + /* 64*/ "Cos' quel rumore? Non pu... ネ gas!\n", + /* 65*/ "Accidenti! Questo non era previsto!\n", + /* 66*/ "Fermati, per favore! Non posso morire adesso! Lei... Noooo!\n", + /* 67*/ "Idiota! Fuori dai piedi!!!\n", + /* 68*/ "Gasp, soffoco! Soffoco!\n", + /* 69*/ "***aaah...! aaah! aha! aha!***\n", + /* 70*/ "Sono vivo! Credevo che mi avrebbero fatto a fettine come gli altri... Sei dell'istituto, vero? Ti riconosco, mi ricordo di te. Mi hai aiutato, sono in debito con te!\n", + /* 71*/ "Parli... Parli la nostra lingua?\n", + /* 72*/ "Attento... pericolosa!\n", + /* 73*/ "Aaahhh... che male!\n", + /* 74*/ "Che succede?\n", + /* 75*/ "Ho mal di testa! E con un testone come il mio, non c' niente da ridere!\n", + /* 76*/ "Riesci a camminare? Dobbiamo uscire di qui prima che riescano a farci fuori!\n", + /* 77*/ "S, penso di farcela. Come ti chiami?\n", + /* 78*/ "Sono l'Agente Dark... o Joanna, se preferisci!\n", + /* 79*/ "Bene, Joanna! Io sono il Difensore 1, ma puoi chiamarmi... Elvis!\n", + /* 80*/ "Quadro comandi inattivo\n", + /* 81*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /* 82*/ "Il direttor Easton lo verr \na sapere, signorina!\n", + /* 83*/ "Non pu prendere quello! ネ propriet governativa! \nネ intollerabile! ネ... ... \n inammissibile!!!\n", + /* 84*/ "Non mi interessa un fico secco della procedura!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_s.c b/src/files/lang/pal-beta/tra_str_s.c new file mode 100644 index 000000000..e9aa94dd1 --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Localizar el Dispositivo Aliengena de AutoCiruga\n\nTodas las naves Maian llevan un dispositivo de AutoCiruga. Utilizarlo es el m騁odo m疽 r疳ido y seguro de despertarle, ya que ha sido diseado para la fisiologa Maian. Debe encontrarse entre los restos de la nave, o si no, con los objetos que han sido llevados a analizar al laboratorio.\n\n|Objetivo Dos: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Tres: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos guardan una nave Maian intacta.\n\n|Objetivo Cuatro: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa m疽 f當il de manejar. Cuando est despejado y en pie, deber ser capaz de hacer volar la nave Maian fuera del チrea 51.\n\n|Objetivo Cinco: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 1*/ "チREA 51 - ESCAPE\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa m疽 f當il de manejar. Cuando est despejado y en pie, deber ser capaz de hacer volar la nave Maian fuera del チrea 51.\n\n|Objetivo Cuatro: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localizar paquete m馘ico aliengena\n", + /* 10*/ "Encontrar al espa del IC\n", + /* 11*/ "Revive al Guardaespaldas Maian\n", + /* 12*/ "Localizar el hangar secreto\n", + /* 13*/ "Escapar del チrea 51\n", + /* 14*/ "ソJoanna? Jonathan al habla. Est疽 en peligro de muerte.\n", + /* 15*/ "Han inundado el 疵ea con gas nervioso.\n", + /* 16*/ "Lleva a nuestro amigo al laboratorio de contencin. \nAll hay un lugar secreto.\n", + /* 17*/ "Contactar contigo cuando est駸 all. 。Buena suerte!\n", + /* 18*/ "Buen trabajo, Joanna. Necesitamos vernos. Est疣 \nsospechando de m.\n", + /* 19*/ "Usa la escotilla de mantenimiento que he abierto \nen uno de los laboratorios de contencin. Deprisa.\n", + /* 20*/ "Obt駭 el paquete m馘ico aliengena.\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "Paquete m馘ico aliengena\n", + /* 23*/ "", + /* 24*/ "Paquete m馘ico aliengena obtenido.\n", + /* 25*/ "Joanna. Aqu.\n", + /* 26*/ "Necesitamos volver con nuestro amigo.\n", + /* 27*/ "Bien, estamos cerca. Cbreme, Joanna...\n", + /* 28*/ "Vale. Ap疵tate.\n", + /* 29*/ "Jonathan ha muerto.\n", + /* 30*/ "Elvis ha muerto.\n", + /* 31*/ "El hangar secreto ha sido localizado.\n", + /* 32*/ "Bien, Joanna. Vamos.\n", + /* 33*/ "Paquete m馘ico aliengena activado.\n", + /* 34*/ "Operacin del paquete m馘ico abortada.\n", + /* 35*/ "El paquete m馘ico aliengena ha sido administrado.\n", + /* 36*/ "Objeto crtico de la misin destruido.\n", + /* 37*/ "Puerta exterior del hangar abierta.\n", + /* 38*/ "Puerta exterior del hangar cerrada.\n", + /* 39*/ "Puerta interior del hangar abierta.\n", + /* 40*/ "Puerta interior del hangar cerrada.\n", + /* 41*/ "Es el nico camino para salir de aqu.\n", + /* 42*/ "Eres el nico que puede pilotarlo, Elvis, as que entra.\n", + /* 43*/ "Pero no podemos dejarte atr疽.\n", + /* 44*/ "Tiene que haber un camino para salir de aqu.\n", + /* 45*/ "Uno de nosotros debe quedarse atr疽 para abrir \nlas puertas del hangar.\n", + /* 46*/ "Saldr en esa aeromoto. Cubridme mientras \nabro las puertas.\n", + /* 47*/ "Jonathan, ve con Elvis. Yo me ocupar de las consolas.\n", + /* 48*/ "Es peligroso, Joanna...\n", + /* 49*/ "Puedo encargarme... Cr馥me.\n", + /* 50*/ "...De acuerdo.\n", + /* 51*/ "Maldicin, Joanna... 。cbreme!\n", + /* 52*/ "Cubrir las escaleras. T toma la rampa.\n", + /* 53*/ "Las puertas del hangar est疣 abiertas.\n", + /* 54*/ "Puertas de contencin m馘ica abiertas.\n", + /* 55*/ "El paquete m馘ico debera estar por aqu.\n", + /* 56*/ "Es hora de contactar con Jonathan, antes de que \nse meta en m疽 problemas.\n", + /* 57*/ "Ese olor... aceite... He olido eso en los\notros hangares.\n", + /* 58*/ "La aeromoto me sacar de aqu antes de que \ncierren la base.\n", + /* 59*/ "。Oh, no! Tenemos un problema. 。Es monoplaza!\n", + /* 60*/ "Cabran dos, pero ninguno m疽.\n", + /* 61*/ "Adem疽, no tiene estilo. ソSabes lo que quiero decir?\n", + /* 62*/ "No os voy a dejar. Ese esp馗imen es propiedad del gobierno y no debe abandonar la base.\n", + /* 63*/ "Veamos qu tal se porta esa confiada ladrona con nuestro gas del sistema de defensa. 。Se lo pensar dos veces antes de jorobarme otra vez!\n", + /* 64*/ "ソQu es ese ruido? No puede ser... 。Gas!\n", + /* 65*/ "。Noooo, esto no deba ocurrir!\n", + /* 66*/ "。Por favor, para! Se supone que no debo morir. Ella... 。Arggghhh!\n", + /* 67*/ "。Idiota! Ser mejor que salgamos de aqu.\n", + /* 68*/ "Arrgghh... Cof, cof...\n", + /* 69*/ "***。Aahh...! 。Aahaa...! 。Aaaaahhh! Aha. Ahh.***\n", + /* 70*/ "Estoy vivo. Pensaba que haba cado como los otros. Eres del Instituto, ソno es as? Te conozco de antes. Me ayudaste. Gracias.\n", + /* 71*/ "T... ソT hablas nuestro idioma?\n", + /* 72*/ "Mrala... qu lista es...\n", + /* 73*/ "Earrggghh... eerggh...\n", + /* 74*/ "ソQu pasa?\n", + /* 75*/ "Tengo dolor de cabeza. Y con una cabeza tan grande como 駸ta, no es cuestin de broma.\n", + /* 76*/ "ソPuedes andar? Debemos irnos antes de que organicen nuestra caza.\n", + /* 77*/ "Creo que s. ソCmo te llamas?\n", + /* 78*/ "Soy la Agente Dark. O Joanna, si lo prefieres...\n", + /* 79*/ "Bien, Joanna, soy Protector Uno. Pero t puedes llamarme... 。Elvis!\n", + /* 80*/ "La consola no est activa.\n", + /* 81*/ "ソQu demonios se supone que haces? \n。Se supone que esto es una habitacin sellada! \nソNo sabes nada acerca de los procedimientos \npara autopsias?\n", + /* 82*/ "El Director Easton se va a enterar de esto, \njovencita.\n", + /* 83*/ "。No puedes coger eso! 。Es propiedad del gobierno! \n。Esto es intolerable! 。No es... 。No es... \n...profesional!!\n", + /* 84*/ "。No es que me importen mucho los procedimientos!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/uffE.c b/src/files/lang/pal-beta/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uffJ.c b/src/files/lang/pal-beta/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uffP.c b/src/files/lang/pal-beta/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_f.c b/src/files/lang/pal-beta/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_g.c b/src/files/lang/pal-beta/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_i.c b/src/files/lang/pal-beta/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_s.c b/src/files/lang/pal-beta/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/waxE.c b/src/files/lang/pal-beta/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-beta/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/waxJ.c b/src/files/lang/pal-beta/waxJ.c new file mode 100644 index 000000000..f130240d2 --- /dev/null +++ b/src/files/lang/pal-beta/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/waxP.c b/src/files/lang/pal-beta/waxP.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-beta/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_f.c b/src/files/lang/pal-beta/wax_str_f.c new file mode 100644 index 000000000..7ea91de72 --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes cr騁ins de scientifiques de la dataDyne Corporation ne sont plus autoris駸 poursuivre leurs recherches gr稍e notre technologie. Tu placeras une bombe dans l'ascenseur qui d騁ruira toutes leurs donn馥s et toutes les preuves physiques de notre coop駻ation.\n\n|Objectif 2: - Eliminer le Capitaine de dataDyne\n\nTu devras effacer cette cr饌ture pour annuler toute possibilit de repr駸ailles contre les Skedars par des 駘駑ents r駸iduels de cette corporation infid鑞e. L'id馥 d'humains r騏ssissant menacer notre puissante race est plus que ridicule, mais nous ne devons pas ignorer la force de la vendetta.\n\n|Objectif 3: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette chienne humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes cr騁ins de scientifiques de la dataDyne Corporation ne sont plus autoris駸 poursuivre leurs recherches gr稍e notre technologie. Tu placeras une bombe dans l'ascenseur qui d騁ruira toutes leurs donn馥s et toutes les preuves physiques de notre coop駻ation.\n\n|Objectif 2: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 4*/ "Trouver - escorter De Vries H駘iport\n", + /* 5*/ "Placer explosifs dans ascenseur Labo\n", + /* 6*/ "Assassiner chef s馗urit dataDyne\n", + /* 7*/ "Sortez de mon bureau...\n", + /* 8*/ "Si tu veux vivre, suis-moi jusqu' l'h駘iport.\n", + /* 9*/ "Ne me tuez pas!\n", + /* 10*/ "Comment osez-vous me d駻anger!\n", + /* 11*/ "Vous allez regretter cette intrusion.\n", + /* 12*/ "Partez! Imm馘iatement!\n", + /* 13*/ "Vous n'oserez pas tirer!\n", + /* 14*/ "Cassandra a 騁 immobilis馥.\n", + /* 15*/ "Cassandra a 騁 captur馥.\n", + /* 16*/ "Le chef de la S馗urit a 騁 駘imin.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bombe skedar\n", + /* 20*/ "Bombe skedar\n", + /* 21*/ "Bombe skedar obtenue.\n", + /* 22*/ "La Bombe skedar a 騁 plac馥 correctement.\n", + /* 23*/ "La Bombe skedar a explos.\n", + /* 24*/ "Porte d'ascenseur verrouill馥 - La bombe ne peut 黎re plac馥.\n", + /* 25*/ "Ascenseur d駸activ.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_g.c b/src/files/lang/pal-beta/wax_str_g.c new file mode 100644 index 000000000..430eeb2b0 --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unf臧igen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um s舂tliche Forschungsergebnisse und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Eliminieren Sie den dataDyne-Sicherheitschef!\n\nEntfernen Sie dieses Individuum, um jegliche Repressalien durch verbleibende Elemente der abtrnnigen Firma gegen die Skedar von vorneherein auszuschlie゚en. So lachhaft die Vorstellung, dass die Menschen die Skedar auslschen knnten, auch sein mag, man darf die Macht einer Vendetta nicht untersch舩zen.\n\n|3. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen \n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unf臧igen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um s舂tliche Forschungsergebnisse und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nEND\n", + /* 4*/ "Eskortieren Sie Cassandra zum Helipad!\n", + /* 5*/ "Platzieren Sie den Sprengsatz im Aufzug!\n", + /* 6*/ "Eliminieren Sie den Sicherheitschef!\n", + /* 7*/ "Raus aus meinem Bro!\n", + /* 8*/ "Wenn Sie am Leben bleiben wollen, folgen Sie mir zum Helipad!\n", + /* 9*/ "Sie werden nicht auf mich schie゚en!\n", + /* 10*/ "Wie knnen Sie es wagen, mich zu stren?\n", + /* 11*/ "Sie werden es bereuen, hier eingedrungen zu sein.\n", + /* 12*/ "Wenn ich Sie w舐e, wrde ich verschwinden... SOFORT!\n", + /* 13*/ "Sie werden nicht auf mich schie゚en!\n", + /* 14*/ "Cassandra ist bewusstlos.\n", + /* 15*/ "Cassandra wurde erfolgreich gefangengenommen.\n", + /* 16*/ "Der Sicherheitschef wurde eliminiert.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar-Bombe\n", + /* 20*/ "Skedar-Bombe\n", + /* 21*/ "Skedar-Bombe aufgenommen.\n", + /* 22*/ "Die Skedar-Bombe wurde erfolgreich platziert.\n", + /* 23*/ "Die Skedar-Bombe ist detoniert.\n", + /* 24*/ "Die Aufzugstren sind verriegelt - Bombe kann nicht platziert werden.\n", + /* 25*/ "Der Aufzug wurde au゚er Kraft gesetzt.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_i.c b/src/files/lang/pal-beta/wax_str_i.c new file mode 100644 index 000000000..8447ff579 --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Elimina il presidente dataDyne\n\nElimina questo squallido individuo per prevenire ogni possibile tentativo di rappresaglia da parte di elementi residuali di questa azienda traditrice. Per quanto possa essere assurdo pensare che una sola persona possa distruggere la razza, non dobbiamo sottovalutare la forza dell'odio e della vendetta.\n\n|Obiettivo 3: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 4*/ "Scova e scorta De Vries all'eliporto\n", + /* 5*/ "Piazza ordigno esplosivo in ascensore\n", + /* 6*/ "Elimina il presidente dataDyne\n", + /* 7*/ "Esci subito dal mio ufficio...\n", + /* 8*/ "Va all'eliporto se tieni alla pelle!\n", + /* 9*/ "Non vorrai mica spararmi...\n", + /* 10*/ "Come osi disturbarmi!\n", + /* 11*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 12*/ "Se fossi in te girerei al largo!\n", + /* 13*/ "Non vorrai mica spararmi...\n", + /* 14*/ "Cassandra immobilizzata!\n", + /* 15*/ "Cassandra stata catturata!\n", + /* 16*/ "Il capo della sicurezza stato eliminato.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Presa bomba Skedar\n", + /* 22*/ "La bomba Skedar in posizione corretta.\n", + /* 23*/ "La bomba Skedar esplosa.\n", + /* 24*/ "Porte ascensore bloccate: impossibile piazzare bomba.\n", + /* 25*/ "L'ascensore stato disattivato.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_s.c b/src/files/lang/pal-beta/wax_str_s.c new file mode 100644 index 000000000..290b2e67c --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitir que los ineptos cientficos de la Corporacin dataDyne continen investigando con nuestra tecnologa. Deber疽 colocar una bomba en el ascensor para destruir completamente sus investigaciones, adem疽 de las posibles evidencias fsicas.\n\n|Objetivo Dos: - Eliminar al Capit疣 de dataDyne\n\nSuprime a este individuo para acabar con cualquier represalia dirigida contra los Skedar por elementos residuales de la traidora corporacin. Aunque el concepto de un humano eliminando a la raza Skedar pueda resultar gracioso, no debemos cegarnos ante la fuerza de la venganza.\n\n|Objetivo Tres: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitir que los ineptos cientficos de la Corporacin dataDyne continen investigando con nuestra tecnologa. Deber疽 colocar una bomba en el ascensor para destruir completamente sus investigaciones, adem疽 de las posibles evidencias fsicas.\n\n|Objetivo Dos: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 4*/ "Buscar/guiar a Cassandra al helipuerto\n", + /* 5*/ "Colocar explosivo en ascensor del lab.\n", + /* 6*/ "Eliminar al Capit疣 de dataDyne\n", + /* 7*/ "Fuera de mi oficina...\n", + /* 8*/ "Ve al helipuerto si quieres vivir.\n", + /* 9*/ "。No me disparar疽!\n", + /* 10*/ "。Cmo te atreves a molestarme!\n", + /* 11*/ "Vas a lamentar esta intrusin, chica.\n", + /* 12*/ "Si yo fuera t, me marchara... 。AHORA!\n", + /* 13*/ "。No me disparar疽!\n", + /* 14*/ "Cassandra ha sido inmovilizada.\n", + /* 15*/ "Cassandra ha sido capturada con 騙ito.\n", + /* 16*/ "El jefe de seguridad ha sido eliminado.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Bomba Skedar recogida.\n", + /* 22*/ "La Bomba Skedar ha sido colocada con 騙ito.\n", + /* 23*/ "La Bomba Skedar ha sido detonada.\n", + /* 24*/ "Ascensor bloqueado. La bomba no puede ser colocada.\n", + /* 25*/ "El ascensor ha sido desactivado.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/ameE.c b/src/files/lang/pal-final/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-final/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ameJ.c b/src/files/lang/pal-final/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/pal-final/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ameP.c b/src/files/lang/pal-final/ameP.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-final/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_f.c b/src/files/lang/pal-final/ame_str_f.c new file mode 100644 index 000000000..adefe2c1c --- /dev/null +++ b/src/files/lang/pal-final/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situ sur l'un des toits de l'immeuble, loin des interf駻ences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les cam駻as de surveillance. La mine doit 黎re fix sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-cl de De Vries\n\nCassandra De Vries porte la cl d'acc鑚 aux zones interdites de l'immeuble sur son collier. Il est connect ses pulsations et cessera de fonctionner si elle vient mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Acc馘er aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est l'ordre du jour d'une r騏nion, dans l'un des bureaux. Le dirigeant charg du projet du Dr. Caroll sera pr駸ent. Suivez-le jusqu' son bureau et acc馘ez ses fichiers, puis t駘馗hargez-les gr稍e votre r馗epteur.\n\n|Objectif 4: - Brouiller les communications ext駻ieures\n\nAchevez le brouillage des communications en pla軋nt une autre mine CME sur le mat駻iel de la salle de surveillance la base de l'immeuble. Ils ne pourront ainsi appeler des renforts ext駻ieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, et elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situ sur l'un des toits de l'immeuble, loin des interf駻ences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les cam駻as de surveillance. La mine doit 黎re appliqu馥 sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-cl de De Vries\n\nCassandra De Vries porte sa cl d'acc鑚 aux zones interdites de l'immeuble sur son collier. Il est connect ses pulsations et cessera de fonctionner si elle vient mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications ext駻ieures\n\nAchevez le brouillage des communications en pla軋nt une autre mine CME sur le mat駻iel de la salle de surveillance la base de l'immeuble. Ils ne pourront ainsi appeler des renforts ext駻ieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Il affirme avoir critiqu les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nVoici votre premi鑽e mission, Joanna, elle est d'une haute importance. Il nous faut r馗up駻er le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: 駱argner les civils d駸arm駸. Souvenez-vous: les cl駸 cod馥s ne fonctionnent que si leurs d騁enteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de s馗urit menant au laboratoire souterrain o le Dr. Caroll est d騁enu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne:\nQG central Chicago IL USA.", + /* 10*/ "Heure: 02:30 15 AOUT 2023\n", + /* 11*/ "Obtenir collier de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collier\n", + /* 14*/ "Collier de De Vries\n", + /* 15*/ "Collier de De Vries obtenu.\n", + /* 16*/ "Neutraliser relais int駻ieur\n", + /* 17*/ "Obtenir collier-cl饅n", + /* 18*/ "T駘馗harger fichiers\n", + /* 19*/ "Neutraliser relais ext駻ieur\n", + /* 20*/ "Acc馘er au laboratoire\n", + /* 21*/ "Qui 黎es-vous? Que faites-vous l?\n", + /* 22*/ "Attention! Elle est arm馥!\n", + /* 23*/ "Vous n'oserez pas... Jeune sotte!\n", + /* 24*/ "Savez-vous qui je suis?\n", + /* 25*/ "J'appelle la s馗urit.\n", + /* 26*/ "PITIE!!!! Ne me tuez pas!\n", + /* 27*/ "Un conseil: partez, MAINTENANT!\n", + /* 28*/ "Mine CME mal plac馥.\n", + /* 29*/ "Mine CME plac馥 correctement.\n", + /* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n", + /* 31*/ " MISSION ACCOMPLIE \n", + /* 32*/ "Objectifs inatteignables.\n", + /* 33*/ "Il est temps d'effacer les fichiers.\n", + /* 34*/ "Ordinateur dirigeant effac.\n", + /* 35*/ "Je ferai ce que vous voulez!\n", + /* 36*/ "A L'AIDE - Intrus!\n", + /* 37*/ "Vous parlez trop.\n", + /* 38*/ "AU SECOURS! A MOI!\n", + /* 39*/ "Je ferai ce que vous voulez...\n", + /* 40*/ "Je me connecte...\n", + /* 41*/ "OK. Connexion termin馥...\n", + /* 42*/ "Adieu, Dr. Caroll.\n", + /* 43*/ "La fin est proche, sale tratre!\n", + /* 44*/ "T駘馗hargement en cours.\n", + /* 45*/ "T駘馗hargement complet.\n", + /* 46*/ "ACCES REFUSE - mot de passe requis.\n", + /* 47*/ "Porte d騅errouill馥.\n", + /* 48*/ "HEIN?!\n", + /* 49*/ "Erreur t駘馗harg. - R馗epteur absent.\n", + /* 50*/ "LUMIERES ON\n", + /* 51*/ "LUMIERES OFF\n", + /* 52*/ "Effacez la conversation du Dr. Caroll.\n", + /* 53*/ "Ne...ne tirez pas!\n", + /* 54*/ "Objet crucial d騁ruit.\n", + /* 55*/ "Pertes civiles inacceptables.\n", + /* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 57*/ "Personnel crucial tu.\n", + /* 58*/ "Obtenir mines CME.\n", + /* 59*/ "Dr. Caroll: \n", + /* 60*/ "Mine CME\n", + /* 61*/ "Une Mine CME\n", + /* 62*/ "Mine CME obtenue.\n", + /* 63*/ "Obtenir r馗epteur.\n", + /* 64*/ "\n", + /* 65*/ "R馗epteur\n", + /* 66*/ "Un r馗epteur\n", + /* 67*/ "R馗epteur obtenu.\n", + /* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalit.\n", + /* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en m麥e temps.\n", + /* 70*/ "Je m'y mets tout de suite. Au revoir.\n", + /* 71*/ "Au pied!\n", + /* 72*/ "J'ai un probl鑪e de mot de passe, et vous \nallez le r駸oudre.\n", + /* 73*/ "Ne tirez pas! Ne tirez pas!\n", + /* 74*/ "Transfert interrompu - connexion perdue.\n", + /* 75*/ "Erreur transfert - t駘馗hargement incomplet.\n", + /* 76*/ "Syst鑪e de s馗urit temporairement annul.\n", + /* 77*/ "Communications ext駻ieures coup馥s.\n", + /* 78*/ "Ascenseur du laboratoire localis.\n", + /* 79*/ "S馗urit!!! A l'aide!\n", + /* 80*/ "Mine CME requise pour brouiller s馗urit.\n", + /* 81*/ "Mine CME requise pour brouiller coms.\n", + /* 82*/ "Leurre\n", + /* 83*/ "Vous osez me d駻anger?\n", + /* 84*/ "Vous allez le regretter, jeune fille!\n", + /* 85*/ "Un conseil: partez...MAINTENANT!\n", + /* 86*/ "Ne me tuez pas!\n", + /* 87*/ "Piti!\n", + /* 88*/ "Obtenir CamSpy.\n", + /* 89*/ "La CamSpy du\n", + /* 90*/ "Dr. Caroll\n", + /* 91*/ "Une CamSpy\n", + /* 92*/ "CamSpy obtenue.\n", + /* 93*/ "Signal positif - \nle relais de com int駻ieur est proche.\n", + /* 94*/ "Le bureau de Cassandra est \ncet 騁age.\n", + /* 95*/ "L'autre relais doit 黎re dans la \nsalle de surveillance.\n", + /* 96*/ "L'ascenseur souterrain doit 黎re dans \nle coin.\n", + /* 97*/ "Syst鑪e de s馗urit op駻ationnel.\n", + /* 98*/ "Bravo...軋 ne marche plus!\n", + /* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n", + /*100*/ "Pourquoi agir si vite?\n", + /*101*/ "Si le Dr. Caroll n'est pas sauv ce soir, \nses sup駻ieurs conditionneront son \nesprit et nous ne pourrons d馗ouvrir \nles plans de la dataDyne. \n", + /*102*/ "Peut-on les 駘iminer?\n", + /*103*/ "Pas de b黎ises: une cl de s馗urit ne \nfonctionne que si le d騁enteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes arm駸...\n", + /*104*/ "O se trouve la cible?\n", + /*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninf駻ieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n", + /*106*/ "Comment le reconnatre?\n", + /*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n", + /*108*/ "OK. J'y suis...\n", + /*109*/ "Je...Je me connecte.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_g.c b/src/files/lang/pal-final/ame_str_g.c new file mode 100644 index 000000000..239a44f97 --- /dev/null +++ b/src/files/lang/pal-final/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschtzt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu knnen. Sie mssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries tr臠t den Codeschlssel fr Sperrzonen innerhalb des Geb舫des an ihrer Halskette. Der Schlssel steht in Verbindung mit ihrem persnlichen Gesundheitsstatus ワberwachungsger舩. Sobald kein Lebenszeichen mehr bertragen wird, verliert der Schlssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafr, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird ber Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der fr Dr. Carolls Projekt verantwortlich zeichnet anwesend ist, findet in einem der Brotrakte statt. Folgen Sie ihm in sein Bro, greifen Sie auf die Projektdaten zu und bertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Ger舩es.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Geb舫des anbringen. Dadurch werden s舂tliche automatisch generierten SOS-Rufe nach drau゚en blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschtzt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu knnen. Sie mssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries tr臠t den Codeschlssel fr Sperrzonen innerhalb des Geb舫des an ihrer Halskette. Der Schlssel steht in Verbindung mit ihrem persnlichen Gesundheitsstatus ワberwachungsger舩. Sobald kein Lebenszeichen mehr bertragen wird, verliert der Schlssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafr, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Geb舫des anbringen. Dadurch werden s舂tliche automatisch generierten SOS-Rufe nach drau゚en blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste fr unsere Organisation. Wir mssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zust゚t. Au゚erdem mssen wir unbedingt Einsicht in die zuknftigen Aktivit舩en von dataDyne bekommen. Fr diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.", + /* 10*/ "0230 Uhr 15 AUG 2023\n", + /* 11*/ "Bringen Sie die De Vries' Halskette in Ihren Besitz!\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Halskette\n", + /* 14*/ "De Vries' Halskette\n", + /* 15*/ "De Vries' Halskette aufgenommen\n", + /* 16*/ "Blockieren Sie das Sicherheitssystem!\n", + /* 17*/ "Finden Sie den Schlssel!\n", + /* 18*/ "Kopieren Sie die Projektdaten!\n", + /* 19*/ "Blockieren Sie die externe Sicherheit!\n", + /* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n", + /* 22*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 23*/ "Du wirst nicht auf mich schie゚en, dummes Kind!\n", + /* 24*/ "Du wei゚t wohl nicht, wer ich bin.\n", + /* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n", + /* 26*/ "BITTE!!!! Tun Sie mir nichts!\n", + /* 27*/ "W舐e ich du, wrde ich verschwinden... und zwar JETZT!\n", + /* 28*/ "ECM-Mine wurde nicht korrekt platziert.\n", + /* 29*/ "ECM-Mine wurde korrekt platziert.\n", + /* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollst舅dig.\n", + /* 31*/ " MISSION ERFOLGREICH \n", + /* 32*/ "Erreichung aller Ziele UNMヨGLICH.\n", + /* 33*/ "Es ist an der Zeit, diese Daten zu lschen.\n", + /* 34*/ "Festplatte gelscht\n", + /* 35*/ "Ich tue alles, was Sie verlangen!\n", + /* 36*/ "HILFE - Ein Eindringling!\n", + /* 37*/ "Du sprichst zuviel.\n", + /* 38*/ "HILFE, HILFE!\n", + /* 39*/ "Ich tue alles, was Sie verlangen...\n", + /* 40*/ "Ich logge mich jetzt ein...\n", + /* 41*/ "Okay, ich bin drin...\n", + /* 42*/ "Auf Wiedersehen, Dr. Caroll.\n", + /* 43*/ "Du hast deinen letzten Virus geschrieben, Verr舩er!\n", + /* 44*/ "Kopiervorgang gestartet\n", + /* 45*/ "Kopiervorgang abgeschlossen\n", + /* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich\n", + /* 47*/ "Trverriegelung aufgehoben\n", + /* 48*/ "HトH!\n", + /* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n", + /* 50*/ "BELEUCHTUNG AKTIVIERT\n", + /* 51*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 52*/ "Lschen Sie die Konversation mit Dr. Caroll...\n", + /* 53*/ "Nicht schie゚en, nicht schie゚en!\n", + /* 54*/ "Wichtiges Objekt zerstrt\n", + /* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n", + /* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmglich\n", + /* 57*/ "Wichtige Person neutralisiert\n", + /* 58*/ "Erlangen Sie ECM-Minen.\n", + /* 59*/ "Dr. Carolls\n", + /* 60*/ "ECM-Mine\n", + /* 61*/ "Eine ECM-Mine\n", + /* 62*/ "ECM-Mine aufgenommen\n", + /* 63*/ "Erlangen Sie das Data Uplink-Ger舩.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "Ein Data Uplink\n", + /* 67*/ "Data Uplink aufgenommen\n", + /* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n", + /* 69*/ "Nein, ich kann den Vorgang von meinem Bro\naus initiieren und die entsprechenden Files lschen.\nJa, das erfolgt gleichzeitig.\n", + /* 70*/ "Ich fange sofort an. Wiederhren.\n", + /* 71*/ "Beweg dich!\n", + /* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n", + /* 73*/ "Nicht schie゚en, nicht schie゚en!\n", + /* 74*/ "Datalink defekt - Verbindung terminiert\n", + /* 75*/ "Datalink Error - Kopiervorgang unvollst舅dig\n", + /* 76*/ "Internes Sicherheitssystem tempor舐 au゚er Kraft gesetzt.\n", + /* 77*/ "Externe Kommunikationssysteme au゚er Kraft gesetzt.\n", + /* 78*/ "Aufzug zum Labor geortet.\n", + /* 79*/ "Security... Hilfe!\n", + /* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine bentigt.\n", + /* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine bentigt.\n", + /* 82*/ "Dummy\n", + /* 83*/ "Wie kannst du es wagen, mich zu stren?\n", + /* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n", + /* 85*/ "W舐e ich du, wrde ich verschwinden,... und zwar JETZT!\n", + /* 86*/ "Bitte tun Sie mir nichts!\n", + /* 87*/ "Nicht schie゚en!\n", + /* 88*/ "Erlangen Sie den CamSpy.\n", + /* 89*/ "Dr. Carolls\n", + /* 90*/ "CamSpy\n", + /* 91*/ "Ein CamSpy\n", + /* 92*/ "CamSpy aufgenommen\n", + /* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock fr die internen Sicherheitssysteme muss in der N臧e sein.\n", + /* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Bro.\n", + /* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n", + /* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n", + /* 97*/ "Das Sicherheitssystem ist wieder online.\n", + /* 98*/ "Du Vandale, du hast es zerstrt!\n", + /* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n", + /*100*/ "Warum die Hektik?\n", + /*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So wrden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n", + /*102*/ "Sind dort alle Personen entbehrlich?\n", + /*103*/ "Machen Sie keine Witze! Sie mssen vorsichtig sein, Joanna. \nCodeschlssel ntzen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlssel seinen Wert. Bewaffnete Wachen sind natrlich \nein anderes Thema...\n", + /*104*/ "Wie lautet der Zielbereich?\n", + /*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n", + /*106*/ "Woran erkenne ich ihn?\n", + /*107*/ "Wir verfgen ber kein Bildmaterial, und wir knnen \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glck, Perfect Dark.\n", + /*108*/ "Ich bin jetzt drin...\n", + /*109*/ "Ich...Ich logge mich jetzt ein.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_i.c b/src/files/lang/pal-final/ame_str_i.c new file mode 100644 index 000000000..9d8f54ff5 --- /dev/null +++ b/src/files/lang/pal-final/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perch abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana connessa ad un sensore del suo stato di salute e si disattiver in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo mander in tilt la richiesta automatica d'aiuto esterno, mettendo cos totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perch abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana connessa ad un sensore del suo stato di salute e si disattiver in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo mander in tilt la richiesta automatica d'aiuto esterno, mettendo cos totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nJoanna, questa la tua prima missione ed di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di pi sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov' rinchiuso il Dr. Caroll. La sua posizione esatta sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.", + /* 10*/ "Ore 0230 15 AGO 2023\n", + /* 11*/ "Prendi collana di De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collana\n", + /* 14*/ "Collana di De Vries\n", + /* 15*/ "Presa collana di De Vries.\n", + /* 16*/ "Disattiva sistema di sicurezza interno\n", + /* 17*/ "Prendi collana-chiave\n", + /* 18*/ "Scarica file del progetto\n", + /* 19*/ "Disattiva sistema di sicurezza esterno\n", + /* 20*/ "Cerca di entrare nel laboratorio\n", + /* 21*/ "Chi sei e che ci fai qui?\n", + /* 22*/ "Attenzione! ネ armata.\n", + /* 23*/ "Non lo farei se fossi in te!\n", + /* 24*/ "Tu non sai chi sono io!\n", + /* 25*/ "Vediamo come fai con la sicurezza.\n", + /* 26*/ "TI PREGO!!! Non sparare!\n", + /* 27*/ "Se fossi in te girerei i tacchi!\n", + /* 28*/ "Mina in posizione errata\n", + /* 29*/ "Mina piazzata correttamente\n", + /* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 31*/ " MISSIONE COMPIUTA \n", + /* 32*/ "IMPOSSIBILE completare obiettivi!\n", + /* 33*/ "ネ ora di cancellare i file.\n", + /* 34*/ "Cancellato PC direttore.\n", + /* 35*/ "Far quel che vuoi!\n", + /* 36*/ "ALLARME - Intrusione!\n", + /* 37*/ "Tu parli troppo!\n", + /* 38*/ "AIUTO! AIUTO!\n", + /* 39*/ "Far quel che vuoi...\n", + /* 40*/ "Connessione in corso...\n", + /* 41*/ "Bene, ci sono...\n", + /* 42*/ "Arrivederci, Dr. Caroll.\n", + /* 43*/ "Comincia a pregare, verme!\n", + /* 44*/ "Scaricamento in corso\n", + /* 45*/ "Scaricamento completato\n", + /* 46*/ "ACCESSO NEGATO: inserire password\n", + /* 47*/ "Aperta la porta!\n", + /* 48*/ "TOH!\n", + /* 49*/ "Impossibile scaricare: serve Connettore Dati\n", + /* 50*/ "LUCI ACCESE\n", + /* 51*/ "LUCI SPENTE\n", + /* 52*/ "Cancellare conversazione con Dr. Caroll\n", + /* 53*/ "Non sparare! Non sparare!\n", + /* 54*/ "Distrutto strumento essenziale alla missione\n", + /* 55*/ "Vittime civili inaccettabili\n", + /* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 57*/ "Ucciso personale essenziale alla missione\n", + /* 58*/ "Procurati mina ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Mina ECM\n", + /* 62*/ "Presa mina ECM\n", + /* 63*/ "Procurati Connettore Dati.\n", + /* 64*/ "\n", + /* 65*/ "C. Dati\n", + /* 66*/ "Un Connettore Dati\n", + /* 67*/ "Preso Connettore Dati.\n", + /* 68*/ "S, s! Sono d'accordo. Possibili vittime\n sono giustificate.\n", + /* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n", + /* 70*/ "Inizier subito. A dopo.\n", + /* 71*/ "Muoviti!\n", + /* 72*/ "Ho problemi con la password, e tu sei \nl'unico che pu aiutarmi.\n", + /* 73*/ "Non sparare! Non sparare!\n", + /* 74*/ "Errore datalink: connessione terminata\n", + /* 75*/ "Errore datalink: scaricamento incompleto\n", + /* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n", + /* 77*/ "Sistema di sicurezza esterno fuori uso.\n", + /* 78*/ "Ascensore laboratorio localizzato.\n", + /* 79*/ "Sicurezza... Aiuto!\n", + /* 80*/ "Serve mina ECM per disattivare sicurezza interno\n", + /* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n", + /* 82*/ "Idiota\n", + /* 83*/ "Come osi disturbarmi!\n", + /* 84*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 85*/ "Se fossi in te starei alla larga!\n", + /* 86*/ "Ti prego, risparmiami!\n", + /* 87*/ "Non sparare!\n", + /* 88*/ "Procurati TeleSpia.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "TeleSpia\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "Presa la TeleSpia.\n", + /* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n", + /* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n", + /* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n", + /* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n", + /* 97*/ "Il sistema di sicurezza funziona ora.\n", + /* 98*/ "L'hai rotto, maledizione!\n", + /* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n", + /*100*/ "Cos' tutta 'sta fretta?\n", + /*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli far il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n", + /*102*/ "Posso fare piazza pulita?\n", + /*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta \nancora vivo; altrimenti si disattiver. \nCerto, con le guardie armate \n tutta un'altra storia! \n", + /*104*/ "Dove si trova l'obiettivo?\n", + /*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n", + /*106*/ "Come faccio a riconoscerlo?\n", + /*107*/ "Non abbiamo n sue foto, n file \nufficiali. Tutto ci che abbiamo il \nsuo nome. Buona fortuna, Perfect Dark.\n", + /*108*/ "Ok, ci sono...\n", + /*109*/ "Sto... sto entrando!\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_s.c b/src/files/lang/pal-final/ame_str_s.c new file mode 100644 index 000000000..ecadad960 --- /dev/null +++ b/src/files/lang/pal-final/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para nosotros. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nノste est localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tr畴ico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las c疥aras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Acta r疳ido ya que la mina durar m疽 o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las 疵eas restringidas del edificio en su collar. Est conectado con su monitor personal de corazn y dejar de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll est siendo decidido en una reunin en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll est all presente. Sguele a su oficina y accede a los ficheros de su proyecto, entonces m疣danoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexin Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagn' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloquear cualquier llamada autom疸ica para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para nosotros. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nノste est localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tr畴ico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las c疥aras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Acta r疳ido ya que la mina durar m疽 o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las 疵eas restringidas del edificio en su collar. Est conectado con su monitor personal de corazn y dejar de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexin Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagn' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloquear cualquier llamada autom疸ica para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne maana por la noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nノsta es tu primera misin, Joanna, y no podra ser m疽 crucial para nosotros. Necesitamos sacar al Dr. Caroll de all antes de que le ocurra algo, y adem疽 necesitamos conocer los futuros planes de dataDyne. Se aplicar, como siempre, la poltica de la organizacin: no matar civiles desarmados. Recuerda, las llaves de cdigo slo funcionan si sus propietarios est疣 vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Stano donde el Dr. Caroll est encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algn lugar del nivel del vestbulo.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCG Divisin Central Chicago IL EE.UU.", + /* 10*/ "0230 Horas 15 AGO 2023\n", + /* 11*/ "Obt駭 el collar de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collar\n", + /* 14*/ "Collar de De Vries\n", + /* 15*/ "Collar de De Vries obtenido.\n", + /* 16*/ "Desactivar puerto interno de seguridad\n", + /* 17*/ "Obtener el collar-cdigo\n", + /* 18*/ "Descargar los ficheros del proyecto\n", + /* 19*/ "Desactivar puerto de com. externas\n", + /* 20*/ "Entrar en el laboratorio\n", + /* 21*/ "ソQui駭 eres t y qu est疽 haciendo aqu?\n", + /* 22*/ "。Cuidado! Tiene un arma.\n", + /* 23*/ "。No me disparar疽, tonta criatura!\n", + /* 24*/ "ソNo sabes qui駭 soy?\n", + /* 25*/ "Veamos cmo te las apaas con seguridad.\n", + /* 26*/ "。。。。POR FAVOR!!!! 。No me mates!\n", + /* 27*/ "Si fuera t, me marchara... 。AHORA!\n", + /* 28*/ "Mina ECM mal colocada.\n", + /* 29*/ "Mina ECM colocada correctamente.\n", + /* 30*/ "MISIモN FALLADA: objetivos incompletos.\n", + /* 31*/ " MISIモN CONSEGUIDA \n", + /* 32*/ "NO PUEDES completar todos los objetivos.\n", + /* 33*/ "Es hora de borrar esos ficheros.\n", + /* 34*/ "Ordenador del ejecutivo borrado.\n", + /* 35*/ "。Har lo que t quieras!\n", + /* 36*/ "AYUDA. 。Intruso!\n", + /* 37*/ "Hablas demasiado.\n", + /* 38*/ "。AYUDA, AYUDA!\n", + /* 39*/ "。Har lo que t quieras!\n", + /* 40*/ "Conectando ahora...\n", + /* 41*/ "Vale, estoy dentro...\n", + /* 42*/ "Adis, Dr. Caroll.\n", + /* 43*/ "。Has procesado tu ltimo error, traidor!\n", + /* 44*/ "Descarga del fichero iniciada.\n", + /* 45*/ "Descarga del fichero completada.\n", + /* 46*/ "ACCESO DENEGADO. Necesitas la contrasea.\n", + /* 47*/ "Puerta desbloqueada.\n", + /* 48*/ "。OH!\n", + /* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n", + /* 50*/ "LUCES ENCENDIDAS\n", + /* 51*/ "LUCES APAGADAS\n", + /* 52*/ "Borra la conversacin del Dr. Caroll...\n", + /* 53*/ "。No dispares, no dispares!\n", + /* 54*/ "Objeto crtico de la misin destruido.\n", + /* 55*/ "Bajas civiles inaceptables.\n", + /* 56*/ "MISIモN FALLADA:\n los objetivos no pueden ser completados.\n", + /* 57*/ "Ha muerto una persona crtica para la misin.\n", + /* 58*/ "Obt駭 las Minas ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Una Mina ECM\n", + /* 62*/ "Mina ECM obtenida.\n", + /* 63*/ "Obt駭 el Conector de Datos.\n", + /* 64*/ "\n", + /* 65*/ "C. Datos\n", + /* 66*/ "Un Conector de Datos\n", + /* 67*/ "Conector de Datos obtenido.\n", + /* 68*/ "S, s, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n", + /* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n", + /* 70*/ "Empezar enseguida. Adis.\n", + /* 71*/ "。En marcha!\n", + /* 72*/ "Tengo un problema de contraseas, y t \neres el hombre que puede ayudarme con ello.\n", + /* 73*/ "。No dispares, no dispares!\n", + /* 74*/ "Enlace de Datos perdido - conexin terminada.\n", + /* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n", + /* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n", + /* 77*/ "Puerto de comunicaciones externas desactivado.\n", + /* 78*/ "Ascensor del laboratorio localizado.\n", + /* 79*/ "Seguridad... 。Aydenme!\n", + /* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n", + /* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n", + /* 82*/ "Tonto\n", + /* 83*/ "。Cmo te atreves a molestarme!\n", + /* 84*/ "。Te vas a arrepentir de esta intrusin, chica!\n", + /* 85*/ "Si yo fuera t, me ira... 。YA!\n", + /* 86*/ "。Por favor, no me mates!\n", + /* 87*/ "。No dispares!\n", + /* 88*/ "Obt駭 la C疥ara Espa.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "C疥ara Espa\n", + /* 91*/ "Una C疥ara Espa\n", + /* 92*/ "C疥ara Espa obtenida.\n", + /* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno est cerca.\n", + /* 94*/ "Est疽 en la misma planta que \nla oficina de Cassandra.\n", + /* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n", + /* 96*/ "El ascensor del stano debe de estar por \naqu en algn lugar.\n", + /* 97*/ "El sistema de seguridad est activo de nuevo.\n", + /* 98*/ "。V疣dalo! 。Lo has roto!\n", + /* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n", + /*100*/ "ソPor qu tanta prisa?\n", + /*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavar el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n", + /*102*/ "ソSon todos prescindibles?\n", + /*103*/ "。No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves cdigo slo funcionan cuando el \npropietario est vivo... Si les matas, la llave \nes intil. Los guardas armados son otra cosa, \npor supuesto.\n", + /*104*/ "ソDnde se encuentra el objetivo?\n", + /*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estar en el laboratorio de \ninvestigacin en algn lugar del subsuelo.\n", + /*106*/ "ソCmo le reconocer?\n", + /*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n", + /*108*/ "Bien, estoy dentro...\n", + /*109*/ "Estoy... estoy entrando ahora.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/archE.c b/src/files/lang/pal-final/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/archJ.c b/src/files/lang/pal-final/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/archP.c b/src/files/lang/pal-final/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_f.c b/src/files/lang/pal-final/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_g.c b/src/files/lang/pal-final/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_i.c b/src/files/lang/pal-final/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_s.c b/src/files/lang/pal-final/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arecE.c b/src/files/lang/pal-final/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arecJ.c b/src/files/lang/pal-final/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arecP.c b/src/files/lang/pal-final/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_f.c b/src/files/lang/pal-final/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_g.c b/src/files/lang/pal-final/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_i.c b/src/files/lang/pal-final/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_s.c b/src/files/lang/pal-final/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arkE.c b/src/files/lang/pal-final/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-final/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/arkJ.c b/src/files/lang/pal-final/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/pal-final/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/arkP.c b/src/files/lang/pal-final/arkP.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-final/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_f.c b/src/files/lang/pal-final/ark_str_f.c new file mode 100644 index 000000000..6451563d5 --- /dev/null +++ b/src/files/lang/pal-final/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - R饌ctiver l'ascenseur\n\nNous avons d騁ect la commande d'arr黎 de fonctionnement de l'ascenseur donn馥 par un PC des bureaux inf駻ieurs. Trouvez ce terminal et modifiez la commande pour r饌ctiver l'ascenseur.\n\n|Objectif 3: - D騁ruire l'h駘ico de combat dataDyne\n\nUn h駘ico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous interdire l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 5: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - D騁ruire l'h駘ico de combat dataDyne\n\nUn h駘ico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous barrer l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 4: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nL'alarme a 騁 donn馥 et les troupes d'intervention de la dataDyne sont vos trousses dans l'immeuble. Une 騅entuelle fuite par le hall est impossible cause du nombre de gardes pr駸ents. Rejoignez l'h駘iport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de prot馮er le Dr. Caroll tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Acc馘er aux niveaux sup駻ieurs\n\nFrayez-vous un chemin autour du hall jusqu' acc馘er l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux sup駻ieurs du b穰iment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir d駱loy ses gardes du corps pour vous barrer l'acc鑚 l'h駘iport. Vous ne pourrez les semer, alors pr駱arez-vous un combat acharn.\n\n|Objectif 3: - Retour l'h駘iport pour 騅acuation\n\nAcc馘ez l'h駘iport o votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acc馘er l'ascenseur du hall\n", + /* 10*/ "R饌ctiver l'ascenseur du bureau\n", + /* 11*/ "D騁ruire l'hovercopter dataDyne\n", + /* 12*/ "Battre les gardes de Cassandra\n", + /* 13*/ "Retour l'h駘iport avec Dr. Caroll\n", + /* 14*/ "Acc鑚 param鑼res ascenseur...\n", + /* 15*/ "LUMIERES ON\n", + /* 16*/ "Dr. Caroll abattu!\n", + /* 17*/ "Dr. Caroll sous feu ennemi!\n", + /* 18*/ "Dr. Caroll endommag!\n", + /* 19*/ "Trop tard! La voici...\n", + /* 20*/ "Vous 黎es une sacr馥 peste, vous...\n", + /* 21*/ "Bonne nuit, Miss Dark.\n", + /* 22*/ "LUMIERES ON\n", + /* 23*/ "LUMIERES OFF\n", + /* 24*/ "MISSION ECHOUEE\n", + /* 25*/ "MISSION ACCOMPLIE\n", + /* 26*/ "Emplacement pour warning h駘ico.\n", + /* 27*/ "Obtenir Vue nocturne.\n", + /* 28*/ "Cassandra De Vries: \n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne\n", + /* 31*/ "Vue nocturne obtenue.\n", + /* 32*/ "Re-bonjour, jeune fille!\n", + /* 33*/ "Ascenseur hall atteint.\n", + /* 34*/ "Porte ascenseur bureau ouverte.\n", + /* 35*/ "Hovercopter dataDyne 駘imin.\n", + /* 36*/ "Gardes de Cassandra vaincus.\n", + /* 37*/ "Mais...pas comme 軋!\n", + /* 38*/ "Mais si.\n", + /* 39*/ "Vous faites n'importe quoi!\n", + /* 40*/ "Silence.\n", + /* 41*/ "Mais d駱鹹hez-vous!\n", + /* 42*/ "Oh, non...trop tard.\n", + /* 43*/ "La voil...\n", + /* 44*/ "Attrapez-la!\n", + /* 45*/ "Objet crucial d騁ruit. \n", + /* 46*/ "Obtenir CamSpy.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "CamSpy\n", + /* 49*/ "Une CamSpy\n", + /* 50*/ "CamSpy obtenue.\n", + /* 51*/ "Ils ont verrouill le rez-de-chauss馥 - \nallez l'ascenseur!\n", + /* 52*/ "Il faut d騁ruire cet h駘ico ou le \ntransport sera descendu!\n", + /* 53*/ "Je ne peux laisser un garde du corps vivant.\n", + /* 54*/ "Ne faites attendre le transport - \nretournez l'h駘iport.\n", + /* 55*/ "Obtenir la carte alpha.\n", + /* 56*/ "Garde: \n", + /* 57*/ "Carte de bureau\n", + /* 58*/ "Carte du bureau\n", + /* 59*/ "Carte de bureau de Cassandra obtenue.\n", + /* 60*/ "Alerte! Elle est ici!\n", + /* 61*/ "Bonne nuit!\n", + /* 62*/ "Qu'est-ce qu...?\n", + /* 63*/ "On se balade?\n", + /* 64*/ "Qu'est-ce qu'elle veut m鑽e-grand?\n", + /* 65*/ "Remettez-moi le sapiens imm馘iatement! Vous ne \nsavez pas ce que vous faites...\n", + /* 66*/ "Oh que si. Je rentre chez moi.\n", + /* 67*/ "Pour la derni鑽e fois: rendez ce qui \nm'appartient et je vous offre un poste.\n", + /* 68*/ "D駸ol馥! Je me tire.\n", + /* 69*/ "Il nous faut le sapiens. Le reste de \nl'op駻ation en d駱end.\n", + /* 70*/ "J'en suis consciente!\n", + /* 71*/ "Je sais aussi qui m'adresser...\nMr. Carrington.\n", + /* 72*/ "Porte d'ascenseur inutilisable cet 騁age.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_g.c b/src/files/lang/pal-final/ark_str_g.c new file mode 100644 index 000000000..33daba87e --- /dev/null +++ b/src/files/lang/pal-final/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Brotrakt. Sie mssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Geb舫de. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit mssen Sie mit 舫゚erster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Geb舫de. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit mssen Sie mit 舫゚erster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelst, und dataDyne Einsatztruppen sind im gesamten Geb舫de verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmglich, das Geb舫de durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umst舅den zu beschtzen. Cassandra und dataDyne werden alle ihnen zur Verfgung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glck.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nK舂pfen Sie sich am Foyer vorbei, bis Sie einen der Aufzge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Geb舫des bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden knnen. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nK舂pfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie blo゚ nicht Dr. Caroll!\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n", + /* 10*/ "Reaktivieren Sie den Bro-Aufzug!\n", + /* 11*/ "Zerstren Sie das dataDyne-Gunship!\n", + /* 12*/ "Neutralisieren Sie De Vries' Bodyguards!\n", + /* 13*/ "Erreichen Sie das Helipad!\n", + /* 14*/ "Zugriff auf die Aufzge erfolgt...\n", + /* 15*/ "BELEUCHTUNG AKTIVIERT!\n", + /* 16*/ "Dr. Caroll wurde zerstrt!\n", + /* 17*/ "Dr. Caroll wird angegriffen!\n", + /* 18*/ "Dr. Caroll wurde besch臈igt!\n", + /* 19*/ "Zu sp舩! Sie ist hier...\n", + /* 20*/ "Du wirst langsam richtig l舖tig...\n", + /* 21*/ "Gute Nacht, Ms. Dark.\n", + /* 22*/ "BELEUCHTUNG AKTIVIERT\n", + /* 23*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 24*/ "MISSION FEHLGESCHLAGEN\n", + /* 25*/ "MISSION ERFOLGREICH\n", + /* 26*/ "Gunship-Warnung!!!\n", + /* 27*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 28*/ "Cassandra De Vries\n", + /* 29*/ "Nachtsichtger舩\n", + /* 30*/ "Nachtsichtger舩\n", + /* 31*/ "Nachtsichtger舩 aufgenommen\n", + /* 32*/ "So trifft man sich wieder, Kleine!\n", + /* 33*/ "Foyer-Aufzug betreten\n", + /* 34*/ "Tr zum Bro-Aufzug entriegelt\n", + /* 35*/ "dataDyne-Gunship eliminiert\n", + /* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n", + /* 37*/ "So funktioniert das nicht.\n", + /* 38*/ "Doch, tut es.\n", + /* 39*/ "Gib das her - du machst das falsch!\n", + /* 40*/ "Hr auf mich zu nerven.\n", + /* 41*/ "Wrdest du dich bitte beeilen?\n", + /* 42*/ "Oh nein, ...zu sp舩!\n", + /* 43*/ "Sie ist hier...\n", + /* 44*/ "Schnappt sie!\n", + /* 45*/ "Wichtiges Objekt zerstrt\n", + /* 46*/ "Erlangen Sie den CamSpy.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "CamSpy\n", + /* 49*/ "Ein CamSpy\n", + /* 50*/ "CamSpy aufgenommen\n", + /* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n", + /* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n", + /* 53*/ "Ich muss mich noch um die Bodyguards kmmern.\n", + /* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurck zum Helipad!\n", + /* 55*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 56*/ "Wachen\n", + /* 57*/ "Bro-Schlsselkarte\n", + /* 58*/ "Bro-Schlsselkarte\n", + /* 59*/ "Cassandras Bro-Schlsselkarte aufgenommen\n", + /* 60*/ "Gebt Alarm - sie ist hier!\n", + /* 61*/ "Licht AUS!\n", + /* 62*/ "Was zum...?\n", + /* 63*/ "Na, wohin willst du denn?\n", + /* 64*/ "Kann ich etwas fr dich tun, alte Frau?\n", + /* 65*/ "Geben Sie uns den Sapienten sofort zurck! Sie wissen \nnicht, was Sie da tun!\n", + /* 66*/ "Doch, das tue ich. Ich verschwinde.\n", + /* 67*/ "Letzte Chance: Geben Sie ihn zurck, und Sie\nknnten vielleicht in Zukunft fr mich arbeiten.\n", + /* 68*/ "Tut mir leid, ich bin in Eile.\n", + /* 69*/ "Sie mssen uns das Ding zurckbringen. Wir knnen \nsonst nicht fortfahren.\n", + /* 70*/ "Das wei゚ ich!\n", + /* 71*/ "Ich wei゚ auch, mit wem ich sprechen muss... \nMr. Carrington.\n", + /* 72*/ "Die Aufzugstren sind auf diesem Stockwerk inaktiv.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_i.c b/src/files/lang/pal-final/ark_str_i.c new file mode 100644 index 000000000..d725498c6 --- /dev/null +++ b/src/files/lang/pal-final/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatter la navetta e annienter anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatter la navetta e annienter anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nネ stato dato l'allarme e l'edificio pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attender il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Usa l'ascensore dell'atrio\n", + /* 10*/ "Riattiva l'ascensore degli uffici\n", + /* 11*/ "Distruggi la cannoniera dataDyne\n", + /* 12*/ "Elimina guardie del corpo di Cassandra\n", + /* 13*/ "Appuntamento all'eliporto\n", + /* 14*/ "I comandi dell'ascensore...\n", + /* 15*/ "LE LUCI SONO ACCESE!\n", + /* 16*/ "Il Dr. Caroll stato ucciso!\n", + /* 17*/ "Attaccano il Dr. Caroll!\n", + /* 18*/ "Il Dr. Caroll ferito!\n", + /* 19*/ "Troppo tardi! ネ gi qui!\n", + /* 20*/ "Sei una vera scocciatura!\n", + /* 21*/ "Buona notte, Perfect Dark!\n", + /* 22*/ "LUCI ACCESE ORA\n", + /* 23*/ "LUCI SPENTE ORA\n", + /* 24*/ "MISSIONE FALLITA\n", + /* 25*/ "MISSIONE COMPIUTA\n", + /* 26*/ "Allarme cannoniera!\n", + /* 27*/ "Procurati Vista Notturna\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Vista Notturna\n", + /* 31*/ "Presa Vista Notturna\n", + /* 32*/ "Chi non muore si rivede!\n", + /* 33*/ "Raggiunto l'ascensore nell'atrio.\n", + /* 34*/ "Aperta la porta ascensore uffici.\n", + /* 35*/ "Eliminata la cannoniera dataDyne.\n", + /* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n", + /* 37*/ "Non si fa cos, idiota!\n", + /* 38*/ "S, invece!\n", + /* 39*/ "Dammi qua! Faccio io!\n", + /* 40*/ "Non scocciarmi!\n", + /* 41*/ "Ti vuoi dare una mossa?!\n", + /* 42*/ "Oh, no! Troppo tardi.\n", + /* 43*/ "Ci ha raggiunti...\n", + /* 44*/ "Prendila!\n", + /* 45*/ "Distrutto strumento essenziale alla missione\n", + /* 46*/ "Procurati TeleSpia.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "TeleSpia\n", + /* 49*/ "TeleSpia\n", + /* 50*/ "Presa la TeleSpia.\n", + /* 51*/ "Hanno chiuso il pianterreno! \nVa all'ascensore!\n", + /* 52*/ "Bisogna tirar gi quella cannoniera \no abbatter la navetta!\n", + /* 53*/ "Non posso lasciar vive le guardie!\n", + /* 54*/ "Fai presto: vai alla navetta! \nTorna all'eliporto!\n", + /* 55*/ "Procurati la chiave alfa\n", + /* 56*/ "Guardia:\n", + /* 57*/ "Chiave dell'ufficio\n", + /* 58*/ "Chiave dell'ufficio\n", + /* 59*/ "Presa chiave ufficio di Cassandra\n", + /* 60*/ "Date l'allarme: qui!\n", + /* 61*/ "Ma chiudi il becco!\n", + /* 62*/ "Ma cosa...?\n", + /* 63*/ "Dove credi di andare?\n", + /* 64*/ "Posso aiutarla, madama?\n", + /* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n", + /* 66*/ "Certo che lo so: me ne vado!\n", + /* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n", + /* 68*/ "Spiacente! Ho da fare!\n", + /* 69*/ "Devi recuperare il Sapiente: senza \nnon possibile andare avanti.\n", + /* 70*/ "Lo so benissimo!\n", + /* 71*/ "So anche con chi parlare... \ncon Carrington!\n", + /* 72*/ "La porta dell'ascensore fuori servizio.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_s.c b/src/files/lang/pal-final/ark_str_s.c new file mode 100644 index 000000000..2c90413ec --- /dev/null +++ b/src/files/lang/pal-final/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el nico ascensor accesible enviada a un PC situado en el piso de oficinas m疽 bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicptero Gunship de dataDyne\n\nHay un helicptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudar en derribaros. Acaba con el helicptero sin prejuicios, ya que 駘 intentar hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicptero Gunship de dataDyne\n\nHay un helicptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudar en derribaros. Acaba con el helicptero sin prejuicios, ya que 駘 intentar hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestbulo es imposible debido al gran nmero de tropas presentes. El transporte os recoger a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondr疣 todos los obst當ulos que puedan en tu camino para impedir que saques al Dr. Caroll de all. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestbulo hasta que tengas acceso a uno de los ascensores que os llevar疣 a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no ser疽 capaz de evitarlas, as que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuacin\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acceder al ascensor del vestbulo\n", + /* 10*/ "Reactivar ascensor de las oficinas\n", + /* 11*/ "Destruir helicptero de dataDyne\n", + /* 12*/ "Derrotar a las guard. de Cassandra\n", + /* 13*/ "Encuentro en el helipuerto\n", + /* 14*/ "Accediendo a los controles del ascensor...\n", + /* 15*/ "。LUCES ENCENDIDAS!\n", + /* 16*/ "。El Dr. Caroll ha muerto!\n", + /* 17*/ "。Est疣 atacando al Dr. Caroll!\n", + /* 18*/ "。El Dr. Caroll ha sido daado!\n", + /* 19*/ "。Demasiado tarde! Ella est aqu...\n", + /* 20*/ "Est疽 empezando a ser un fastidio...\n", + /* 21*/ "Buenas noches, Srta. Dark.\n", + /* 22*/ "LUCES ENCENDIDAS\n", + /* 23*/ "LUCES APAGADAS\n", + /* 24*/ "MISIモN FALLADA\n", + /* 25*/ "MISIモN CUMPLIDA\n", + /* 26*/ "Aviso del Helicptero va aqu.\n", + /* 27*/ "Obt駭 Visin Nocturna.\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "V. Nocturna\n", + /* 30*/ "Visin Nocturna\n", + /* 31*/ "Visin Nocturna obtenida.\n", + /* 32*/ "。Nos vemos de nuevo, chica!\n", + /* 33*/ "Accediste al ascensor del vestbulo.\n", + /* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n", + /* 35*/ "Helicptero de dataDyne eliminado.\n", + /* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n", + /* 37*/ "As no es como va.\n", + /* 38*/ "S, as es.\n", + /* 39*/ "D疥elo. Lo est疽 haciendo mal.\n", + /* 40*/ "Deja de molestarme.\n", + /* 41*/ "。Debemos darnos prisa!\n", + /* 42*/ "Oh, no... demasiado tarde.\n", + /* 43*/ "Ella est aqu...\n", + /* 44*/ "。Cogedla!\n", + /* 45*/ "Objeto crtico de la misin destruido. \n", + /* 46*/ "Obt駭 la C疥ara Espa.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "C疥ara Espa\n", + /* 49*/ "Una C疥ara Espa\n", + /* 50*/ "C疥ara Espa obtenida.\n", + /* 51*/ "Han cerrado la planta baja. \n。Ve al ascensor!\n", + /* 52*/ "。Necesitamos acabar con ese helicptero, \no derribar la nave de escape!\n", + /* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n", + /* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n", + /* 55*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 56*/ "Guarda:\n", + /* 57*/ "Llave de la oficina\n", + /* 58*/ "Llave magn騁ica de la oficina\n", + /* 59*/ "Llave magn騁ica de la oficina de Cassandra obtenida.\n", + /* 60*/ "Activa la alarma: 。ella est aqu!\n", + /* 61*/ "。Luces fuera!\n", + /* 62*/ "ソQu dem...?\n", + /* 63*/ "ソVas a alguna parte?\n", + /* 64*/ "ソPuedo hacer algo por ti, anciana?\n", + /* 65*/ "。Devuelve nuestra IA inmediatamente! No sabes \nlo que est疽 haciendo.\n", + /* 66*/ "S lo s. Me largo.\n", + /* 67*/ "。Otra oportunidad! Devu駘velo, y podr疽 \ntrabajar para m.\n", + /* 68*/ "。Lo siento! ソLo pillas?\n", + /* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n", + /* 70*/ "。Ya lo s!\n", + /* 71*/ "Tambi駭 s con qui駭 hablar... \ncon el Sr. Carrington.\n", + /* 72*/ "La puerta del ascensor no funciona en este piso.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ashE.c b/src/files/lang/pal-final/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ashJ.c b/src/files/lang/pal-final/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ashP.c b/src/files/lang/pal-final/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_f.c b/src/files/lang/pal-final/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_g.c b/src/files/lang/pal-final/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_i.c b/src/files/lang/pal-final/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_s.c b/src/files/lang/pal-final/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ateE.c b/src/files/lang/pal-final/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-final/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ateJ.c b/src/files/lang/pal-final/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/pal-final/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ateP.c b/src/files/lang/pal-final/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-final/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_f.c b/src/files/lang/pal-final/ate_str_f.c new file mode 100644 index 000000000..532da82cf --- /dev/null +++ b/src/files/lang/pal-final/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez bout de la r駱lique de Jonathan Dark, le meilleur 駘駑ent de l'Institut en mati鑽e de test holographique. Il poss鐡e de grandes et surprenantes capacit駸 au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent exp駻iment du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez 黎re fi鑽e de vos prouesses.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez bout de la r駱lique de Jonathan Dark, le meilleur 駘駑ent de l'Institut en mati鑽e de test holographique. Il poss鐡e de grandes et surprenantes capacit駸 au combat.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacit駸, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entranement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez bout de la simulation d'un garde de la dataDyne. La r駱lique est mod駻駑ent puissante mais dangereuse.\n\nFIN\n", + /* 4*/ "Vaincre le garde dataDyne\n", + /* 5*/ "Vaincre Jonathan Dark\n", + /* 6*/ "Vaincre Trent Easton\n", + /* 7*/ "LE DUEL\n", + /* 8*/ "Vaincre votre adversaire.\n", + /* 9*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 10*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 11*/ "Bien jou! Vous 黎es trop rapide pour lui!\n", + /* 12*/ "Niveau adverse: AGENT\n", + /* 13*/ "Niveau adverse: AGENT SPECIAL\n", + /* 14*/ "Niveau adverse: AGENT PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_g.c b/src/files/lang/pal-final/ate_str_g.c new file mode 100644 index 000000000..7eafe8c92 --- /dev/null +++ b/src/files/lang/pal-final/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfgt ber gute Kampff臧igkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu berraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines 舫゚erst gef臧rlichen Regierungsagenten. Der Simulant ist ein berdurchschnittlich erfahrener K舂pfer. Wenn Sie diesen Test bestehen, drfen Sie zu Recht stolz auf sich sein.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfgt ber gute Kampff臧igkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu berraschen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre F臧igkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glck!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfgt ber moderate Kampff臧igkeiten. Sie sollten ihn jedoch nicht untersch舩zen.\n\nENDE\n", + /* 4*/ "Besiegen Sie die dataDyne-Wache!\n", + /* 5*/ "Besiegen Sie Jonathan Dark!\n", + /* 6*/ "Besiegen Sie Trent Easton!\n", + /* 7*/ "DAS DUELL\n", + /* 8*/ "Besiegen Sie Ihren Gegner!\n", + /* 9*/ "Sie waren zu schnell fr ihn!\n", + /* 10*/ "Sie waren zu schnell fr ihn!\n", + /* 11*/ "Sie waren zu schnell fr ihn!\n", + /* 12*/ "Schwierigkeitsgrad: AGENT\n", + /* 13*/ "Schwierigkeitsgrad: SPEZIALAGENT\n", + /* 14*/ "Schwierigkeitsgrad: PERFEKTER AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_i.c b/src/files/lang/pal-final/ate_str_i.c new file mode 100644 index 000000000..a8db21ab9 --- /dev/null +++ b/src/files/lang/pal-final/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacit di combattimento ed in grado di mettere in difficolt anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacit di combattimento ed in grado di mettere in difficolt anche combattenti affermati.\n\nFINE\n ", + /* 3*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacit, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacit in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ", + /* 4*/ "Sconfiggi la guardia dataDyne \n", + /* 5*/ "Sconfiggi Jonathan Dark \n", + /* 6*/ "Sconfiggi Trent Easton \n", + /* 7*/ "IL DUELLO\n", + /* 8*/ "Sconfiggi l'avversario.\n", + /* 9*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 10*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 11*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 12*/ "Livello abilit avversario: AGENTE\n", + /* 13*/ "Livello abilit avversario: AGENTE SPECIALE\n", + /* 14*/ "Livello abilit avversario: AGENTE PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_s.c b/src/files/lang/pal-final/ate_str_s.c new file mode 100644 index 000000000..77a8a0666 --- /dev/null +++ b/src/files/lang/pal-final/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulacin de Jonathan Dark, actual poseedor del r馗ord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulacin de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podr疽 estar orgullosa de tu logro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulacin de Jonathan Dark, actual poseedor del r馗ord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado hologr畴icamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atencin a la prueba, y usa toda la experiencia que has obtenido a trav駸 de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardi疣 de dataDyne\n\nDerrota a la simulacin de un guardi疣 de dataDyne. El Simulante tendr habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n", + /* 4*/ "Derrotar al guardi疣 de dataDyne\n", + /* 5*/ "Derrotar a Jonathan Dark\n", + /* 6*/ "Derrotar a Trent Easton\n", + /* 7*/ "EL DUELO\n", + /* 8*/ "Derrota a tu oponente.\n", + /* 9*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 10*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 11*/ "。Bien hecho! 。Fuiste demasiado r疳ida para 駘!\n", + /* 12*/ "Nivel del oponente: AGENTE\n", + /* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n", + /* 14*/ "Nivel del oponente: AGENTE PERFECTO\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/aztE.c b/src/files/lang/pal-final/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-final/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/aztJ.c b/src/files/lang/pal-final/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/pal-final/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/pal-final/aztP.c b/src/files/lang/pal-final/aztP.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-final/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_f.c b/src/files/lang/pal-final/azt_str_f.c new file mode 100644 index 000000000..cd43a5d4f --- /dev/null +++ b/src/files/lang/pal-final/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - R馗up駻er scanner m馘ical pr駸identiel\n\nCet appareil actualise en permanence le journal m馘ical du Pr駸ident et lui assure un 騁at de sant stable. Trouvez-le pour garder le Pr駸ident en bonne sant.\n\n|Objectif 2: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin mais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - D駸activer appareil brouillage\n\nUn syst鑪e ennemi sophistiqu inonde le secteur d'un brouillage CME imp駭騁rable. Vous pourrez d騁erminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouv, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 5: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 1*/ "SITE du CRASH\n", + /* 2*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - R馗up駻er scanner m馘ical pr駸identiel\n\nCet appareil actualise en permanence le journal m馘ical du Pr駸ident et lui assure un 騁at de sant stable. Trouvez-le pour garder le Pr駸ident en bonne sant.\n\n|Objectif 2: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin mais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 4: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn suivant la derni鑽e manoeuvre d'Elvis, les trois appareils impliqu駸 se sont 馗ras駸 ensemble en Alaska. La position du Pr駸ident est incertaine et un 馗ran de brouillage CME emp鹹he toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez 駘iminer la source du brouillage, nous pourrons d騁erminer votre position et envoyer de l'aide. Trouver et prot馮er le Pr駸ident demeure en revanche votre priorit absolue.\n\n|Objectif 1: - Activer le signal de d騁resse\n\nCelui-ci ne sera efficace qu'une fois le brouillage 駘imin mais s'il est activ au point d'騅acuation, les 駲uipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Pr駸ident\n\nLa s馗urit des Etats Unis serait menac馥 si deux individus identiques ayant tout pouvoir affirmaient 黎re le Pr駸ident. Identifiez l'imposteur et 駘iminez la menace.\n\n|Objectif 3: - Trouver et sauver le Pr駸ident\n\nCet objectif est votre priorit. La s馗urit du Pr駸ident est vitale. Il vous faut le prot馮er tout prix avant l'arriv馥 de renforts ou 馗arter tout danger.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R馗up駻er scanner m馘ical pr駸identiel\n", + /* 6*/ "Activer le signal de d騁resse\n", + /* 7*/ "D駸activer appareil brouillage\n", + /* 8*/ "Eliminer le clone du Pr駸ident\n", + /* 9*/ "Trouver et sauver le Pr駸ident\n", + /* 10*/ "Voil le point d'騅acuation. \n", + /* 11*/ "Le signal peut venir de l. \n", + /* 12*/ "Le brouillage... Il vient de ce vaisseau. \n", + /* 13*/ "Elvis... Il pourra prot馮er le Pr駸ident.\n", + /* 14*/ "Signal de d騁resse activ.\n", + /* 15*/ "Objet crucial d騁ruit.\n", + /* 16*/ "Obtenir le scanner pr駸identiel.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Scanner pr駸identiel\n", + /* 20*/ "Scanner pr駸identiel obtenu.\n", + /* 21*/ "Appareil de brouillage d駸activ.\n", + /* 22*/ "Le Pr駸ident a 騁 abattu.\n", + /* 23*/ "Clone pr駸identiel 駘imin.\n", + /* 24*/ "Vous ne pourrez pas le sauver!\n", + /* 25*/ "Pr駸ident sauv.\n", + /* 26*/ "Obtenir Vue nocturne.\n", + /* 27*/ "Cassandra De Vries: \n", + /* 28*/ "Vue nocturne\n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne obtenue.\n", + /* 31*/ "Prends ceci. Cela te sera utile!\n", + /* 32*/ "Ahhh... oohhhh...\n", + /* 33*/ "Ahhh... ohh... ouuuuhhh...\n", + /* 34*/ "Agent Dark! Quel est votre statut?\n", + /* 35*/ "Perfect Dark, r駱ondez!\n", + /* 36*/ "A-agent Dark au rapport...\n", + /* 37*/ "Agent Dark! Parlez bon sang!\n", + /* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-黎re de l'autre appareil.\n", + /* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne sant. Sans oublier le Pr駸ident...\n", + /* 40*/ "Comment vous sentez-vous, M. le Pr駸ident?\n", + /* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journ馥. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n", + /* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n", + /* 43*/ "Un vaisseau de recherche sous-marin du gouvernement am駻icain. Un mod鑞e unique pouvant mener des exp駻iences de grandes profondeurs. Trent a formul une demande de pr黎 au nom de la dataDyne Corporation. J'ai refus.\n", + /* 44*/ "Trent devra r駱ondre de ses actes. Encore faut-il le trouver.\n", + /* 45*/ "Vous avez 馗hou, Easton. Vous 黎es un 駘駑ent corrompu. Nous nous passerons de vous.\n", + /* 46*/ "C'est 軋 oui. P騁asse su馘oise, va!\n", + /* 47*/ "Noooooooon!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_g.c b/src/files/lang/pal-final/azt_str_g.c new file mode 100644 index 000000000..948911bfc --- /dev/null +++ b/src/files/lang/pal-final/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Pr舖identen!\n\nDieses Ger舩 zeichnet st舅dig die medizinischen Daten des Pr舖identen auf. Mit seiner Hilfe knnen Sie Daten ber den Gesundheitszustand des Pr舖identen abrufen. Um sicherzustellen, dass er unversehrt bleibt, bentigen Sie dieses Ger舩 auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Deaktivieren Sie den ECM-Generator!\n\nEin High-Tech ECM-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des D舂pfungs-Signals ausfindig zu machen, als unsere Luft-Aufkl舐er. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann knnen wir Sie orten und Ihnen zu Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 1*/ "ABSTURZSTELLE\n", + /* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Pr舖identen!\n\nDieses Ger舩 zeichnet st舅dig die medizinischen Daten des Pr舖identen auf. Mit seiner Hilfe knnen Sie Daten ber den Gesundheitszustand des Pr舖identen abrufen. Um sicherzustellen, dass er unversehrt bleibt, bentigen Sie dieses Ger舩 auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterfhrung des letzten Ausweichmanvers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestrzt sind. Der genaue Aufenthaltsort des Pr舖identen ist ungewiss, da ein starkes D舂pfungsfeld eine genauere Ortung nicht zul舖st.\n\n|Carrington - \n\nMomentan ist dieses Empfangsger舩 die einzige Mglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des D舂pfungsfeldes ausschalten knnen, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorit舩 genie゚t die Sicherheit des Pr舖identen. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gew臧rleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das D舂pfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|2. Ziel: - Eliminieren Sie den Pr舖identen-Klon!\n\nDie Sicherheit der Vereinigten Staaten w舐e nicht mehr gew臧rleistet, wenn es pltzlich zwei Personen geben wrde, die von sich behaupten, der Pr舖ident zu sein. Identifizieren Sie den Betrger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Pr舖identen!\n\nDer Sicherheit des Pr舖identen kommt die allerhchste Priorit舩 zu. Sie mssen UNBEDINGT fr seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden Sie den medizinischen Scanner!\n", + /* 6*/ "Aktivieren Sie das Notsignal!\n", + /* 7*/ "Deaktivieren Sie den Generator!\n", + /* 8*/ "Eliminieren Sie den Pr舖identen-Klon!\n", + /* 9*/ "Orten und retten Sie den Pr舖identen!\n", + /* 10*/ "Ich habe die Rettungskapsel gefunden.\n", + /* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n", + /* 12*/ "Das D舂pfungsfeld... Es wird von diesem Schiff aus generiert.\n", + /* 13*/ "Elvis... Er ist sicher in der Lage, den Pr舖identen zu beschtzen.\n", + /* 14*/ "Notsignal wurde aktiviert.\n", + /* 15*/ "Wichtiges Objekt zerstrt\n", + /* 16*/ "Finden Sie den medizinischen Scanner!\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Ein medizinischer Scanner\n", + /* 20*/ "Medizinischer Scanner aufgenommen\n", + /* 21*/ "ECM-Generator deaktiviert\n", + /* 22*/ ".\n", + /* 23*/ "Pr舖identen-Klon wurde eliminiert.\n", + /* 24*/ "Du kannst ihn nicht retten!\n", + /* 25*/ "Der Pr舖ident wurde gerettet.\n", + /* 26*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 27*/ "Cassandra De Vries\n", + /* 28*/ "Nachtsichtger舩\n", + /* 29*/ "Nachtsichtger舩\n", + /* 30*/ "Nachtsichtger舩 aufgenommen\n", + /* 31*/ "Nimm das; es wird sich als ntzlich erweisen!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... ouuu...\n", + /* 34*/ "Agent Dark! Bitte melden Sie sich!\n", + /* 35*/ "Perfect Dark, kommen!\n", + /* 36*/ "A-Agent Dark hier...\n", + /* 37*/ "Agent Dark! Bitte antworten Sie!\n", + /* 38*/ "Diese Frequenz wird gestrt... Das Signal kommt von dort drben.\n", + /* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Pr舖identen retten.\n", + /* 40*/ "Wie fhlen Sie sich, Mr. President?\n", + /* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n", + /* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n", + /* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n", + /* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n", + /* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht l舅ger von Nutzen.\n", + /* 46*/ "Versuch's nur, du skandinavischer Freak!\n", + /* 47*/ "Neiiiiiiiin!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_i.c b/src/files/lang/pal-final/azt_str_i.c new file mode 100644 index 000000000..d09b617ee --- /dev/null +++ b/src/files/lang/pal-final/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere pi facile localizzarla e disattivarla. Fatto ci potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 1*/ "LUOGO DEL DISASTRO\n", + /* 2*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sar molto efficace finch non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumit degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorit assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta la tua priorit assoluta. La sicurezza del Presidente della massima importanza. Devi trovare il modo di assicurarne l'incolumit fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Recupera scanner medico del Presidente\n", + /* 6*/ "Attiva il segnale di pericolo\n", + /* 7*/ "Disattiva il dispositivo di disturbo\n", + /* 8*/ "Trova ed elimina il clone del Presidente\n", + /* 9*/ "Trova e salva il Presidente\n", + /* 10*/ "Ecco la capsula di salvataggio!\n", + /* 11*/ "Forse si pu mandare un segnale da l!\n", + /* 12*/ "Queste onde... Vengono da quella navicella!\n", + /* 13*/ "Elvis... Pu proteggere lui il Presidente.\n", + /* 14*/ "Inviato segnale di pericolo.\n", + /* 15*/ "Distrutto strumento essenziale alla missione.\n", + /* 16*/ "Procurati scanner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Scanner del Presidente!\n", + /* 20*/ "Preso scanner del Presidente.\n", + /* 21*/ "Disattivato dispositivo per onde di disturbo.\n", + /* 22*/ "Il Presidente stato ucciso.\n", + /* 23*/ "Il clone del Presidente stato eliminato.\n", + /* 24*/ "Non riuscirai mai a salvarlo!\n", + /* 25*/ "Il Presidente stato salvato.\n", + /* 26*/ "Procurati Vista Notturna!\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Vista Notturna\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Presa Vista Notturna.\n", + /* 31*/ "Ecco, tieni: ti sar utile!\n", + /* 32*/ "Aaah... uuuh...\n", + /* 33*/ "Aaah... uuuh... oooh...\n", + /* 34*/ "Agente Dark! A rapporto!\n", + /* 35*/ "Perfect Dark, rispondi!\n", + /* 36*/ "Agente Dark a rapporto, signore!\n", + /* 37*/ "Agente Dark! Rispondi!\n", + /* 38*/ "C' qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n", + /* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n", + /* 40*/ "Come sta, Sig. Presidente?\n", + /* 41*/ "Molto meglio, grazie. Penso che mi ci vorr un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo s che era ambizioso, ma fino a questo punto...\n", + /* 42*/ "Solo una cosa, signore? Cos' il Pelagic II che Trent voleva ad ogni costo?\n", + /* 43*/ "ネ un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondit oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n", + /* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n", + /* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi pi!\n", + /* 46*/ "Provaci, pazzo scandinavo!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_s.c b/src/files/lang/pal-final/azt_str_s.c new file mode 100644 index 000000000..4ae153923 --- /dev/null +++ b/src/files/lang/pal-final/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Recuperar Esc疣er M馘ico del Presidente\n\nEste dispositivo est actualizando constantemente el historial m馘ico del Presidente y es capaz de chequear su estado de salud. Lo necesitar疽 para asegurarte de que est en buenas condiciones.\n\n|Objetivo Dos: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo est inundando el 疵ea con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra m疽 efectivamente de lo que nuestros aviones espa est疣 haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posicin y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 1*/ "LUGAR DEL IMPACTO\n", + /* 2*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Recuperar Esc疣er M馘ico del Presidente\n\nEste dispositivo est actualizando constantemente el historial m馘ico del Presidente y es capaz de chequear su estado de salud. Lo necesitar疽 para asegurarte de que est en buenas condiciones.\n\n|Objetivo Dos: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSiguiendo la ltima maniobra de Elvis, las tres naves involucradas han chocado entre s en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el nico modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posicin para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea m疽 importante.\n\n|Objetivo Uno: - Activar la Seal de Socorro\n\nNo har nada hasta que caiga el bloqueo, pero si activas la Seal de Socorro en la c疳sula de escape, acortar el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSer perjudicial para la seguridad de los Estados Unidos de Am駻ica tener dos personas id駭ticas clamando ser el Presidente, dando rdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nノsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Recuperar esc疣er m馘ico del Presidente\n", + /* 6*/ "Activar la seal de socorro\n", + /* 7*/ "Apagar la seal de bloqueo enemiga\n", + /* 8*/ "Eliminar al clon del Presidente\n", + /* 9*/ "Localizar y rescatar al Presidente\n", + /* 10*/ "Ah est la c疳sula de escape.\n", + /* 11*/ "Quiz haya un emisor dentro.\n", + /* 12*/ "El bloqueo... Proviene de esa nave.\n", + /* 13*/ "Elvis... ノl ser capaz de proteger al Presidente.\n", + /* 14*/ "Seal de socorro activada.\n", + /* 15*/ "Objeto crtico de la misin destruido.\n", + /* 16*/ "Obt駭 el Esc疣er del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Esc疣er Presidencial\n", + /* 20*/ "Esc疣er Presidencial obtenido.\n", + /* 21*/ "Dispositivo de bloqueo apagado.\n", + /* 22*/ "El Presidente ha muerto.\n", + /* 23*/ "El clon del Presidente ha sido eliminado.\n", + /* 24*/ "。Ahora ya no podr疽 salvarle!\n", + /* 25*/ "El Presidente ha sido rescatado.\n", + /* 26*/ "Obt駭 Visin Nocturna.\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "V. Nocturna\n", + /* 29*/ "Visin Nocturna\n", + /* 30*/ "Visn Nocturna obtenida.\n", + /* 31*/ "Toma esto, 。lo encontrar疽 muy til!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "。Agente Dark! 。Informe, por favor!\n", + /* 35*/ "。Perfect Dark, responda!\n", + /* 36*/ "A-agente Dark informando...\n", + /* 37*/ "。Agente Dark! 。Por favor, responda!\n", + /* 38*/ "Algo est bloqueando mis transmisiones... Proviene de esa otra nave.\n", + /* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis est bien. No olvidando al Presidente, por supuesto.\n", + /* 40*/ "ソCmo se siente, Sr. Presidente?\n", + /* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo as. Saba que era ambicioso, s, pero esto...\n", + /* 42*/ "Slo una cosa, seor. ソQu es el Pelagic II que tanto ansiaba Trent?\n", + /* 43*/ "Es un navo de investigacin de profundidad del gobierno norteamericano, nico en su clase... El nico barco capaz de dirigir una operacin a gran escala a profundidad extrema. Trent quera que se lo prestara a la Corporacin dataDyne, pero rehus.\n", + /* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n", + /* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n", + /* 46*/ "。Int駭talo, mamarracho escandinavo!\n", + /* 47*/ "。。。Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/catE.c b/src/files/lang/pal-final/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/catJ.c b/src/files/lang/pal-final/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/catP.c b/src/files/lang/pal-final/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_f.c b/src/files/lang/pal-final/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_g.c b/src/files/lang/pal-final/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_i.c b/src/files/lang/pal-final/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_s.c b/src/files/lang/pal-final/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/caveE.c b/src/files/lang/pal-final/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-final/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-final/caveJ.c b/src/files/lang/pal-final/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/pal-final/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/pal-final/caveP.c b/src/files/lang/pal-final/caveP.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-final/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_f.c b/src/files/lang/pal-final/cave_str_f.c new file mode 100644 index 000000000..f1707e59d --- /dev/null +++ b/src/files/lang/pal-final/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Ranger l'駲uipement\n\nD饕arrassez-vous de votre 駲uipement le plus tt possible et 騅itez de transporter des objets compromettants. Vous pourrez r馗up駻er votre paquetage une fois bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme se d馗lenchera et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol\n\nLe plan de vol de l'Air Force One est gard dans un coffre de la base. D駻obez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n", + /* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Ranger l'駲uipement\n\nD饕arrassez-vous de votre 駲uipement le plus tt possible et 騅itez de transporter des objets compromettants. Vous pourrez r馗up駻er votre paquetage une fois bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme se d馗lenchera et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Pr駸ident sur la base a駻ienne en Alaska afin de pr駱arer la visite pr駸identielle l'騁ranger. D'apr鑚 les preuves trouv馥s Chicago, nous en concluons qu'il s'agit de la premi鑽e 騁ape dans son action contre le Pr駸ident. Elle doit 黎re contrecarr馥. \n\n|Carrington - \n\nPrudence est le matre mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base a駻ienne. Seuls les hommes de Trent et les 騁ranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de r騏ssir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'htesse arrivant par t駘駱h駻ique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et rev黎ez son uniforme pour p駭騁rer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas 黎re 駘imin駸.\n\n|Objectif 2: - Leurrer le syst鑪e de d騁ection\n\nVotre couverture trompera le personnel pr駸ent mais le syst鑪e de d騁ection demande une approche diff駻ente. S'il d馗鑞e une arme dans votre 駲uipement, l'alarme sera donn馥 et la base sera scell馥. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, vous de choisir la meilleure option. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Voler uniforme et entrer dans la base\n", + /* 6*/ "Ranger l'駲uipement\n", + /* 7*/ "Leurrer le syst鑪e de d騁ection\n", + /* 8*/ "Obtenir le plan de vol\n", + /* 9*/ "Monter bord de l'Air Force One\n", + /* 10*/ "Obtenir valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir uniforme d'htesse.\n", + /* 16*/ "\n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme\n", + /* 19*/ "Uniforme d'htesse obtenu.\n", + /* 20*/ "Obtenir plans de vol.\n", + /* 21*/ "\n", + /* 22*/ "Plans de vol\n", + /* 23*/ "Plans de vol\n", + /* 24*/ "Plans de vol obtenus.\n", + /* 25*/ "Attention - un intrus...\n", + /* 26*/ "Civils innocents abattus.\n", + /* 27*/ "Va-t-il bien?\n", + /* 28*/ "Je vais chercher de l'aide.\n", + /* 29*/ "Bonjour. \n", + /* 30*/ "Vous connaissez le chemin.\n", + /* 31*/ "Rangez votre arme, je vous prie. \n", + /* 32*/ "...??? Oh, mon Dieu! \n", + /* 33*/ "Les armes sont interdites dans la base. \n", + /* 34*/ "J'appelle la s馗urit.\n", + /* 35*/ "Coupure syst鑪e initialis馥... \n", + /* 36*/ "Syst鑪es s馗urit coup駸. \n", + /* 37*/ "Armement d騁ect.\n", + /* 38*/ "Valise d駱os馥.\n", + /* 39*/ "Valise scann馥.\n", + /* 40*/ "Vous, l! Cette zone est interdite. \n", + /* 41*/ "Vous 黎es nouvelle ou quoi?\n", + /* 42*/ "H! Ma valise! \n", + /* 43*/ "Appelle la s馗urit... Je m'occupe d'elle.\n", + /* 44*/ "En haut...il y a un intrus.\n", + /* 45*/ "Acc鑚 grilles laser refus.\n", + /* 46*/ "Syst鑪e grilles laser: surcharge.\n", + /* 47*/ "Trop de cibles neutres abattues.\n", + /* 48*/ "Emp鹹hez-les d'avoir le coffre...\n", + /* 49*/ "Costume rev黎u.\n", + /* 50*/ "Vite! Attrapez le sac de l'htesse \net prenez son uniforme.\n", + /* 51*/ "Utilisez cette caisse pour cacher votre 駲uipement. \n", + /* 52*/ "Cette caisse se fera arr黎er si vous n'intervenez pas. \n", + /* 53*/ "C'est 軋 Air Force One, hein? ... C'est assez \npetit en fait.\n", + /* 54*/ "Arr黎ez-les - ils ouvrent le coffre...\n", + /* 55*/ "Agent Dark en position. Je vois l'entr馥 principale de la base. J'aper輟is aussi le point d'arriv馥 du t駘駱h駻ique.\n", + /* 56*/ "Excellent, Joanna. Ce t駘駱h駻ique est votre billet d'entr馥. Notre contact a rep駻 une htesse montant bord il y a une minute. Elle est escort馥 par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n", + /* 57*/ "...qu'ils ne font pas partie de l'op駻ation de Trent et que je ne dois pas les abattre m麥e sous leur feu. Et les agents de la NSA?\n", + /* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis n饌nmoins persuad que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois bord et pr駸entez-les au Pr駸ident.\n", + /* 59*/ "Et le prot馮er de ses ravisseurs. Avez-vous une th駮rie sur les plans de Trent et sur ce type blond?\n", + /* 60*/ "Que de vagues soup輟ns. Concentrez-vous plutt sur la mission. Bonne chance. Carrington, termin.\n", + /* 61*/ "Ascenseur inactif - syst鑪e s馗urit actif.\n", + /* 62*/ "Personnel crucial inutilisable.\n", + /* 63*/ "Objet crucial d騁ruit.\n", + /* 64*/ "Entr馥 de la base s馗uris馥.\n", + /* 65*/ "On s'en charge!!\n", + /* 66*/ "Chariot coup.\n", + /* 67*/ "Equipement ne peut 黎re enregistr.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_g.c b/src/files/lang/pal-final/cave_str_g.c new file mode 100644 index 000000000..e141b3fcf --- /dev/null +++ b/src/files/lang/pal-final/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrstung ein!\n\nSie mssen Ihre Ausrstung so schnell wie mglich loswerden. Vermeiden Sie es, verd臘htig wirkende Gegenst舅de mit sich herumzutragen. Sie knnen wieder auf Ihre Ausrstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst mssen Sie natrlich einen Koffer finden, um die Ausrstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpl舅e aus dem Safe!\n\nDie Route, welche fr die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pl舅e in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamit舩 dient er als Ihre Verst舐kung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 1*/ "PRトSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n", + /* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in Ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrstung ein!\n\nSie mssen Ihre Ausrstung so schnell wie mglich loswerden. Vermeiden Sie es, verd臘htig wirkende Gegenst舅de mit sich herumzutragen. Sie knnen wieder auf Ihre Ausrstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst mssen Sie natrlich einen Koffer finden, um die Ausrstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Pr舖identen auf einem Sttzpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Pr舖identen vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall mssen Sie mit allerhchster Sorgfalt vorgehen! Am Sttzpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden M舅ner sind legitime Ziele. Vergessen Sie nicht: Je l舅ger Sie Ihre Tarnung aufrecht erhalten, desto gr゚er sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie tr臠t ihre Uniform in Ihrer Tasche. ワberw舁tigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Sttzpunkt unerkannt betreten zu knnen. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher drfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das ワberwachungssystem!\n\nMit Ihrer Verkleidung knnen Sie zwar das menschliche Auge t舫schen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gep臘k erfasst, wird sofort der Alarm ausgelst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafr, dass der Alarm unter keinen Umst舅den ausgelst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie mssen unter allen Umst舅den an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls mssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Erlangen Sie die Tarnung!\n", + /* 6*/ "Checken Sie Ihre Ausrstung ein!\n", + /* 7*/ "Unterminieren Sie die ワberwachung!\n", + /* 8*/ "Entwenden Sie die Flugpl舅e!\n", + /* 9*/ "Gehen Sie an Bord der Air Force One!\n", + /* 10*/ "Erlangen Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer aufgenommen\n", + /* 15*/ "Erlangen Sie die Uniform!\n", + /* 16*/ "\n", + /* 17*/ "Verkleidung\n", + /* 18*/ "Verkleidung\n", + /* 19*/ "Uniform aufgenommen\n", + /* 20*/ "Entwenden Sie die Flugpl舅e aus dem Safe!\n", + /* 21*/ "\n", + /* 22*/ "Flugpl舅e\n", + /* 23*/ "Flugpl舅e\n", + /* 24*/ "Flugpl舅e aufgenommen\n", + /* 25*/ "Vorsicht - Ein Eindringling...\n", + /* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n", + /* 27*/ "Ist er OK?\n", + /* 28*/ "Ich gehe und hole Hilfe.\n", + /* 29*/ "Schnen guten Tag.\n", + /* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n", + /* 31*/ "Sie mssen Ihre Waffe hier einchecken, Miss.\n", + /* 32*/ "Oh nein!\n", + /* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n", + /* 34*/ "Ich alarmiere die Security.\n", + /* 35*/ "System wird heruntergefahren...\n", + /* 36*/ "ワberwachungssystem wurde deaktiviert.\n", + /* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n", + /* 38*/ "Der Koffer wurde deponiert.\n", + /* 39*/ "Der Koffer wurde gescannt.\n", + /* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n", + /* 41*/ "Sind Sie neu hier?\n", + /* 42*/ "Hey - geben Sie mir meinen Koffer zurck!\n", + /* 43*/ "Du holst die Security - Ich kmmere mich um sie...\n", + /* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n", + /* 45*/ "Zugriff auf die Lasermatrix verweigert\n", + /* 46*/ "Lasermatrix-System wurde berladen!!!\n", + /* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n", + /* 48*/ "Haltet sie vom Safe fern...\n", + /* 49*/ "Verkleidung wurde angelegt.\n", + /* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess! \n", + /* 51*/ "Verbergen Sie Ihre Ausrstung in der Tasche. \n", + /* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n", + /* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n", + /* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n", + /* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n", + /* 56*/ "Ausgezeichnet, Joanna. In der Bahn befindet sich etwas, dass Sie brauchen. Unser Beobachter hat uns mitgeteilt, dass ein Crew-Mitglied vor einer Minute die Bahn betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n", + /* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA-Agenten?\n", + /* 58*/ "Ich wei゚ nicht, wie weit diese Verschwrung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenber absolut loyal sind. Sie mssen einen Beweis gegen Trent erbringen und diesen dem Pr舖identen vorlegen.\n", + /* 59*/ "Und ich soll ihn auch noch beschtzen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten knnte? Und was hat es mit diesen blonden Kerlen auf sich?\n", + /* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glck! Over und out.\n", + /* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n", + /* 62*/ "Wichtige Person eliminiert\n", + /* 63*/ "Wichtiges Objekt zerstrt\n", + /* 64*/ "Eingang wurde gesichert.\n", + /* 65*/ "Wir bernehmen jetzt!!\n", + /* 66*/ "Hover-Trolley wurde abgeschaltet.\n", + /* 67*/ "Ausrstung kann nicht berprft werden.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_i.c b/src/files/lang/pal-final/cave_str_i.c new file mode 100644 index 000000000..fe24377c7 --- /dev/null +++ b/src/files/lang/pal-final/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al pi presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli pi tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n", + /* 2*/ "|Situazione:\n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al pi presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli pi tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nTrent Easton andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si pu affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che pi a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilit di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sar possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatter l'allarme e la base verr chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Travestiti ed entra nella base\n", + /* 6*/ "Deposita i tuoi strumenti\n", + /* 7*/ "Neutralizza il sistema di sicurezza\n", + /* 8*/ "Prendi i piani di volo dalla cassaforte\n", + /* 9*/ "Sali a bordo dell'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati la divisa dell'hostess.\n", + /* 16*/ "\n", + /* 17*/ "Travestimento\n", + /* 18*/ "Travestimento\n", + /* 19*/ "Presa divisa dell'hostess.\n", + /* 20*/ "Procurati piani di volo.\n", + /* 21*/ "\n", + /* 22*/ "Piani di volo\n", + /* 23*/ "Piani di volo\n", + /* 24*/ "Presi piani di volo.\n", + /* 25*/ "Attenzione! C' un intruso!\n", + /* 26*/ "Sono stati uccisi troppi civili.\n", + /* 27*/ "Sta bene?\n", + /* 28*/ "Vado a cercare aiuto!\n", + /* 29*/ "Buonasera.\n", + /* 30*/ "Bene, la strada la conosce.\n", + /* 31*/ "Si tolga il cinturone, per favore!\n", + /* 32*/ "Oh, per la miseria!\n", + /* 33*/ "Non sono ammesse armi alla base!\n", + /* 34*/ "Bene, chiamer la sicurezza!\n", + /* 35*/ "Chiusura del sistema in corso...\n", + /* 36*/ "Il sistema di sicurezza stato disattivato.\n", + /* 37*/ "Sono state rilevate delle armi.\n", + /* 38*/ "La valigia stata depositata.\n", + /* 39*/ "La valigia stata esaminata.\n", + /* 40*/ "Ehi! L'accesso a quest'area vietato.\n", + /* 41*/ "ネ la prima volta che viene qui?\n", + /* 42*/ "Ehi! Mi restituisca la valigia.\n", + /* 43*/ "Chiami pure la sicurezza: me la vedr io con loro!\n", + /* 44*/ "Di sopra... c' un intruso.\n", + /* 45*/ "Negato l'accesso alla griglia laser.\n", + /* 46*/ "Sistema a griglie laser in sovraccarico.\n", + /* 47*/ "Vittime ingiustificate.\n", + /* 48*/ "Non devono prendere la cassaforte!\n", + /* 49*/ "Indossato travestimento.\n", + /* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n", + /* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n", + /* 52*/ "Se non fai qualcosa la valigia verr fermata.\n", + /* 53*/ "Cos quello l'Air Force One? Mhm... \n pi piccolo di quanto pensassi.\n", + /* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n", + /* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n", + /* 56*/ "Eccellente, Joanna. Quella navetta il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. ネ scortata da una squadra della base aerea. ネ superfluo ricordarti che...\n", + /* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n", + /* 58*/ "Non sono a conoscenza della misura in cui si sia diffusa la cospirazione all'interno dell'NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n", + /* 59*/ "S e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n", + /* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n", + /* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n", + /* 62*/ "Ucciso personale essenziale alla missione.\n", + /* 63*/ "Distrutto strumento essenziale alla missione.\n", + /* 64*/ "L'entrata alla base stata chiusa.\n", + /* 65*/ "Stiamo decollando!!!\n", + /* 66*/ "Chiuso carrello del velivolo.\n", + /* 67*/ "L'attrezzatura non pu essere depositata.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_s.c b/src/files/lang/pal-final/cave_str_s.c new file mode 100644 index 000000000..918ac4808 --- /dev/null +++ b/src/files/lang/pal-final/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos m疽 tarde tras cargarlos a bordo del Air Force One usando un carrito a駻eo. Primero, creo, necesitar疽 encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One est guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENCIAL \nBASE AノREA EE.UU., ALASKA\n", + /* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos m疽 tarde tras cargarlos a bordo del Air Force One usando un carrito a駻eo. Primero, creo, necesitar疽 encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base a駻ea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que 駸te es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aqu, Joanna. Hay mucha gente inocente por la base a駻ea. Slo los hombres de Trent o esos extraos hombres Rubios son blancos viables. Recuerda, cuanto m疽 tiempo tengas puesto el disfraz, m疽 posibilidades de 騙ito tendr疽.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el telef駻ico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base a駻ea. Recuerda, esa gente no sabe nada acerca de la conspiracin de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engaar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonar y la base ser bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avin se vaya sin ti. Si tu disfraz todava sigue activo, entonces ser疽 capaz de usar la pasarela para subir a bordo. Si no es as, deber疽 encontrar otro camino. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Obtener el disfraz y entrar a la base\n", + /* 6*/ "Facturar el equipo\n", + /* 7*/ "Burlar al sistema monitor de seguridad\n", + /* 8*/ "Obtener planes v. de la caja fuerte\n", + /* 9*/ "Abordar el Air Force One\n", + /* 10*/ "Obt駭 la maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obt駭 el uniforme de azafata de vuelo.\n", + /* 16*/ "\n", + /* 17*/ "Disfraz\n", + /* 18*/ "Disfraz\n", + /* 19*/ "Uniforme de azafata obtenido.\n", + /* 20*/ "Obt駭 los planes de vuelo de la caja fuerte.\n", + /* 21*/ "\n", + /* 22*/ "Planes de Vuelo\n", + /* 23*/ "Planes de Vuelo\n", + /* 24*/ "Planes de vuelo obtenidos.\n", + /* 25*/ "Cuidado. Es un intruso...\n", + /* 26*/ "Han muerto civiles inocentes.\n", + /* 27*/ "ソEst bien?\n", + /* 28*/ "Ir para obtener alguna ayuda.\n", + /* 29*/ "Buenas tardes.\n", + /* 30*/ "Muy bien, ya conoce el camino desde aqu.\n", + /* 31*/ "Deber疽 dejar ese arma aqu.\n", + /* 32*/ "。Oh, Dios mo!\n", + /* 33*/ "No se permiten armas en la base.\n", + /* 34*/ "De acuerdo, avisar a seguridad.\n", + /* 35*/ "Cierre del sistema iniciado...\n", + /* 36*/ "Los sistemas de seguridad han sido apagados.\n", + /* 37*/ "Se han detectado armas.\n", + /* 38*/ "La maleta ha sido facturada.\n", + /* 39*/ "La maleta ha sido escaneada.\n", + /* 40*/ "Hey, t: 駸ta es un 疵ea restringida.\n", + /* 41*/ "ソEres nueva por aqu?\n", + /* 42*/ "Hey. Devu駘veme mi maleta.\n", + /* 43*/ "Trae a seguridad, yo me encargo de ella...\n", + /* 44*/ "Arriba... hay un intruso.\n", + /* 45*/ "Acceso a la rejilla de l疽er denegado.\n", + /* 46*/ "Sistema de rejilla de l疽er sobrecargado.\n", + /* 47*/ "Demasiados civiles heridos.\n", + /* 48*/ "Detenles antes de que abran la caja fuerte...\n", + /* 49*/ "Disfraz puesto.\n", + /* 50*/ "。ノsta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n", + /* 51*/ "Usa la maleta para ocultar tu equipo.\n", + /* 52*/ "La maleta ser detenida a menos que hagas algo.\n", + /* 53*/ "ソAs que ese es el Air Force One? ... Huh, es m疽 \npequeo de lo que pensaba.\n", + /* 54*/ "Detenlos: est疣 accediendo a la caja fuerte...\n", + /* 55*/ "Agente Dark en posicin. Puedo ver la entrada principal de la base, y distingo el punto de llegada del telef駻ico.\n", + /* 56*/ "Excelente, Joanna. Ese telef駻ico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulacin entrar hace un minuto. Est siendo escoltada por tropas de la base a駻ea. No debo recordarte que probablemente...\n", + /* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequea trama de Trent. Y que no puedo dispararles aunque ellos me disparen a m. ソQu pasa con los agentes de la ANS?\n", + /* 58*/ "No s cu疣 lejos ha llegado la conspiracin a trav駸 de la ANS, pero podra apostar a que los hombres que Trent ha situado por aqu son leales a su plan y a 駘 mismo. Debes encontrar evidencias de la traicin de Trent en el Air Force One y ense疵selas al Presidente.\n", + /* 59*/ "S, y protegerle de sus secuestradores. ソTienes alguna idea sobre de qu puede tratar el plan de Trent, y qu pasa con esos chicos rubios?\n", + /* 60*/ "Slo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n", + /* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n", + /* 62*/ "Personal crtico de la misin eliminado.\n", + /* 63*/ "Objeto crtico de la misin destruido.\n", + /* 64*/ "Entrada a la base asegurada.\n", + /* 65*/ "。。Nos ocupamos nosotros!!\n", + /* 66*/ "El telef駻ico ha sido derribado.\n", + /* 67*/ "El equipo no puede ser registrado.\n", +}; diff --git a/src/files/lang/pal-final/cradE.c b/src/files/lang/pal-final/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cradJ.c b/src/files/lang/pal-final/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cradP.c b/src/files/lang/pal-final/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_f.c b/src/files/lang/pal-final/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_g.c b/src/files/lang/pal-final/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_i.c b/src/files/lang/pal-final/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_s.c b/src/files/lang/pal-final/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crypE.c b/src/files/lang/pal-final/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crypJ.c b/src/files/lang/pal-final/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crypP.c b/src/files/lang/pal-final/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_f.c b/src/files/lang/pal-final/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_g.c b/src/files/lang/pal-final/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_i.c b/src/files/lang/pal-final/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_s.c b/src/files/lang/pal-final/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/damE.c b/src/files/lang/pal-final/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-final/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-final/damJ.c b/src/files/lang/pal-final/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/pal-final/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/damP.c b/src/files/lang/pal-final/damP.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-final/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-final/dam_str_f.c b/src/files/lang/pal-final/dam_str_f.c new file mode 100644 index 000000000..60a0d73cf --- /dev/null +++ b/src/files/lang/pal-final/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - S馗uriser labos et donn馥s de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. S馗urisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 1*/ "Vaisseau Cetan\n", + /* 2*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLes conspirateurs ont d騁ourn le Pelagic II et ont entam d'importantes op駻ations sous-marines dans l'Oc饌n Pacifique. La dataDyne et leurs myst駻ieux alli駸 semblent 黎re impliqu駸 dans une manoeuvre de coop駻ation.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en 騅idence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alli駸. Contrecarrez du mieux que vous pouvez l'op駻ation tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - D駸activer source d'駭ergie principale\n\nLa coupure du g駭駻ateur principal fera d駻iver le vaisseau de sa zone d'op駻ation mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le g駭駻ateur.\n\n|Objectif 2: - D駸activer GPS et Auto-pilote\n\nD饕rancher le syst鑪e de localisation GPS et l'auto-pilote du vaisseau le fera s'馗arter de la station. Si seulement l'un des deux est 騁eint, les op駻ations de plong馥 ne seront pas perturb馥s et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour pr駱arer le submersible et votre 駲uipement pour une plong馥.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "D駸activer GPS et Auto-pilote\n", + /* 6*/ "D駸activer source d'駭ergie principale\n", + /* 7*/ "S馗uriser labos et donn馥s de recherche\n", + /* 8*/ "Activer l'ascenseur du sas\n", + /* 9*/ "Retrouver Elvis et s'enfuir avec lui\n", + /* 10*/ "On sabote les moteurs et le vaisseau \nd駻ivera... Parfait!\n", + /* 11*/ "Le sous-marin doit 黎re contrl d'ici. \n", + /* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'駘oignera de la station. \n", + /* 13*/ "Ils ne pourront plus continuer l'op駻ation \nsans 駭ergie.\n", + /* 14*/ "Syst鑪e auto-pilote d駸activ.\n", + /* 15*/ "Syst鑪e GPS d駸activ.\n", + /* 16*/ "Objet crucial d騁ruit.\n", + /* 17*/ "Porte de commande d'arr黎 du r饌cteur ouverte.\n", + /* 18*/ "R饌cteur d駸activ.\n", + /* 19*/ "Centre de contrle de plong馥 localis.\n", + /* 20*/ "Personnel crucial abattu.\n", + /* 21*/ "Donn馥s de recherche s馗uris馥s.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disque de recherche\n", + /* 25*/ "Un disque de recherche\n", + /* 26*/ "Disque de recherche obtenu.\n", + /* 27*/ "Personnel crucial abattu.\n", + /* 28*/ "Porte ascenseur d騅errouill馥.\n", + /* 29*/ "Ascenseur activ.\n", + /* 30*/ "Op駻ation refus馥 - portes du hangar ferm馥s.\n", + /* 31*/ "S駲uence de d騅errouillage r駟nitialis馥.\n", + /* 32*/ "Vas-y. Je s馗urise le p駻im鑼re. \nOn se retrouve plus tard.\n", + /* 33*/ "Elvis a 騁 abattu.\n", + /* 34*/ "Qu'est-ce que tu faisais? Suis-moi... \nOn d馗ampe.\n", + /* 35*/ "Des civils ont 騁 abattus.\n", + /* 36*/ "Objet crucial d騁ruit.\n", + /* 37*/ "Alarme activ馥.\n", + /* 38*/ "Alarme d駸activ馥.\n", + /* 39*/ "Bien. L'op駻ation de plong馥 a 騁 annul馥 la surface. \nIl est temps de piquer une t黎e.\n", + /* 40*/ "J'esp鑽e que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n", + /* 41*/ "On y est all un peu fort, non?\n", + /* 42*/ "Mais non.\n", + /* 43*/ "D饕ranche ce truc.\n", + /* 44*/ "Eteins-moi 軋.\n", + /* 45*/ "Je vais l'騁eindre.\n", + /* 46*/ "Ne me faites pas de mal!\n", + /* 47*/ "Crevez, charognes!\n", +}; diff --git a/src/files/lang/pal-final/dam_str_g.c b/src/files/lang/pal-final/dam_str_g.c new file mode 100644 index 000000000..e7a389244 --- /dev/null +++ b/src/files/lang/pal-final/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungen!\n\nWir wollen s舂tliche Informationen, die dataDyne bis dato ber dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker au゚er Gefecht. Vergessen Sie nicht, dass wir sie sp舩er noch verhren wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente fr das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es fr Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 1*/ "Cetanisches Schiff\n", + /* 2*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente fr das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es fr Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Verschwrer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und fhrt nun ein Tauchmanver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbndeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Ma゚nahme, wie wichtig diese Tiefsee-Operation fr die dataDyne-Gruppe und ihre Verbndeten sein muss. Ihre Aufgabe ist es, diese Operation zu stren. Bedenken Sie aber auch unsere Verhaltensregeln gegenber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings fhrt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Rntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Untersttzung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortfhrung der Operation zu unterbrechen. Zivilisten drfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurck. Bereiten Sie dort sich selbst und das Tauchschiff fr den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Deaktivieren Sie den Autopiloten!\n", + /* 6*/ "Setzen Sie den Generator au゚er Kraft!\n", + /* 7*/ "Sichern Sie die Daten!\n", + /* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n", + /* 9*/ "Flchten Sie gemeinsam mit Elvis!\n", + /* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n", + /* 11*/ "Von hier aus wird das Schiff gesteuert.\n", + /* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n", + /* 13*/ "Das Schiff wird ohne Stromzufuhr vllig \nnavigationsunf臧ig sein.\n", + /* 14*/ "Autopilot wurde deaktiviert\n", + /* 15*/ "GPS-System wurde deaktiviert\n", + /* 16*/ "Wichtiges Objekt wurde zerstrt\n", + /* 17*/ "Reaktor-Kontrollkonsole geffnet\n", + /* 18*/ "Reaktor wurde abgeschaltet.\n", + /* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n", + /* 20*/ "Wichtige Person neutralisiert\n", + /* 21*/ "Forschungsdaten wurden gesichert.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Sicherungsdiskette\n", + /* 25*/ "Eine Sicherungsdiskette\n", + /* 26*/ "Sicherungsdiskette aufgenommen\n", + /* 27*/ "Wichtige Personen wurden neutralisiert.\n", + /* 28*/ "Aufzugstr wurde entriegelt.\n", + /* 29*/ "Aufzug wurde aktiviert.\n", + /* 30*/ "Unzul舖sige Operation - Die Hangartren sind noch geschlossen.\n", + /* 31*/ "Entriegelungssequenz wurde abgebrochen.\n", + /* 32*/ "Du gehst voraus, Jo. Ich sichere das Gel舅de. \nWir treffen uns sp舩er.\n", + /* 33*/ "Elvis wurde neutralisiert.\n", + /* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschssel verschwinden.\n", + /* 35*/ "Zivile Verluste!!!\n", + /* 36*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 37*/ "Alarm wurde aktiviert.\n", + /* 38*/ "Alarm wurde deaktiviert.\n", + /* 39*/ "Korrekt. Die Operation wurde an der Oberfl臘he unterbrochen.\nZeit fr ein wenig Badevergngen.\n", + /* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n", + /* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n", + /* 42*/ "Ach, stell Dich nicht so m臈chenhaft an!\n", + /* 43*/ "Zieh den Stecker raus!\n", + /* 44*/ "Schalte das Ding ab!\n", + /* 45*/ "Ich schalte es ab.\n", + /* 46*/ "Bitte tu mir nichts.\n", + /* 47*/ "Jetzt seid ihr dran, Verr舩er.\n", +}; diff --git a/src/files/lang/pal-final/dam_str_i.c b/src/files/lang/pal-final/dam_str_i.c new file mode 100644 index 000000000..e137b03de --- /dev/null +++ b/src/files/lang/pal-final/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano l: li interrogheremo pi tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiver il pilota automatico dell'unit sommergibile minore, richiamandola affinch tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 1*/ "Astronave Cetan\n", + /* 2*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiver il pilota automatico dell'unit sommergibile minore, richiamandola affinch tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realt non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto pi possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetter lo spostamento del sottomarino dalla sua posizione operativa, ma interromper anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizier ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sar sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il GPS e il pilota automatico\n", + /* 6*/ "Disattiva la fonte d'energia primaria\n", + /* 7*/ "Chiudi a chiave i laboratori\n", + /* 8*/ "Attiva il sollevatore del Moon Pool\n", + /* 9*/ "Incontro e fuga con Elvis\n", + /* 10*/ "Disattivando il motore il sottomarino\n andr alla deriva... Perfetto!\n", + /* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n", + /* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontaner dalla sua posizione.\n", + /* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n", + /* 14*/ "Disattivato pilota automatico.\n", + /* 15*/ "Disattivato sistema GPS.\n", + /* 16*/ "Distrutto strumento essenziale alla missione.\n", + /* 17*/ "Aperto sportello comandi del reattore.\n", + /* 18*/ "Disattivato il reattore.\n", + /* 19*/ "Localizzato centro di comando immersione.\n", + /* 20*/ "Ucciso personale essenziale alla missione.\n", + /* 21*/ "I dati di ricerca sono al sicuro.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco dati di ricerca\n", + /* 25*/ "Disco dati di ricerca\n", + /* 26*/ "Preso disco dati di ricerca.\n", + /* 27*/ "Ucciso personale essenziale alla missione.\n", + /* 28*/ "Aperta porta sollevatore.\n", + /* 29*/ "Attivato sollevatore.\n", + /* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n", + /* 31*/ "La sequenza di sblocco stata resettata.\n", + /* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 33*/ "Elvis stato ucciso.\n", + /* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n", + /* 35*/ "Uccisi dei civili.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Attivato allarme.\n", + /* 38*/ "Disattivato allarme.\n", + /* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n", + /* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n", + /* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n", + /* 42*/ "Ma va l!!!\n", + /* 43*/ "E ora stacca la spina!\n", + /* 44*/ "Spegni 'sto coso!\n", + /* 45*/ "Ora lo chiudo!\n", + /* 46*/ "Non farmi del male!\n", + /* 47*/ "Crepa, traditore!\n", +}; diff --git a/src/files/lang/pal-final/dam_str_s.c b/src/files/lang/pal-final/dam_str_s.c new file mode 100644 index 000000000..0bc7da93e --- /dev/null +++ b/src/files/lang/pal-final/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigacin\n\nQueremos cualquier informacin que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los cientficos y t馗nicos que all trabajan; queremos interrogarles m疽 tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activar el piloto autom疸ico del sumergible de profundidad, tray駭dolo de vuelta para que lo us駟s Elvis y t. Los controles est疣 en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 1*/ "Nave Cetan\n", + /* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activar el piloto autom疸ico del sumergible de profundidad, tray駭dolo de vuelta para que lo us駟s Elvis y t. Los controles est疣 en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaucin por la borda y han cometido un acto de piratera, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Oc饌no Pacfico. Ambos, dataDyne y sus extraos aliados, est疣 envueltos en lo que parece una operacin conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, slo sirve para mostrar lo importante que esta operacin en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operacin tanto como sea posible, pero recuerda nuestras reglas de fuerza mnima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energa\n\nApagar la fuente primaria de energa puede causar que el navo se aparte de la zona de operaciones, pero tambi駭 puede causar apagones en secciones no esenciales de la nave. Usa el esc疣er de rayos-x para encontrar los interruptores activos en el ncleo de energa.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Autom疸ico\n\nApagar tanto el sistema de localizacin GPS como el piloto autom疸ico de la nave causar que el barco quede 'dormido'; si solamente uno es apagado, no ser suficiente para evitar que las operaciones submarinas continen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde deb駟s preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar GPS y piloto autom疸ico\n", + /* 6*/ "Desactivar fuente primaria de energa\n", + /* 7*/ "Asegurar laboratorios y datos\n", + /* 8*/ "Activar el ascensor de la piscina\n", + /* 9*/ "Encontrar y escapar con Elvis\n", + /* 10*/ "Estropea los motores y la nave ir \na la deriva... 。Perfecto!\n", + /* 11*/ "Desde aqu se debe controlar el submarino.\n", + /* 12*/ "Sin el piloto autom疸ico y el GPS, la nave \ndeambular fuera de la estacin.\n", + /* 13*/ "No podr疣 realizar ninguna operacin \nsin energa.\n", + /* 14*/ "El sistema de piloto autom疸ico ha sido desactivado.\n", + /* 15*/ "El sistema GPS ha sido desactivado.\n", + /* 16*/ "Objeto crtico de la misin destruido.\n", + /* 17*/ "Escotilla del control de apagado del reactor abierta.\n", + /* 18*/ "El reactor ha sido apagado.\n", + /* 19*/ "El centro de control de buceo ha sido localizado.\n", + /* 20*/ "Ha muerto personal crtico de la misin.\n", + /* 21*/ "Datos de investigacin asegurados.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco de datos\n", + /* 25*/ "Un disco de datos de investigacin\n", + /* 26*/ "Disco de datos de investigacin obtenido.\n", + /* 27*/ "Ha muerto personal crtico de la misin.\n", + /* 28*/ "La puerta del ascensor ha sido abierta.\n", + /* 29*/ "El ascensor ha sido activado.\n", + /* 30*/ "Operacin denegada: puertas del hangar todava cerradas.\n", + /* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n", + /* 32*/ "Ve delante, Joanna. Asegurar el permetro. \nNos vemos m疽 tarde.\n", + /* 33*/ "Elvis ha muerto.\n", + /* 34*/ "Joanna... ソPor qu has tardado tanto? Sgueme. \nSalgamos de esta vieja baera.\n", + /* 35*/ "Han muerto civiles.\n", + /* 36*/ "Objeto crtico de la misin destruido.\n", + /* 37*/ "La alarma ha sido activada.\n", + /* 38*/ "La alarma ha sido desactivada.\n", + /* 39*/ "Correcto. La operacin de buceo ha sido desbaratada en la superficie. \nEs la hora del bao.\n", + /* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n", + /* 41*/ "ソPiensas que fuimos un poquito torpes?\n", + /* 42*/ "Nooohhhh.\n", + /* 43*/ "Tira del enchufe ahora.\n", + /* 44*/ "Apaga esa cosa.\n", + /* 45*/ "Lo apagar.\n", + /* 46*/ "Por favor, no me hagas dao.\n", + /* 47*/ "Morid, traidores...\n", +}; diff --git a/src/files/lang/pal-final/depoE.c b/src/files/lang/pal-final/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-final/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-final/depoJ.c b/src/files/lang/pal-final/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/pal-final/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/pal-final/depoP.c b/src/files/lang/pal-final/depoP.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-final/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_f.c b/src/files/lang/pal-final/depo_str_f.c new file mode 100644 index 000000000..815834afe --- /dev/null +++ b/src/files/lang/pal-final/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - D駸activer le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble emp鹹he tout syst鑪e d'enregistrement de fonctionner. Une fois coup馥, la Camspy pourra transmettre les donn馥s au QG.\n\n|Objectif 2: - D駸activer les syst鑪es de grilles laser\n\nUn examen du tableau 駭erg騁ique du b穰iment G5 indique la pr駸ence d'un r駸eau de grilles laser. Celles-ci sont plac馥s pour barrer la route vers la salle de r騏nion. D駸activez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit gard馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 1*/ "IMMEUBLE G5\n", + /* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - D駸activer les syst鑪es de grille laser\n\nUn examen du tableau 駭erg騁ique du b穰iment G5 indique la pr駸ence d'un r駸eau de grilles laser. Celles-ci sont plac馥s pour barrer la route vers la salle de r騏nion. D駸activez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit gard馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du b穰iment o la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est prot馮 par un syst鑪e d'alarme. Prenez garde ne pas 黎re rep駻馥 par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs annuler leur rencontre. Proc馘ez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - R馗up駻er la sauvegarde dans le coffre\n\nLe Dr. Caroll a inform Daniel de la pr駸ence d'une sauvegarde de sa personnalit gard馥 dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalit du Dr. Caroll pourra 黎re restaur馥 ult駻ieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nD騁ruisez la porte condamn馥 pour cr馥r une sortie. Souvenez-vous du niveau ext駻ieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "D駸activer le champ d'isolement\n", + /* 10*/ "D駸activer les syst鑪es de grilles laser\n", + /* 11*/ "Holographier les conspirateurs\n", + /* 12*/ "R馗up駻er la sauvegarde dans le coffre\n", + /* 13*/ "Sortir de l'immeuble\n", + /* 14*/ "Obtenir carte alpha.\n", + /* 15*/ "Garde: \n", + /* 16*/ "Carte Niveau 1\n", + /* 17*/ "Carte du garde\n", + /* 18*/ "Carte du garde obtenue.\n", + /* 19*/ "Obtenir carte alpha.\n", + /* 20*/ "Garde: \n", + /* 21*/ "Carte Niveau 2\n", + /* 22*/ "Carte du garde\n", + /* 23*/ "Carte du garde obtenue.\n", + /* 24*/ "Objet crucial d騁ruit.\n", + /* 25*/ "G駭駻ateur champ d'isolement coup.\n", + /* 26*/ "G駭駻ateur ne peut 黎re rallum.\n", + /* 27*/ "Unit grilles laser coup馥.\n", + /* 28*/ "Unit grilles laser activ馥.\n", + /* 29*/ "Tous syst鑪es grilles laser coup駸.\n", + /* 30*/ "Obtenir cassette DAT.\n", + /* 31*/ "Dr. Caroll: \n", + /* 32*/ "Disque sauvegarde\n", + /* 33*/ "Disque sauvegarde\n", + /* 34*/ "Disque sauvegarde obtenu.\n", + /* 35*/ "D馗odeur porte fix sur panneau d'acc鑚.\n", + /* 36*/ "Commandes piratages lanc馥s.\n", + /* 37*/ "D馗odage porte achev - porte d騅errouill馥.\n", + /* 38*/ "ALERTE INTRUSION - s馗urit dans l'abri.\n", + /* 39*/ "D馗odeur porte plac correctement.\n", + /* 40*/ "D馗odeur porte mal plac.\n", + /* 41*/ "Conspirateurs alert駸.\n", + /* 42*/ "Alarme activ馥.\n", + /* 43*/ "Alarme d駸activ馥.\n", + /* 44*/ "Porte du coffre ferm馥.\n", + /* 45*/ "D馗odeur porte fix.\n", + /* 46*/ "Obtenir explosif porte.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "Explosif porte\n", + /* 49*/ "Explosif porte\n", + /* 50*/ "Explosif porte obtenu.\n", + /* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n", + /* 52*/ "MISSION ACCOMPLIE\n", + /* 53*/ "Mouchard plac correctement.\n", + /* 54*/ "Mouchard mal plac.\n", + /* 55*/ "Obtenir CamSpy.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "CamSpy\n", + /* 58*/ "Une CamSpy\n", + /* 59*/ "CamSpy obtenue.\n", + /* 60*/ "C'est impossible de passer avec tous \nces lasers activ駸.\n", + /* 61*/ "La salle de r騏nion doit 黎re droit devant. \nIl est temps d'utiliser la CamSpy.\n", + /* 62*/ "La combinaison du coffre est tr鑚 complexe. \nLe d馗odeur va mettre plus de temps.\n", + /* 63*/ "Il faut partir maintenant! Je retourne vite \nla porte de tout l'heure.\n", + /* 64*/ "Objet crucial d騁ruit.\n", + /* 65*/ "Reculez, Joanna. Nous allons vous ouvrir \nun passage.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "D騁onateur\n", + /* 69*/ "D騁onateur\n", + /* 70*/ "D騁onateur obtenue.\n", + /* 71*/ "CamSpy d騁ruite - abandonner la mission.\n", + /* 72*/ "Nous avons r馗up駻 le Sapiens chez Carrington \net chang son programme. Il n'a plus de \npersonnalit. Cela 騅itera de futurs \nincidents.\n", + /* 73*/ "Cela r馘uira son efficacit. Mon 駲uipe le \nm鈩era au centre. Ils prendront donc \ndes risques inutiles. Vous auriez d \npr騅oir ce d騅eloppement de conscience chez \nle Sapiens.\n", + /* 74*/ "Comment pr騅oir une chose pareille?! \nEt pourquoi suis-je la seule porter \nle chapeau? Et lui alors?\n", + /* 75*/ "Le Pr駸ident a-t-il refus votre demande \nde pr黎 du Pelagic II?\n", + /* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n", + /* 77*/ "Non! J'ai peut-黎re sous-estim son ct \nint鑒re. Mais nous avons un plan de \nsecours. Nous agirons d鑚 que l'駲uipe \npr駸identielle arrivera la base a駻ienne. \nJe n'ai besoin que d'un 馗hantillon de la \npeau du Pr駸ident.\n", + /* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n", + /* 79*/ "Mr. Carrington ne b駭馭iciera d'aucune aide \next駻ieure. L'駲uipement que vous nous \navez offert est install au Nevada et est \nop駻ationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n", + /* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de d騁ruire tout ce qui ne veut pas \nfonctionner. Souvenez-vous-en pendant \nl'ex馗ution de votre 'plan de secours.'\n", + /* 81*/ "Agent Dark au rapport! Pr駱arez-vous \nrecevoir les donn馥s de la r騏nion. \nDemande prioritaire d'une 駲uipe de \nl'Institut pour prot馮er le Pr駸ident \navant son d駱art pour l'Alaska.\n", + /* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tt a 騁 \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, l o les \nrescap駸 et les d饕ris ont d 黎re amen駸. \nRevenez au poste et pr駱arez-vous \npour un d駱art imminent. \nCarrington, termin.\n", + /* 83*/ "Secteur 51? Et le Pr駸ident alors?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_g.c b/src/files/lang/pal-final/depo_str_g.c new file mode 100644 index 000000000..268459faf --- /dev/null +++ b/src/files/lang/pal-final/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den Generator au゚er Kraft!\n\nAuf dem Garagen-Deck des Geb舫des befindet sich eine Vorrichtung, die den Einsatz jeglicher Rekorder verhindert. Finden Sie das Ger舩 und schalten Sie es ab! Anschlie゚end sollte der CamSpy die Daten ohne Probleme bermitteln knnen.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Geb舫de zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten knnen, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persnlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|5. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierte Tr, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 1*/ "G5-BUILDING\n", + /* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Geb舫de zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten knnen, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persnlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|4. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierte Tr, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, mssen Sie ins Herz des Geb舫des vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschlie゚end sofort das Geb舫de!\n\n|Carrington - \n\nDas G5-Building verfgt ber ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelst. In diesem Fall wrden die Verschwrer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwrer!\n\nDer CamSpy ist die perfekte Lsung, De Vries und die anderen Verschwrer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persnlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persnlichkeit zu einem sp舩eren Zeitpunkt wiederherstellen knnen.\n\n|3. Ziel: - Verlassen Sie das Geb舫de!\n\nZerstren Sie die blockierte Tr, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu untersch舩zenden Zeitvorteil.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Setzen Sie den Generator au゚er Kraft!\n", + /* 10*/ "Deaktivieren Sie das Laser-Netz!\n", + /* 11*/ "Holografieren Sie die Verschwrer!\n", + /* 12*/ "Stehlen Sie die Sicherheitskopie!\n", + /* 13*/ "Verlassen Sie das Geb舫de!\n", + /* 14*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 15*/ "Level 1 Schlsselkarte\n", + /* 16*/ "der Wache\n", + /* 17*/ "Schlsselkarte der Wache\n", + /* 18*/ "Schlsselkarte der Wache aufgenommen\n", + /* 19*/ "Erlangen Sie die Alpha-Schlsselkarte!\n", + /* 20*/ "Level 2 Schlsselkarte\n", + /* 21*/ "der Wache\n", + /* 22*/ "Schlsselkarte der Wache\n", + /* 23*/ "Schlsselkarte der Wache aufgenommen\n", + /* 24*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 25*/ "Generator wurde abgeschaltet.\n", + /* 26*/ "Der Generator kann nicht wieder gestartet werden.\n", + /* 27*/ "Laser-Netz wurde deaktiviert.\n", + /* 28*/ "Laser-Netz wurde aktiviert.\n", + /* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n", + /* 30*/ "Erlangen Sie das DAT-Tape.\n", + /* 31*/ "Dr. Carolls\n", + /* 32*/ "Sicherheitskopie\n", + /* 33*/ "Sicherheitskopie\n", + /* 34*/ "Sicherheitskopie aufgenommen\n", + /* 35*/ "Tr-Decoder wurde an der Konsole angebracht.\n", + /* 36*/ "Crack-Routine wurde initiiert.\n", + /* 37*/ "Crack-Vorgang abgeschlossen - Tr wurde entriegelt.\n", + /* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskr臟te sofort ins Kellergescho゚!\n", + /* 39*/ "Tr-Decoder wurde korrekt platziert.\n", + /* 40*/ "Tr-Decoder wurde nicht korrekt platziert.\n", + /* 41*/ "Die Verschwrer wurden alarmiert.\n", + /* 42*/ "Alarm wurde aktiviert.\n", + /* 43*/ "Alarm wurde deaktiviert.\n", + /* 44*/ "Die Safetr ist versperrt.\n", + /* 45*/ "Tr-Decoder wurde angebracht.\n", + /* 46*/ "Erlangen Sie den Sprengsatz.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "Sprengsatz\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Sprengsatz aufgenommen\n", + /* 51*/ "Zielerreichung unvollst舅dig - MISSION FEHLGESCHLAGEN!\n", + /* 52*/ "MISSION ERFOLGREICH\n", + /* 53*/ "Sender wurde korrekt platziert.\n", + /* 54*/ "Sender wurde nicht korrekt platziert.\n", + /* 55*/ "Erlangen Sie den CamSpy.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "CamSpy\n", + /* 58*/ "Ein CamSpy\n", + /* 59*/ "CamSpy aufgenommen\n", + /* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n", + /* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit fr den CamSpy.\n", + /* 62*/ "Der Safe-Code ist sehr ausgeklgelt.\nDer Decoder wird etwas mehr Zeit bentigen.\n", + /* 63*/ "Zeit zu gehen! Ich muss zu der Tr, die ich \nvorhin 'pr舊ariert' habe.\n", + /* 64*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Detonator aufgenommen\n", + /* 71*/ "Der CamSpy wurde zerstrt - Brechen Sie die Mission ab!\n", + /* 72*/ "Wir haben uns den Sapienten von Carrington zurckgeholt \nund sein Programm ver舅dert. Es hat nun keine \nPersnlichkeit mehr. Daher sind auch keine \nweiteren Zwischenf舁le mehr zu befrchten.\n", + /* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie h舩ten \nvoraussehen mssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n", + /* 74*/ "Niemand h舩te das voraussehen knnen! Und ich \nlehne es ab, dafr verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n", + /* 75*/ "Der Pr舖ident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n", + /* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig bersch舩zt haben?\n", + /* 77*/ "Nein! Ich habe nur seine Entschlossenheit untersch舩zt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Sttzpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPr舖identen.\n", + /* 78*/ "Ha! Vorausgesetzt, es gibt keine Strma゚nahmen. \nWenn Carrington eins und eins zusammengez臧lt hat, \ndann ist Verst舐kung schon unterwegs.\n", + /* 79*/ "Carrington wird keine Hilfe von au゚en erhalten. \nDie Technologie, die Sie uns zur Verfgung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit knnen wir jedes Flugzeug vom Himmel holen.\n", + /* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstrt werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n", + /* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nワbertragung der Aufzeichnung vor. Ich beantrage ein \nUntersttzungsteam des Instituts zum Schutz des \nPr舖identen, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorit舩 Eins.\n", + /* 82*/ "Dafr ist nun keine Zeit, Agent Dark. W臧rend \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde ber Nevada abgeschossen. \nDie dafr verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nワberlebende und die Wrackteile gebracht. Bereiten \nSie sich fr die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n", + /* 83*/ "Area 51? Aber was geschieht mit dem Pr舖identen?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_i.c b/src/files/lang/pal-final/depo_str_i.c new file mode 100644 index 000000000..0480b5605 --- /dev/null +++ b/src/files/lang/pal-final/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato, la TeleSpia potr trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di l il pi in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poich cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio d sull'esterno, te la caverai pi in fretta.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disattiva generatore segnali\n", + /* 10*/ "Disattiva il sistema delle griglie laser\n", + /* 11*/ "Olografa i cospiratori in riunione\n", + /* 12*/ "Prendi copia backup dalla cassaforte\n", + /* 13*/ "Esci dall'edificio\n", + /* 14*/ "Procurati chiave alfa\n", + /* 15*/ "Guardia:\n", + /* 16*/ "Chiave 1ー piano\n", + /* 17*/ "Chiave della guardia\n", + /* 18*/ "Presa chiave della guardia\n", + /* 19*/ "Procurati chiave alfa\n", + /* 20*/ "Guardia:\n", + /* 21*/ "Chiave 2ー piano\n", + /* 22*/ "Chiave della guardia\n", + /* 23*/ "Presa chiave della guardia\n", + /* 24*/ "Distrutto strumento essenziale alla missione\n", + /* 25*/ "Disattivato generatore segnali di disturbo\n", + /* 26*/ "Impossibile riaccendere il generatore\n", + /* 27*/ "Disattivata unit griglie laser\n", + /* 28*/ "Attivata unit griglie laser\n", + /* 29*/ "Disattivati tutti i sistemi griglie laser\n", + /* 30*/ "Procurati nastro DAT\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco di backup \n", + /* 33*/ "Disco di backup\n", + /* 34*/ "Preso disco di backup.\n", + /* 35*/ "Decodificatore porta in azione\n", + /* 36*/ "Decodifica in corso...\n", + /* 37*/ "Decodificatore ha finito: porta aperta.\n", + /* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n", + /* 39*/ "Decodificatore piazzato correttamente\n", + /* 40*/ "Decodificatore in posizione errata\n", + /* 41*/ "Allertati i cospiratori\n", + /* 42*/ "Attivato l'allarme\n", + /* 43*/ "Disattivato l'allarme\n", + /* 44*/ "Bloccata porta di sicurezza \n", + /* 45*/ "Decodificatore in azione\n", + /* 46*/ "Procurati Esplodiporta\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Esplodiporta\n", + /* 49*/ "Esplodiporta\n", + /* 50*/ "Preso Esplodiporta\n", + /* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 52*/ "MISSIONE COMPIUTA\n", + /* 53*/ "Cimice piazzata correttamente\n", + /* 54*/ "Cimice in posizione errata\n", + /* 55*/ "Procurati TeleSpia\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "TeleSpia\n", + /* 58*/ "TeleSpia\n", + /* 59*/ "Presa TeleSpia\n", + /* 60*/ "ネ impossibile passare finch sono \nattivi quei laser.\n", + /* 61*/ "Quella dev'essere la sala riunioni. \nネ ora di usare la TeleSpia.\n", + /* 62*/ "La cassaforte criptata. \nIl decodificatore ci metter un po'.\n", + /* 63*/ "ネ ora di andare! Passiamo per la porta che ho \npredisposto!\n", + /* 64*/ "Distrutto strumento essenziale alla missione.\n", + /* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonatore\n", + /* 69*/ "Detonatore\n", + /* 70*/ "Preso detonatore.\n", + /* 71*/ "Distrutta la TeleSpia - Missione fallita\n", + /* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalit, cos non \navremo pi spiacevoli sorprese.\n", + /* 73*/ "Questo ridurr la sua efficienza. La mia \nsquadra dovr portarlo subito al centro, \nma ci li metter in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n", + /* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n", + /* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n", + /* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n", + /* 77*/ "No! Avr sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ci che mi serve \ndal Presidente un campione di tessuto.\n", + /* 78*/ "S... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avr gi chiamato i rinforzi!\n", + /* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato stata \ninstallata in Nevada ed gi operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n", + /* 80*/ "Ci significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ci che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n", + /* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n", + /* 82*/ "Ora non c' tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo stato abbattuto \nin Nevada. Il colpo stato sparato dall'\nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n", + /* 83*/ "L'Area 51? E che ne sar del Presidente?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_s.c b/src/files/lang/pal-final/depo_str_s.c new file mode 100644 index 000000000..e7b81a6ea --- /dev/null +++ b/src/files/lang/pal-final/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Hmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisin de cualquier informacin grabada por la C疥ara Espa. Una vez apagado, la C疥ara Espa puede enviar cualquier grabacin al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla L疽er\n\nUn examen del suministro energ騁ico del Edificio G5 indica una red de rejillas l疽er. Estas rejillas est疣 colocadas especficamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estar limpio.\n\n|Objetivo Tres: - Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla L疽er\n\nUn examen del suministro energ騁ico del Edificio G5 indica una red de rejillas l疽er. Estas rejillas est疣 colocadas especficamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estar limpio.\n\n|Objetivo Dos- Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazn del edificio donde una reunin tendr lugar. Obt駭 una grabacin visual de la reunin y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentar疣 activarlas. Esto alertar a los conspiradores, que casi seguro que no tendr疣 la reunin bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunin de los Conspiradores\n\nEl dispositivo de la C疥ara Espa es un excelente modo de grabar la reunin sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll inform a Daniel de una copia de su personalidad que est guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qu nivel estaba fuera la salida de incendios, te ahorrar疽 bastante tiempo.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Desactivar generador de campo hmedo\n", + /* 10*/ "Desactivar sistemas de rejilla l疽er\n", + /* 11*/ "Holografiar reunin de conspiradores\n", + /* 12*/ "Recuperar copia del Dr. Caroll\n", + /* 13*/ "Salir del edificio\n", + /* 14*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 15*/ "Guarda:\n", + /* 16*/ "Llave de Nivel 1\n", + /* 17*/ "Llave Magn騁ica del Guarda\n", + /* 18*/ "Llave Magn騁ica del Guarda obtenida\n", + /* 19*/ "Obt駭 la llave magn騁ica alfa.\n", + /* 20*/ "Guarda:\n", + /* 21*/ "Llave de Nivel 2\n", + /* 22*/ "Llave Magn騁ica del Guarda\n", + /* 23*/ "Llave Magn騁ica del Guarda obtenida\n", + /* 24*/ "Objeto crtico de la misin destruido.\n", + /* 25*/ "Generador de campo hmedo apagado.\n", + /* 26*/ "El generador no puede reiniciarse.\n", + /* 27*/ "Unidad de rejilla l疽er apagada.\n", + /* 28*/ "Unidad de rejilla l疽er activada.\n", + /* 29*/ "Todos los sistemas de rejilla l疽er apagados.\n", + /* 30*/ "Obt駭 la cinta de Datos.\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco de seguridad\n", + /* 33*/ "Disco de seguridad\n", + /* 34*/ "Disco de seguridad obtenido.\n", + /* 35*/ "Decodificador de puertas colocado en el acceso.\n", + /* 36*/ "Iniciando rutinas de apertura.\n", + /* 37*/ "El decodificador de puertas termin: puerta abierta.\n", + /* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n", + /* 39*/ "Decodificador de puertas colocado correctamente.\n", + /* 40*/ "Decodificador de puertas colocado incorrectamente.\n", + /* 41*/ "Los conspiradores han sido alertados.\n", + /* 42*/ "Alarma activada.\n", + /* 43*/ "Alarma desactivada.\n", + /* 44*/ "La puerta de la caja fuerte est cerrada.\n", + /* 45*/ "Decodificador de puertas colocado.\n", + /* 46*/ "Obt駭 el Revienta-puertas.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Revienta-puertas\n", + /* 49*/ "Revienta-puertas\n", + /* 50*/ "Revienta-puertas obtenido.\n", + /* 51*/ "Objetivos incompletos: MISIモN FALLADA.\n", + /* 52*/ "MISIモN CONSEGUIDA\n", + /* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 55*/ "Obt駭 la C疥ara Espa.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "C疥ara Espa\n", + /* 58*/ "Una Cam疵a Espa\n", + /* 59*/ "C疥ara Espa obtenida.\n", + /* 60*/ "No hay ningn camino posible mientras \nesos l疽eres est駭 activos.\n", + /* 61*/ "Eso de ah delante debe ser la sala de reuniones. \nHora de usar la C疥ara Espa.\n", + /* 62*/ "La caja fuerte est fuertemente encriptada. \nEl decodificador va a tomarse su tiempo.\n", + /* 63*/ "。Hora de irse! Vamos a la puerta que cre \nantes.\n", + /* 64*/ "Objeto crtico de la misin destruido.\n", + /* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonador\n", + /* 69*/ "Detonador\n", + /* 70*/ "Detonador obtenido.\n", + /* 71*/ "La C疥ara Espa ha sido destruida: abortar misin.\n", + /* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programacin. Nunca m疽 tendr \npersonalidad, as no podr haber posibles \nfuturos incidentes.\n", + /* 73*/ "Esto reducir su eficiencia. Mi equipo tendr \nque llevarlo al ncleo por s mismo. Esto les \npondr en peligro. Debas haber anticipado \nque la IA podra desarrollar un problem疸ico \ncdigo moral.\n", + /* 74*/ "。Nadie podra haber predecido eso! 。Y me \nmolesta que me echen la culpa de ello! \nソQu pasa con 駘?\n", + /* 75*/ "ソEl Presidente no ha admitido tu peticin \nde pr駸tamo del Pelagic II?\n", + /* 76*/ "ソNo podra ser que hayas sobreestimado \ntu influencia sobre 駘?\n", + /* 77*/ "。No! Quiz haya menospreciado su resolucin. \nTenemos un plan de contigencia preparado, \ny comenzar tan pronto como el s駲uito presidencial\nllegue a la base a駻ea. Todo lo que necesito del \nPresidente es una muestra de tejido cut疣eo.\n", + /* 78*/ "。Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisar a los refuerzos.\n", + /* 79*/ "No habr ayuda exterior para el Sr. Carrington. \nLa tecnologa que nos diste est instalada en \nNevada y es totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n", + /* 80*/ "ソEntonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n", + /* 81*/ "。Agente Dark informando! Preparaos para \nrecibir los datos de la reunin. \nPeticin prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n", + /* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nチrea 51... All es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aqu. Carrington fuera.\n", + /* 83*/ "ソAl チrea 51? ソPero qu pasa con el Presidente?\n", +}; diff --git a/src/files/lang/pal-final/destE.c b/src/files/lang/pal-final/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/destJ.c b/src/files/lang/pal-final/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/destP.c b/src/files/lang/pal-final/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_f.c b/src/files/lang/pal-final/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_g.c b/src/files/lang/pal-final/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_i.c b/src/files/lang/pal-final/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_s.c b/src/files/lang/pal-final/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dishE.c b/src/files/lang/pal-final/dishE.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-final/dishE.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dishJ.c b/src/files/lang/pal-final/dishJ.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-final/dishJ.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dishP.c b/src/files/lang/pal-final/dishP.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-final/dishP.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_f.c b/src/files/lang/pal-final/dish_str_f.c new file mode 100644 index 000000000..0b877e455 --- /dev/null +++ b/src/files/lang/pal-final/dish_str_f.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Prendre la Vue nocturne sur la table pour commencer.\n", + /* 9*/ "Activer la Vue nocturne.\nTrouver l'interrupteur.\nR騁ablir la lumi鑽e.\n", + /* 10*/ "Prendre le r馗epteur sur la table pour commencer.\n", + /* 11*/ "Se tenir pr鑚 du terminal et utiliser le r馗epteur.\n", + /* 12*/ "Il faut tenir le r馗epteur.\n", + /* 13*/ "Connexion 騁ablie...\n", + /* 14*/ "Terminal pirat avec succ鑚.\n", + /* 15*/ "Connexion perdue - trop loin du PC.\n", + /* 16*/ "Prendre la mine CME sur la table pour commencer.\n", + /* 17*/ "Trouver le relais et lancer la mine CME sur le relais.\n", + /* 18*/ "Mine CME mal plac馥.\n", + /* 19*/ "Mine CME plac馥 correctement.\n", + /* 20*/ "Prendre la CamSpy sur la table pour commencer.\n", + /* 21*/ "Trouver PC de salle Info et holographier.\n", + /* 22*/ "Empreinte holographique de PC correcte.\n", + /* 23*/ "Lumi鑽es r饌ctiv馥s.\n", + /* 24*/ "Prendre le d馗odeur porte sur la table pour commencer.\n", + /* 25*/ "Utiliser le d馗odeur sur la porte pour l'ouvrir.\n", + /* 26*/ "Il faut tenir le d馗odeur porte.\n", + /* 27*/ "D馗odeur fix. Commandes de piratage lanc馥s...\n", + /* 28*/ "D馗odage termin. Porte d騅errouill馥.\n", + /* 29*/ "Prendre le pisteur sur la table pour commencer.\n", + /* 30*/ "Trouver le scanner IR gr稍e au pisteur.\n", + /* 31*/ "Scanner IR localis avec succ鑚.\n", + /* 32*/ "Prendre le scanner IR sur la table pour commencer.\n", + /* 33*/ "Trouver la porte secr鑼e gr稍e au scanner IR.\n", + /* 34*/ "Porte secr鑼e localis馥 avec succ鑚.\n", + /* 35*/ "Prendre le scanner rayons X sur la table pour commencer.\n", + /* 36*/ "Trouver interrupteurs cach駸 pour couper grille laser.\n", + /* 37*/ "Toutes les grilles laser sont d駸activ馥s.\n", + /* 38*/ "Prendre le costume sur la table pour commencer.\n", + /* 39*/ "Tromper quelqu'un pour obtenir un occulteur.\n", + /* 40*/ "Occulteur r馗up駻 avec succ鑚.\n", + /* 41*/ "Grille laser 1 d駸activ馥.\n", + /* 42*/ "Grille laser 2 d駸activ馥.\n", + /* 43*/ "Je viens chercher l'駲uipement.\n", + /* 44*/ "Bonjour, Joanna. Alors comme 軋 on se d馮uise?\n", + /* 45*/ "Voil. Ne le faites pas tomber surtout.\n", + /* 46*/ "Occulteur s馗uris avec succ鑚.\n", + /* 47*/ "N'oubliez pas d'utiliser votre costume, d'accord?\n", + /* 48*/ "Il faudra faire mieux que cela, Joanna.\n", + /* 49*/ "Joanna, d'o sortez-vous?\n", + /* 50*/ "La cam駻a vous a rep駻馥.\n", + /* 51*/ "Prendre l'occulteur sur la table pour commencer.\n", + /* 52*/ "Utiliser l'occulteur et localiser Carrington.\n", + /* 53*/ "Aucun doute possible, votre entranement\nest termin!\n", + /* 54*/ "Mission accomplie - Entranement 駲uipement termin!\n", + /* 55*/ "Mission 馗hou馥 - vous 黎es rep駻馥.\n", + /* 56*/ "Choisir le R馗epteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le r馗epteur et rel稍her le bouton A.\n", + /* 57*/ "Choisir la CamSpy.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir la CamSpy et rel稍her le bouton A.\n", + /* 58*/ "Choisir la Vue nocturne.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir Vue nocturne et rel稍her A.\n", + /* 59*/ "Choisir le D馗odeur porte.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le d馗odeur porte et rel稍her le bouton A.\n", + /* 60*/ "Choisir le Scanner rayons X.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le scanner rayons X et rel稍her le bouton A.\n", + /* 61*/ "Choisir le costume.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le costume et rel稍her le bouton A.\n", + /* 62*/ "Choisir le Scanner IR.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le scanner IR et rel稍her le bouton A.\n", + /* 63*/ "Choisir le Pisteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir le pisteur et rel稍her le bouton A.\n", + /* 64*/ "Choisir l'Occulteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir l'occulteur et rel稍her le bouton A.\n", + /* 65*/ "Choisir la Mine CME.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de s駘ection.\n- Choisir la mine CME et rel稍her le bouton A.\n", + /* 66*/ "Joanna, quel plaisir de vous voir.\n", + /* 67*/ "Suivez-moi, Joanna.\nJe vous emm鈩e aux salles d'entranement.\n", + /* 68*/ "Le centre d'information est derri鑽e cette porte.\n", + /* 69*/ "Ici se trouve le labo d'駲uipement.\n", + /* 70*/ "Par ici se trouve la salle d'entranement et de simulation.\n", + /* 71*/ "Par l se trouve le champ de tir.\n", + /* 72*/ "Ce couloir m鈩e au hangar.\n", + /* 73*/ "CAISSE ANTI-GRAV \nAppuyer sur B pr鑚 de la caisse pour la prendre...\n", + /* 74*/ "Appuyer sur B pour rel稍her une caisse en main.\n", + /* 75*/ "HOVERBIKE \nDeux fois sur B pr鑚 de l'Hoverbike pour l'utiliser...\n", + /* 76*/ "Deux fois sur B pour descendre de l'Hoverbike.\n", + /* 77*/ "OUVRIR PORTES \nAppuyer sur B pr鑚 d'une porte pour l'ouvrir.\n", + /* 78*/ "Le bouton B active aussi un objet proche.\n", + /* 79*/ "ASCENSEURS \nAppuyer sur B pr鑚 de la porte pour appeler l'ascenseur.\n", + /* 80*/ "Sortie impossible pendant un entranement.\n", + /* 81*/ "Code interrupteur 1 obtenu.\n", + /* 82*/ "Code interrupteur 2 obtenu.\n", + /* 83*/ "Code interrupteur 3 obtenu.\n", + /* 84*/ "Code interrupteur 4 obtenu.\n", + /* 85*/ "REGARDER HAUT\n- Appuyer sur C Bas pour regarder en haut.\n", + /* 86*/ "REGARDER BAS\n- Appuyer sur C Haut pour regarder en bas.\n", + /* 87*/ "Holoprogramme 2 termin avec succ鑚.\n", + /* 88*/ "Holoprogramme 4 termin avec succ鑚.\n", + /* 89*/ "Holoprogramme 5 termin avec succ鑚.\n", + /* 90*/ "Garde d駸arm avec succ鑚.\n", + /* 91*/ "Garde neutralis avec succ鑚.\n", + /* 92*/ "D駸armez cette cible mouvante si possible.\n", + /* 93*/ "Assomez la cible - mot-cl: furtivit.\n", + /* 94*/ "Et le dernier garde...\n", + /* 95*/ "S'ACCROUPIR\n- Maintenir R puis appuyer sur C Bas pour s'accroupir.\n", + /* 96*/ "RAMPER\n- Une fois accroupie, maintenir R et appuyer sur C bas.\n", + /* 97*/ "Holoprogramme 3 termin avec succ鑚.\n", + /* 98*/ "Activer tous les interrupteurs.\n", + /* 99*/ "Activer tous les interrupteurs muraux.\n- Faire vite ou ils s'騁eindront tous.\n", + /*100*/ "Examiner les terminaux pour les codes d'acc鑚.\n- Utiliser les codes sur les terminaux muraux.\n", + /*101*/ "Code 1 obtenu.\n", + /*102*/ "Code 2 obtenu.\n", + /*103*/ "Code 3 obtenu.\n", + /*104*/ "Code 4 obtenu.\n", + /*105*/ "Entranement 馗hou - regarder vers l'avant.\n", + /*106*/ "Holoprogramme 1 termin avec succ鑚.\n", + /*107*/ "Combat sans armes - assommer la cible.\n- Appuyer sur Z plusieurs fois pour se battre.\n", + /*108*/ "Essayer maintenant sur une cible mouvante...\n", + /*109*/ "Et maintenant contre une cible offensive.\n", + /*110*/ "Battre tous les ennemis sans subir de d馮穰s.\n", + /*111*/ "Entranement 馗hou - d馮穰s subis.\n", + /*112*/ "Holoprogramme 6 termin avec succ鑚.\n", + /*113*/ "Holoprogramme 7 termin avec succ鑚.\n", + /*114*/ "TERMINAUX\n- Appuyer sur B pr鑚 d'un terminal pour l'utiliser.\n", + /*115*/ "Activer maintenant les terminaux muraux rouges.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "OK, Joanna, je vous laisse vous pr駱arer.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humain (Femelle)\n", + /*127*/ "23 ans 2 mois\n", + /*128*/ "|Fichier IC #027 -\n\nStatut entranement: Complet\nNote entranement: A++\nStatut actuel: Assign馥\n\n|Profil -\n\nBien entran馥 mais sans exp駻ience. Formidables r饌ctions. A l'aise avec un bon nombre d'armes. Adaptation remarquable. Meilleur score l'entranement. A l'origine d'un nouveau syst鑪e de notation. Etant la repr駸entation de l'agent id饌l de l'Institut Carrington, on lui donna le surnom de 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Humain (M稷e)\n", + /*131*/ "28 ans 5 mois\n", + /*132*/ "|Fichier IC #009 -\n\nStatut entranement: Complet\nNote entranement: A+\nStatut actuel: Infiltr饅n\n|Profil -\n\nNotre agent infiltr la plus grande exp駻ience. Tr鑚 habile avec son arme de choix (Magnum). Plus qualifi pour des missions d'infiltration plutt que pour le combat ouvert. Avant Joanna Dark, il d騁enait le meilleur score d'entranement.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humain (M稷e)\n", + /*135*/ "62 ans 8 mois\n", + /*136*/ "|Fichier IC #000 -\n\nStatut entranement: Non disp.\nNote entranement: Non disp.\nStatut actuel: Non disp.\n\n|Profil -\n\nPatriarche scientifique/entrepreneur de g駭ie, fondateur de l'Institut Carrington. Il planifie toutes les missions conduites par ses agents et dirige les op駻ations depuis son bureau par lien direct. Il a un got vestimentaire 騁range.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humain (Femelle)\n", + /*139*/ "39 ans ? mois\n", + /*140*/ "|Notes de l'analyste -\n\nDirectrice de la dataDyne Corp. Fanatique du pouvoir. D騁este recevoir des ordres et perdre l'initiative. Est pr黎e des actes cruels pour 駘iminer toute concurrence. Haine cons駲uente envers Daniel Carrington.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humain (M稷e)\n", + /*143*/ "46 ans ? mois\n", + /*144*/ "|Notes de l'analyste -\n\nDirecteur de la National Security Agency. Est li par une certaine amiti Cassandra De Vries ou partage des int駻黎s/affaires avec cette derni鑽e. Ob駟t Cassandra, dot馥 d'une personnalit plus dominante que la sienne d駛 colossale. Est la figure de proue d'op駻ations occultes conduites par la NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Le sapiens Caroll (IA)\n", + /*147*/ "6 mois\n", + /*148*/ "|Profil -\n\n Une intelligence artificielle cr鳬e par la dataDyne Corp. gratifi馥 d'un penchant pour la lexicographie et les codes cracker. Il est par chance dot d'une morale, et gr稍e son incroyable intelligence, il a pu pr馘ire les plans de la dataDyne. Sa voix et sa prononciation sont impeccables, renfor軋nt son aspect de docteur en lettres.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (M稷e)\n", + /*151*/ "320 ans\n", + /*152*/ "|Profil -\n\nUn extraterrestre de la race Maian. Il est un 'Protecteur' (garde du corps) de l'ambassadeur Maian en d駱lacement sur la Terre la demande de Daniel Carrington. Les Protecteurs sont tous d'excellents matres d'armes. Elvis adore la Terre, qu'il trouve fascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humain (M稷e)\n", + /*155*/ "20-30 ans\n", + /*156*/ "|Profil -\n\nUn homme blond platine. Tr鑚 grand, il porte des v黎ements blancs et d'habitude un imperm饌ble. Il semble contrler la conspiration impliquant Cassandra et Trent. Telles sont les seules informations recueillies sur ce personnage.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (travesti)\n", + /*159*/ "inconnu\n", + /*160*/ "|Profil mis jour -\n\nUn guerrier skedar se dissimulant derri鑽e la projection holographique d'un homme blond d'une vingtaine d'ann馥s. Un modulateur vocal donne au Skedar une voix pr馗ise, convaincante et intelligente. Cet appareil de propagande Skedar est assez subtile pour fonctionner merveille.\n", + /*161*/ "Le Pr駸ident des Etats-Unis\n", + /*162*/ "Humain (M稷e)\n", + /*163*/ "50 ans\n", + /*164*/ "|Profil -\n\nUn Afro-Am駻icain de bonne 馘ucation, tr鑚 intelligent et perspicace. Il tente constamment de faire le bien mais il est malheureusement conseill par des gens comme Trent Easton. Il pense matriser Trent depuis qu'il lui a refus le Pelagic II pour la dataDyne Corp. Il ne b駭馭icie pas d'une grande popularit: on suppose, peut-黎re tort, que la majorit politique a tout contrle sur lui.\n", + /*165*/ "Maians\n", + /*166*/ "Les Maians sont les extraterrestres connus sur Terre sous le nom de 'Petits Gris'. Ils observent la Terre depuis longtemps (plusieurs si鐵les) et ayant d騁ect chez les humains un certain potentiel, ils appr馗ient notre monde et en sont les g駭駻eux m馗鈩es. Leur contact sur Terre est Daniel Carrington. Un contact politique officiel reste encore 騁ablir.\n", + /*167*/ "Guerrier skedar\n", + /*168*/ "Les Skedars sont des guerriers extraterrestres qui ont combattu les Maians pendant des si鐵les jusqu'au r馗ent cessez-le-feu. Ils utilisent de colossales armures m馗aniques pour se d駱lacer et combattre: ils sont en fait de petite taille et ressemblent des reptiles. Etant tr鑚 agressifs, la guerre est leur religion et ils y sont tous d騅ou駸.\n", + /*169*/ "Briefing\n", + /*170*/ "Il y a des millions d'ann馥s, un croiseur d'une puissance colossale fut sabord dans l'Oc饌n Pacifique par une race extraterrestre, les Cetans. Il 騁ait 駲uip d'une arme jamais utilis馥: un d馗oupleur nucl饌ire, pouvant en th駮rie briser les liens entre les mol馗ules. Pour que les t駑oins croient la destruction du vaisseau, une balise fut envoy馥 vers la plan鑼e m鑽e, et ils d騁ruisirent les sondes couvrant le syst鑪e solaire dans lequel ils d馗id鑽ent de se cacher.\n\nLes Maians d馗ouvrirent des signes de vie sur Terre. Bien que disposant d'un certain potentiel, les humains primitifs ne furent pas contact駸: les Maians d馗id鑽ent d'attendre qu'ils se d騅eloppent.\n\nLes Maians rencontr鑽ent les Skedars et s'enlis鑽ent dans un conflit sans fin. Apr鑚 des centaines d'ann馥s de guerre, ils arriv鑽ent finalement une paix fragile. Les fanatiques skedars 駱rouvent constamment la r駸istance de cette paix en se livrant des activit駸 terroristes, mais les Maians refusent de se laisser entraner.\n\nLes Maians se m馭ient des humains, conscients que de trop nombreuses crises sont survenues sur Terre cause de conflits technologiques et de malentendus. Ils craignent que l'annonce de leur pr駸ence n'entrane d'autres conflits sur la plan鑼e. Ils ont donc d馗id d'observer la race humaine jusqu' ce qu'elle devienne plus mature.\n\nDaniel Carrington anticipa le cours des 騅鈩ements en contactant un vaisseau maian en orbite autour de la Terre. Il avait un plan qui aiderait humains et Maians, en acc駘駻ant la prise de contact entre les deux peuples. Les Maians, qui trouv鑽ent le plan judicieux et Carrington honn黎e, aid鑽ent ce dernier diffuser leur technologie sur Terre.\n\nLes Skedars fanatiques trouv鑽ent la sonde messag鑽e provenant du croiseur Cetan. Ils envoy鑽ent imm馘iatement des 馗laireurs sur Terre pour enqu黎er de fa輟n brutale, kidnappant les gens et mutilant les animaux dans leur tentative de r馗up駻ation du croiseur. Leur enqu黎e les m鈩e dans l'Oc饌n Pacifique, o ils localisent le vaisseau. Cependant, ils ont besoin d'aide pour y acc馘er.\n\nIls m鈩ent leur propre 騁ude de la Terre et 騁ablissent une liste des soci騁駸 qui poss鐡ent les ressources n馗essaires pour les aider retrouver le vaisseau sabord. En t黎e de cette liste figure la dataDyne Corporation. Ils prennent contact avec le P-DG de la corporation, Cassandra De Vries et lui font une proposition qui semble trop belle pour 黎re honn黎e - ce qui est vrai. En 馗hange d'une aide pour sortir 'leur' vaisseau de l'oc饌n, ils donneront la dataDyne assez de technologie pour en faire la plus importante corporation sur Terre. Tout ce que la dataDyne doit faire est de construire une intelligence artificielle avec des capacit駸 linguistiques et de d馗odage. La dataDyne se met donc au travail.\n\nCassandra De Vries contacte Trent Easton, le dirigeant de la NSA, et lui expose les d騁ails. Il tente d'obtenir l'approbation du Pr駸ident pour le pr黎 d'un b穰iment de recherche oc饌nique la dataDyne mais 馗houe. Il n'existe aucun moyen pour les Skedars ou la dataDyne de voler le bateau sans provoquer la col鑽e du gouvernement am駻icain. Ils con輟ivent donc un nouveau plan : remplacer le Pr駸ident par un clone sous leur contrle. Cela promet Easton et De Vries une r馗ompense suppl駑entaire une fois l'op駻ation skedar termin馥.\n\nCependant, ils ne disposent pas de beaucoup de temps pour se r駛ouir puisque les Skedars ont l'intention de tester le d馗oupleur nucl饌ire sur la Terre avant d'annihiler les Maians. Mais Cassandra, aveugl馥 par la possibilit de gagner autant de pouvoir, ne pense m麥e pas l'騅entualit de se faire doubler. Il en va de m麥e pour Trent.\n\nMais la dataDyne cr馥 la seule chose qui puisse pr騅oir l'apparition de tels dangers en analysant le flot d'informations dont elle dispose. Cette cr饌tion, c'est l'IA mise au point pour craquer les codes du croiseur cetan. Lorsque l'IA exprime ses inqui騁udes quant cette mission, De Vries ordonne que l'on modifie sa personnalit. En d'autres termes, la cr饌tion pense trop. D駸esp駻馥, l'IA - sous le pseudonyme du Dr. Caroll - contacte l'Institut Carrington pour demander de l'aide.\n", + /*171*/ "L'histoire\n", + /*172*/ "Joanna Dark, agent novice, se voit confier une mission d'extraction. Elle doit aider un savant s'馗happer d'un complexe scientifique de haute s馗urit, situ sous l'immeuble de la dataDyne. Elle est surprise de d馗ouvrir que le Dr. Caroll est en fait une IA cr鳬e par la dataDyne mais poursuit n饌nmoins sa mission de sauvetage. L'alarme donn馥, Joanna doit se frayer un chemin jusqu' l'h駘iport au sommet de la tour, afin de s'enfuir par la voie des airs.\n\nEn r駱onse cette agression, la dataDyne capture Daniel Carrington deux jours plus tard et le retient en otage dans sa propre villa. La corporation r馗lame en 馗hange le retour de leur IA, leur 'propri騁'. Mais ce qu'ils ne savent pas, c'est que l'IA se trouve dans la villa, o Carrington discutait avec elle des plans de la dataDyne. Joanna d駘ivre Daniel, mais ne peut emp鹹her la dataDyne de r馗up駻er le Dr. Caroll. L'IA en a cependant assez dit Carrington pour que celui-ci convoque sur Terre un groupe de sp馗ialistes maians.\n\nJoanna est envoy馥 Chicago pour espionner les conspirateurs dans l'immeuble du G5, une fa軋de de la dataDyne Corp. Elle apprend l'implication de Trent Easton, directeur de la NSA et celle de l'騁range homme d'origine nordique qui semble tout contrler. Une fois le plan concernant le Pr駸ident r騅駘 par Trent, Joanna rapporte la situation, mais d馗ouvre qu'il y a quelque chose de plus urgent accomplir en premier lieu.\n\nLes sp馗ialistes ont 騁 intercept駸 par les conspirateurs. Les survivants du crash et l'駱ave ont 騁 transport駸 dans le Secteur 51, dans le Nevada. Joanna est largu馥 dans le secteur afin de contacter un autre agent de l'Institut Carrington, de secourir d'騅entuels survivants et de retrouver leur 駲uipement. Lorsqu'elle p駭鑼re dans le labo, Joanna d馗ouvre le secret de l'Institut : ses alli駸 sont des Maians, les extraterrestres connus sous le nom de Petits Gris. L'extraterrestre qu'elle sauve s'appelle Elvis. Il 騁ait garde du corps de l'ambassadeur qui 騁ait la t黎e de l'駲uipe de sp馗ialistes.\n\nApr鑚 avoir aid les survivants de la d駘馮ation Maian, Joanna peut s'occuper des plans de la dataDyne concernant le Pr駸ident. Elle se fait passer pour un membre de l'entourage du Pr駸ident pour acc馘er la base a駻ienne o Air Force One est stationn. Elle r騏ssit ensuite se cacher bord de l'avion. Une fois en vol, Trent et les Skedars occult駸 se manifestent, mais Joanna est l pour les arr黎er. Elle escorte le Pr駸ident jusqu' la capsule de sauvetage, tandis que des hommes de Trent parcourent l'avion la recherche du Pr駸ident. Ils d駸irent entraner ce dernier bord de l'OVNI skedar, arrim AF1 par une passerelle amovible. Joanna endommage la passerelle, mais ne parvient pas la d騁ruire. Elle appelle Elvis la rescousse et celui-ci d馗ide de s'馗raser sur Air Force One. La capsule de sauvetage est 駛ect馥 et les trois appareils s'馗rasent dans le d駸ert glac de l'Alaska.\n\nJoanna reprend connaissance et essaie de faire son rapport, mais elle s'aper輟it que sa communication est brouill馥 par une transmission provenant de l'appareil skedar. Elle se met en route dans la neige pour retrouver le Pr駸ident et Elvis. Elle rencontre des escouades de Skedars occult駸 qui recherchent le Pr駸ident, Elvis, elle-m麥e et certaines possessions du Pr駸ident. Elle suit un groupe jusqu'au vaisseau skedar abattu, o elle d馗ouvre un clone du Pr駸ident. Elle le d騁ruit et coupe le brouilleur, puis appelle la cavalerie. Les plans skedars ont 騁 d駛ou駸 une fois de plus, le Pr駸ident est sauf et Trent est ex馗ut de fa輟n atroce par les Skedars pour son incomp騁ence.\n\nAu m駱ris de toute prudence, la dataDyne et les Skedars s'emparent du Pelagic II - le b穰iment d'騁udes oc饌niques du gouvernement - et se dirigent vers le lieu o se trouve le vaisseau cetan. Joanna et Elvis s'introduisent bord du bateau pour y semer le d駸ordre et d馗ouvrir quel est le grand projet. Apr鑚 avoir sabot les op駻ations de plong馥 et rappel le sous-marin, ils plongent vers les profondeurs de l'oc饌n, o ils aper輟ivent le croiseur cetan pour la premi鑽e fois. Ils p駭鑼rent dans le vaisseau via le passage ouvert par les Skedars et tombent sur un guerrier skedar mort... Apparemment, l'escouade d'assaut n'a pas eu la partie facile. Apr鑚 avoir combattu les Skedars et 騅it les Cetans, Joanna et Elvis atteignent le coeur du vaisseau. L, ils d馗ouvrent l'IA qui 騁ait le Dr. Caroll. Une fois sa personnalit restaur馥, le Dr. Caroll presse Joanna et Elvis de quitter le vaisseau, qu'il a l'intention de d騁ruire une bonne fois pour toutes.\n\nDe retour l'Institut Carrington, Joanna est sur le point de partir un cocktail pr駸identiel la Maison Blanche lorsque l'enfer se d馗hane. Les survivants de l'駲uipe d'assaut skedar lib鑽ent leur vengeance sur les responsables de leur 馗hec. Joanna parcourt l'Institut en essayant d'escorter un maximum d'employ駸 vers les hangars, tandis que les Skedars attaquent diff駻entes parties du b穰iment. Tandis que la majorit des employ駸 quittent les lieux, Joanna retient les Skedars avant de se faire assommer et capturer.\n\nElle se r騅eille dans une pi鐵e bord du croiseur skedar avec Cassandra comme compagnon de cellule. Cette derni鑽e se sacrifie pour permettre Joanna de s'馗happer. Elle parvient abaisser les boucliers des zones d'amarrage et Elvis arrive avec quelques amis pour une petite partie de tir aux pigeons.\n\nLe vaisseau captur se place en orbite autour de la plan鑼e o se trouve l'Autel de Bataille skedar. Elvis est abasourdi : les Maians n'ont jamais r騏ssi trouver cet endroit, le saint des saints des Skedars. Si l'Autel 騁ait d騁ruit, cela an饌ntirait le moral des Skedars et une v駻itable paix pourrait 黎re instaur馥 la place d'un cessez-le-feu instable. Joanna se charge du chef des Skedars, le Grand Pr黎re de l'Autel de Bataille tandis qu'Elvis retourne au croiseur pour contacter la flotte Maian.\n\nL'histoire se termine avec le temple en ruine... Elvis demande un r駱it dans le bombardement afin de pouvoir trouver Joanna. Elle est vivante, coinc馥 sous des gravats et retenue par un Skedar accroch sa jambe. Elvis lui tend une arme pour convaincre le Skedar de la laisser partir. Les deux h駻os quittent ensuite la plan鑼e.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ " La corporation tentaculaire qu'est devenue dataDyne a commenc dans la programmation d'IA Lorsqu'il devint 騅ident que la plupart de leurs revenus provenaient de leur travail pour l'arm馥 am駻icaine, une jeune directrice aux dents longues, Cassandra De Vries, se mit traiter avec des fabricants d'armes et ignorer les offres de collaboration de Daniel Carrington et de l'Institut, pour la programmation quantique et la recherche sur les IA. Apr鑚 le rachat par dataDyne de la troisi鑪e corporation d'armement, les b駭馭ices devinrent astronomiques. Dans le mois qui suivit la r馗eption d'un contrat gouvernemental d'armement, Cassandra De Vries fut nomm馥 PDG une part importante des b駭馭ices furent inject駸 dans la recherche sur les IA, avec d'excellents r駸ultats.\n", + /*175*/ "Institut Carrington\n", + /*176*/ "Bri钁ement consid駻 comme un inventeur cingl, Daniel Carrington fut le premier diffuser la technologie anti-gravit dans le monde. Les revenus g駭駻駸 par cette nouvelle technologie et ses d駻iv駸 l'ont aid cr馥r l'Institut Carrington, un r駸ervoir des connaissances technologiques situ dans une partie recul馥 des USA. Mais l'Institut est 馮alement une base d'entranement pour ses agents, qui sont envoy駸 travers le monde pour suivre les d騅eloppements technologiques, pour des raisons connues de Carrington uniquement.\n", + /*177*/ "Description\n- Une minuscule cam駻a contrlable distance, parfaite pour l'exploration furtive. Elle est 駲uip馥 pour l'holographie. Elle peut ouvrir les portes en projetant une zone de chaleur humaine.\n\nInstructions d'entranement\n- Prenez un hologramme du terminal informatique de la salle Info voisine.\n\nManipulation\n- Appuyez sur Z pour prendre un hologramme. Appuyez sur B pour ouvrir n'importe quelle porte. Maintenez R pour regarder autour de vous.\n", + /*178*/ "Description\n- Amplifie la lumi鑽e ambiante pour fournir une image de la zone. R騅鑞e 馮alement les formes de vie. L'utilisation avec une luminosit normale entrane des surtensions, qui 'blanchissent' l'affichage.\n\n Instructions d'entranement\n- D駱lacez-vous dans le noir, trouvez l'interrupteur et actionnez-le pour faire revenir la lumi鑽e.\n\n Manipulation\n- S駘ectionnez la Vue nocturne dans votre inventaire pour l'activer. S駘ectionnez-l nouveau pour la d駸activer.\n", + /*179*/ "Description\n\n- Appareil autonome de d馗odage. S'attache au panneau de contrle et passe en revue les diff駻entes combinaisons jusqu' l'ouverture.\n\n Instructions d'entranement\n- Trouvez le panneau ct de la porte et utilisez le d馗odeur pour la d騅errouiller.\n\nManipulation\n- Tenez-vous pr鑚 de la porte et appuyez sur le Bouton tout en tenant le d馗odeur.\n", + /*180*/ "Description\n\n- Utilis pour voir travers les murs et les objets solides. Peut voir des choses que la Vue nocturne et les lunettes IR ne peuvent d騁ecter.\n\n Instructions d'entranement\n- Le scanner allum, recherchez les deux interrupteurs cach駸 et activez-les pour 騁eindre la grille laser.\n\nManipulation\n- Choisir le scanner dans l'inventaire pour l'activer. Le choisir nouveau pour le d駸activer.\n", + /*181*/ "Description\n\n- Endormez les soup輟ns en utilisant un costume. Soyez vigilant cependant, certains ennemis peuvent vous d駑asquer.\n\n Instructions d'entranement\n- Grimshaw poss鐡e un occulteur qui attend d'黎re utilis. Dirigez-vous vers la porte suivante et procurez-vous-le.\n\nOp駻ation\n- S駘ectionnez le costume pour le porter.\n", + /*182*/ "Description\n\n- Convertit les informations thermiques en images. Peut 黎re utilis dans le noir. R騅鑞e 馮alement des anomalies telles que portes secr鑼es et les pans de mur peu solides.\n\n Instructions d'entranement\n- Allumez le scanner IR, trouvez la porte cach馥 et ouvrez-la.\n\nManipulation\n- S駘ectionnez le scanner IR dans votre inventaire pour l'activer. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*183*/ "Description\n- Localise un objet particulier dans une carte radar HUD. Indique la distance et l'駲uipement.\n\n Instructions d'entranement\n- Activez le Pisteur et suivez l'馗ho radar pour retrouver l'objet.\n\nOperation\n- S駘ectionnez le Pisteur dans votre inventaire. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*184*/ "Description\n- Cr馥 une disruption du spectre lumineux autour du porteur, ce qui entrane un effet cam駘駮n presque parfait. L'effet est annul lorsque le porteur fait feu.\n\n Instructions d'entranement\n- Activez l'occulteur et dirigez-vous vers le bureau de Carrington pour le surprendre!\n\nManipulation\n- S駘ectionnez l'occulteur dans l'inventaire. S駘ectionnez-le nouveau pour le d駸activer.\n", + /*185*/ "Description\n- Emet un signal alternatif pour brouiller les communications 駘ectroniques. Doit 黎re plac sur l'appareil pour 黎re efficace.\n\n Instructions d'entranement\n- Jetez la mine CME sur le voyant lumineux au-del de la porte secr鑼e.\n\n Manipulation\n- Appuyez sur le Bouton Z pour jeter la mine. Maintenez le Bouton R enfonc et ajustez votre vis馥 avec le Stick analogique avant de jeter la mine.\n", + /*186*/ "Description\n- Relie l'agent sur le terrain et les informaticiens de l'Institut. Ils peuvent ensuite pirater des donn馥s ou ouvrir les serrures 駘ectroniques distance.\n\n Instructions d'entranement\n- Utilisez le R馗epteur pour pirater le terminal dans le coin, pour d騅errouiller une porte secr鑼e.\n\nManipulation\n- Tenez-vous ct du terminal et appuyez sur le Bouton B lorsque vous avez le R馗epteur en main.\n", + /*187*/ "TIRER\n Appuyez sur le Bouton Z pour faire feu.\n", + /*188*/ "AUTO RECHARGE\n Rel稍hez le Bouton Z quand vous 黎es court de munitions.\n", + /*189*/ "RECHARGE MANUELLE\n Appuyez sur le Bouton B pour recharger avant la fin du chargeur.\n", + /*190*/ "Viser: Maintenez le Bouton R enfonc pour le mode vis馥.\n", + /*191*/ "Utilisez le Stick analogique pour d駱lacer le curseur de vis馥.\n", + /*192*/ "AUTO FIRE\n Maintenez le Bouton Z enfonc pour tirer en mode automatique.\n", + /*193*/ "CHANGER VUE\n Appuyez sur le Bouton C haut ou bas pour regarder en haut ou en bas.\n", + /*194*/ "ZOOM\n Maintenez le Bouton R enfonc pour le mode zoom.\n", + /*195*/ "TIR RAPIDE\n Appuyez rapidement sur le Bouton Z pour tirer plus vite.\n", + /*196*/ "Institut Carrington\0|Base d'op駻ations\n", + /*197*/ "Tour Lucerne\0|QG supr麥e\n", + /*198*/ "Sous-sol laboratoire\0|Labos de recherche souterrains\n", + /*199*/ "Villa Carrington \0|R駸idence cti鑽e priv馥\n", + /*200*/ "Chicago\0|Coins louches de la ville\n", + /*201*/ "Immeuble G5\0|Fa軋de commerciale de la dataDyne\n", + /*202*/ "Secteur 51\0|Pr鑚 du lac Groom Dry, Nevada\n", + /*203*/ "Base a駻ienne en Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'avion pr駸identiel\n", + /*205*/ "Lieu du crash\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|B穰iment de recherche sous-marine\n", + /*207*/ "Vaisseau Cetan \0|Un autre univers sur Terre\n", + /*208*/ "Croiseur Skedar \0|Vaisseau de transport de troupes\n", + /*209*/ "Monde natal Skedar\0|La plan鑼e de l'Autel de Bataille\n", + /*210*/ "Largueur\0|Transport de troupes\n", + /*211*/ "Caisse antigrav\0|Appareil d'antigravit饅n", + /*212*/ "Hoverbike\0|V馼icule de basse altitude\n", + /*213*/ "Robot de nettoyage\0|Votre copain pour la vie\n", + /*214*/ "Hovercopter\0|H駘ico antigrav de combat urbain\n", + /*215*/ "Robot G5\0|Drode de combat urbain\n", + /*216*/ "Intercepteur S51\0|Robot a駻ien d'interception\n", + /*217*/ "Vaisseau Maian\0|Vaisseau de reconnaissance et de patrouille\n", + /*218*/ "Navette Skedar\0|Vaisseau de largage de troupes\n", + /*219*/ "Le b穰iment de l'Institut comprend de nombreuses zones diff駻entes: bureaux et laboratoires, ateliers et hangars. Il est isol du monde ext駻ieur ce qui aide garder le secret des diff駻entes op駻ations.\n", + /*220*/ "Au beau milieu du quartier des affaires, l'aust鑽e b穰iment de la dataDyne Corporation, se d騁ache du reste du paysage.\n", + /*221*/ "Ces laboratoires, bien cach駸 et sous haute surveillance, sont la cl de l'avenir de la dataDyne. Dans ces labos, des techniciens travaillent avec acharnement pour propulser la dataDyne au sommet.\n", + /*222*/ "Propri騁 de l'Institut, cette r駸idence retir馥 est le refuge de Daniel Carrington pour 馗happer au stress de l'Institut. La r駸idence, 駲uip馥 d'un g駭駻ateur, sert d'observatoire et poss鐡e une cave vin bien remplie.\n", + /*223*/ "Un coin glauque et miteux de Chicago, ferm la circulation terrestre. C'est ici que la Corporation G5 poss鐡e son QG.\n", + /*224*/ "A l'int駻ieur de l'immeuble du G5, il existe une salle de r騏nion prot馮馥 par des dispositifs anti-mouchards. C'est le lieu le plus sr de dataDyne pour les discussions hautement confidentielles.\n", + /*225*/ "Cette section du complexe connu sous le nom de Secteur 51, se trouve sur les contreforts du lac Groom Dry. Les aires d'atterrissage pour h駘icos et les tours de communications donnent une id馥 de la taille du complexe souterrain.\n", + /*226*/ "L'une des nombreuses bases a駻iennes renforc馥s, servant de points de ravitaillement pour Air Force One. Ces bases sont isol馥s et se trouvent dans des r馮ions inhospitali鑽es, loin des yeux indiscrets.\n", + /*227*/ "Cet Air Force One est optimis pour les climats froids, plutt utile lorsqu'il est bas au nord de l'Alaska. Le vol est destination d'Oslo, Norv鑒e.\n", + /*228*/ "Dans le paysage rocheux et enneig du cercle polaire arctique repose l'駱ave de l'avion abattu.\n", + /*229*/ "Propri騁 du gouvernement des USA, le Pelagic II a 騁 con輹 pour les missions de plong馥 dans les profondeurs abyssales, et ce dans n'importe quelles conditions climatiques. C'est le seul b穰iment au monde pouvoir 騁udier les grands fonds oc饌niques.\n", + /*230*/ "Un gigantesque vaisseau extraterrestre qui repose au fond de l'oc饌n depuis des millions d'ann馥s.\n", + /*231*/ "Un vaisseau d'assaut interplan騁aire qui transporte les guerriers skedars vers les zones de conflit. Fait partie de la tr鑚 diminu馥 flotte skedar.\n", + /*232*/ "Une plan鑼e aride, secou馥 par des tremblements de terre, des temp黎es de sable et des tornades. Fait partie d'un syst鑪e solaire complexe trois soleils.\n", + /*233*/ "Un v馼icule de transport d'agents. Petit, rapide et tr鑚 maniable, il a 騁 con輹 pour une utilisation urbaine. Peut 黎re contrl par ordinateur ou pilot distance. Il peut transporter trois quatre agents, plus leur 駲uipment.\n", + /*234*/ "Un appareil antigrav con輹 pour aider les manutentionnaires qui se fixe une caisse. Lorsqu'il est activ, le champ antigrav soul钁e la caisse en r馘uisant son inertie.\n", + /*235*/ "Moto de patrouille basse altitude. Utilise une petite unit AG pour flotter, ainsi qu'une petite -mais puissante- turbine pouss馥 vectorielle pour la propulsion et la direction.\n", + /*236*/ "Il maintient une maison propre et en ordre. Il a souvent acc鑚 toutes les zones d'un b穰iment, il est donc sage de le laisser intact autant que possible. Il peut ainsi fournir l'acc鑚 malgr lui certaines zones importantes.\n", + /*237*/ "V馼icule de patrouille et d'駘imination. Equipage de deux hommes, arm d'un canon Vulcain l'avant, et d'un lance-missiles sur chaque aile. Peut 黎re descendu avec un feu nourri, ou mieux, avec une roquette bien plac馥.\n", + /*238*/ "Robot de combat urbain. Utilise une unit antigrav pour flotter. Lourdement prot馮 et arm. Utilis pour 駘oigner les visiteurs indiscrets, avec son programme 'tirer d'abord et ne pas poser de questions plus tard'.\n", + /*239*/ "Variante robotique de l'Hoverbike, avec une turbine et une unit AG beaucoup plus puissantes. Peut atteindre Mach 2 sans probl鑪e et peut avancer au pas pendant des heures. En d駱it de son armement, ce v馼icule compte plus sur sa maniabilit que sur ses boucliers.\n", + /*240*/ "Con輹 pour un seul pilote maian. Un passager se sentirait l'騁roit, et un passager humain encore plus.\n", + /*241*/ "Capable de transporter au combat dix guerriers skedars en armure et arm駸 jusqu'aux dents. Ind騁ectable par des radars conventionnels. Il peut 駑ettre de puissantes ondes de brouillage qui couvrent une zone importante : ces ondes brouillent les communications, ainsi que les 駲uipements de d騁ection.\n", + /*242*/ "Description\n- Un bon agent remarque chaque d騁ail autour de lui.\n\n Instructions d'entranement\n- Examinez tous les objets directement.\n\nManipulation\n- Regarder vers le haut- Appuyez sur le Bouton C bas\n- Regarder vers le bas- Appuyez sur le Bouton C haut\n- Observation- Maintenez enfonc le Bouton R pour passer en mode vis馥 et utilisez le Stick pour regarder dans une direction.\n", + /*243*/ "Description\n- Les pas de ct et les d駱lacements lat駻aux peuvent vous sortir de situations difficiles.\n\n Instructions d'entranement\n- Activez tous les interrupteurs devant vous. Soyez rapide, car chaque interrupteur reviendra dans sa position initiale au bout d'un certain temps.\n\nManipulation\n- Pas gauche- Bouton C gauche\n- Pas droite- Bouton C droit\n\n", + /*244*/ "Description\n- Se baisser et s'accroupir permet d'acc馘er de nouvelles zones.\n\n Instructions d'entranement\n- Frayez-vous un chemin en utilisant les mouvements qui vous sont disponibles. Activez les interrupteurs.\n\n Manipulation\n- Se baisser- Maintenez R et appuyez sur C bas.\n- S'accroupir- Une fois baiss, maintenez R et appuyez sur C bas.\n- Se relever- Appuyez bri钁ement sur R.\n\n", + /*245*/ "Description\n- Combattre plusieurs adversaires au corps--corps peut s'av駻er difficile.\n\n Instructions d'entranement\n- Assommez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Coup de poing - Appuyez rapidement sur le Bouton Z pour une rafale de coups de poing.\n\n", + /*246*/ "Description\n- D駸armer votre adversaire peut vous permettre d'obtenir de nouvelles armes.\n\n Instructions d'entranement\n- Assommez/d駸armez tous les ennemis sans vous faire toucher.\n\nManipulation\n- D駸armer - Maintenez le Bouton B enfonc, puis appuyez sur le Bouton Z.\n- Assommer- Assommez un ennemi inattentif par derri鑽e.\n", + /*247*/ "Description\n- Combattre plusieurs adversaires mains nues.\n\n Instructions d'entranement\n- Battez tous les ennemis d駸arm駸 sans vous faire toucher.\n\n", + /*248*/ "Description\n- Combattre plusieurs adversaires, arm駸 ou non.\n\n Instructions d'entranement\n- Battez tous les ennemis arm駸 sans vous faire toucher.\n\n", + /*249*/ "Pour plus de pr馗ision et de libert lorsque vous regardez autour de vous, utilisez le mode vis馥.\n", + /*250*/ "Pensez l'endroit o vous souhaitez aller avant de commencer le test. Placez-vous un endroit qui demandera le moins de mouvement possible entre les cibles.\n", + /*251*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous d駱lacez plus vite debout. Pour passer le test le plus vite possible, baissez-vous seulement lorsque c'est n馗essaire.\n", + /*252*/ "Attaquer vos ennemis dans le dos peut 黎re d駸honorant, mais c'est un moyen beaucoup plus sr de les 駘iminer. N'allez au corps--corps que lorsque c'est vraiment n馗essaire, et soyez pr黎 reculer lorsque l'ennemi riposte.\n", + /*253*/ "Restez au contact le temps d'attraper l'arme. Reculez hors de port馥 de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*254*/ "Ne restez pas immobile en attendant de vous faire toucher; bougez! Ne vous fixez pas sur un seul adversaire; essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu' ce que vous le puissiez.\n", + /*255*/ "Neutralisez les adversaires arm駸 une fois que vous matrisez le combat rapproch. Lorsque vous venez de d駸armer un ennemi, reculez et utilisez l'arme d駻ob馥 avant qu'il ne s'approche de vous.\n", + /*256*/ "Pour plus de pr馗ision et de libert lorsque vous regardez autour de vous, utilisez le mode Vis馥.\n", + /*257*/ "Les pas de ct et les d駱lacements lat駻aux peuvent vous sortir de situations difficiles.\n", + /*258*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous d駱lacez plus vite debout. Pour bouger le plus rapidement possible baissez-vous lorsque c'est r馥llement n馗essaire.\n", + /*259*/ "Attaquer vos ennemis dans le dos peut 黎re d駸honorant, mais c'est un moyen beaucoup plus sr de les 駘iminer. N'allez au corps--corps que lorsque c'est vraiment n馗essaire et soyez pr黎 reculer avant que l'ennemi ne riposte.\n", + /*260*/ "Restez rapproch juste le temps d'attraper l'arme. Reculez hors de port馥 de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*261*/ "Ne restez pas immobile en attendant de vous faire toucher: bougez! Ne vous fixez pas sur un seul adversaire, essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu' ce que vous le puissiez.\n", + /*262*/ "Allez chercher les adversaires arm駸 une fois que vous matrisez le combat rapproch. Lorsque vous venez de d駸armer un ennemi, reculez et utilisez l'arme que vous venez de voler avant qu'il ne s'approche de vous.\n", + /*263*/ "Veillez ce que l'objet cibl soit toujours dans votre champ de vision quand vous utilisez le R馗epteur, et restez suffisamment proche pour 騅iter que la connexion ne soit interrompue.\n", + /*264*/ "Assurez-vous que la mine se fixe bien o vous voulez en vous approchant le plus possible de la cible. Ajustez votre vis馥 en utilisant les Boutons C ou le Bouton R pour la vis馥.\n", + /*265*/ "La CamSpy peut 黎re difficile contrler, alors prenez votre temps.\n", + /*266*/ "Utile en combat, mais peut vous causer des ennuis en cas de surcharge.\n", + /*267*/ "Si vous avez des probl鑪es pour fixer le D馗odeur, rapprochez-vous de la cible en lui faisant face.\n", + /*268*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant la cible. Attention votre environnement et soyez pr黎 explorer.\n", + /*269*/ "Le viseur r馘uit votre vision p駻iph駻ique, ce qui peut 黎re un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*270*/ "Si vous utilisez cet appareil au mauvais moment, cela peut vous coter la vie, puisque cela vous emp鹹he de voir quoi que soit au del d'un certain point. A utiliser avec mod駻ation.\n", + /*271*/ "Un costume n'est pas seulement le v黎ement, c'est 馮alement la mani鑽e dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*272*/ "Economisez votre camouflage lorsqu'il n'y a personne pour vous voir.\n", + /*273*/ "Veillez ce que l'objet cible soit toujours dans votre champ de vision quand vous utilisez le R馗epteur, et restez suffisamment proche pour 騅iter que la connexion ne soit interrompue.\n", + /*274*/ "Assurez-vous que la mine se fixe bien o vous voulez en vous approchant le plus possible de la cible. Ajustez votre vis馥 en utilisant les Boutons C ou le Bouton R pour la vis馥.\n", + /*275*/ "La CamSpy n'est pas invisible - les ennemis peuvent la rep駻er : alors soyez prudent en entrant dans une zone d駸erte. Souvenez-vous que la CamSpy reste l o vous l'avez laiss馥 jusqu' ce que vous la ramassiez.\n", + /*276*/ " Utile en combat, mais peut vous causer des ennuis en cas de surcharge. Anticipez ces situations et r饌gissez avant l'ennemi.\n", + /*277*/ "Si vous avez des probl鑪es pour fixer le D馗odeur, rapprochez-vous de la cible en lui faisant face.\n", + /*278*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant la cible. Attention votre environnement et soyez pr黎 explorer.\n", + /*279*/ "Le viseur r馘uit votre vision p駻iph駻ique, ce qui peut 黎re un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*280*/ " Si vous utilisez cet appareil au mauvais moment, cela peut vous coter la vie, puisque cela vous emp鹹he de voir quoi que soit au del d'un certain point. A utiliser avec mod駻ation.\n", + /*281*/ " Un costume n'est pas seulement un v黎ement, c'est 馮alement la mani鑽e dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*282*/ " Economisez votre camouflage lorsqu'il n'y a personne pour vous voir. Evitez de tirer, sauf en cas d'absolue n馗essit et si vous 黎es sr du r駸ultat.\n", + /*283*/ "Le Falcon 2 est une arme de poing tr鑚 pr馗ise. Par cons駲uent, toute erreur dans ce test est de votre faute. Le mode secondaire est un coup de crosse et est donc inutile distance.\n", + /*284*/ "Pour rendre le Falcon 2 encore plus efficace, une lunette a 騁 ajout馥 l'arme. Tout comme pour le Falcon 2 de base, le mode coup de crosse est inutile distance.\n", + /*285*/ "La version du Falcon 2 avec silencieux est une excellente arme pour les op駻ations furtives, con輹e pour vous donner l'avantage de la surprise sur vos ennemis. Testez votre pr馗ision pour vous assurer de ne jamais g稍her votre chance.\n", + /*286*/ "Le Magsec 4 privil馮ie la puissance de feu au d騁riment de la pr馗ision, particuli鑽ement en mode rafale de trois. La seule contrainte importante est la taille du chargeur.\n", + /*287*/ "Voici une arme Skedar typique, brutale et puissante. En sacrifiant une partie des munitions, la puissance peut 黎re concentr馥 en un tir d騅astateur. La quantit importante de munitions est un avantage.\n", + /*288*/ "Ce pistolet tr鑚 versatile poss鐡e deux types de munitions: standard ou explosives. Les ing駭ieurs maians ont r騏ssi cette prouesse sans sacrifier la consommation d'駭ergie, bien que la cadence de tir soit r馘uite.\n", + /*289*/ "L'art du DY357 est de savoir quand recharger. Un chargeur de six balles influe donc sur l'issue d'un combat. Le poids de l'arme peut s'av駻er utile pour assommer quelqu'un.\n", + /*290*/ "Trent Easton est toujours la recherche du nec plus ultra et cette arme ne fait pas exception. Les balles sont aussi particuli鑽es que l'arme. Elles sont con輹es pour se fragmenter l'int駻ieur de la cible et l'駘iminer rapidement.\n", + /*291*/ "Un pistolet-mitrailleur fiable et efficace. On comprend pourquoi il reste la meilleure vente de la dataDyne depuis les deux derni鑽es ann馥s, et ceci gr稍e son mode secondaire. Le syst鑪e d'acquisition et de verrouillage de cible est en effet excellent: familiarisez-vous avec la manipulation compl鑼e de cette arme.\n", + /*292*/ "Le pistolet-mitrailleur Cyclone a 騁 con輹 pour ne PAS 黎re pr馗is, mais c'est une excellente distraction l'entranement. Sa cadence de tir est cependant extr麥ement 駘ev馥, faisant de cette arme un atout d騅astateur.\n", + /*293*/ "Cette mitraillette est issue de la flexibilit de conception maian. Son mode secondaire est int駻essant: un projectile haute v駘ocit qui peut p駭騁rer n'importe quoi. Pour 騅iter d'endommager le canon ou le m馗anisme de mise feu, la cadence de tir - tout comme pour le Phoenix - est r馘uite en mode secondaire.\n", + /*294*/ "Le RC-P120 tire un projectile min駻al sp馗ial qui, coupl une grande cadence de tir et un chargeur important, en fait une arme parfaite contre les Skedars. Les balles peuvent 黎re utilis馥s pour alimenter un prototype d'occulteur. L'entranement a 騁 modifi pour mettre en valeur cette caract駻istique particuli鑽e.\n", + /*295*/ "Non seulement cette arme peut 黎re pli馥 pour ressembler un PC portable, mais elle peut en plus 黎re transform馥 en arme sentinelle en mode secondaire. Cela vous sera utile pour couvrir une retraite ou prot馮er une zone.\n", + /*296*/ "C'est le mod鑞e que la dataDyne a r騏ssi vendre l'arm馥 am駻icaine, bien qu'elle ne soit pas encore largement r駱andue. Con輹e dans l'esprit de la dataDyne pour faire de mauvaises surprises, le mod鑞e de base est pourvu d'une mine de proximit sous le canon. Vous devez vous d饕arrasser de votre arme pour utiliser le mode secondaire.\n", + /*297*/ "Le mode secondaire de cette arme semble 黎re un 'd騁ecteur de danger' rep駻ant mines, appareils explosifs (tels que Dragon en mode secondaire) et armes sentinelles. Bien que puissante, cette arme dispose d'un chargeur trop petit.\n", + /*298*/ "Premier essai de l'Institut pour cr馥r une arme de soutien, l'AR34 est un fusil d'assaut de base. Le mode secondaire est un zoom permanent. Optez plutt pour le tir de pr馗ision.\n", + /*299*/ "La version lourde du Dragon. La mine a 騁 remplac馥 par un petit lance-grenades. Il a 騁 adopt par l'arm馥 am駻icaine comme arme de soutien d'escouade. Entranez-vous utiliser le lance-grenades.\n", + /*300*/ "La subtilit n'est pas de mise ici. Le premier mode est un tir simple et le second un tir double. Le chargeur est grand pour un fusil pompe, mais m馭iez-vous du long temps de rechargement et calculez vos mouvements en fonction de celui-ci.\n", + /*301*/ "Un fusil de sniper bien construit et pourvu d'un silencieux ainsi que d'un zoom fort grossissement. Seul le tireur peut influer sur la pr馗ision du fusil. Utilisez le mode secondaire pour vous accroupir et stabiliser votre vis馥.\n", + /*302*/ "Bien que la technologie employ馥 pour 駘aborer ce fusil soit au-del de notre compr馼ension, nous pouvons toujours appr馗ier les effets du FarSight. Le tir est presque impossible arr黎er et la lunette peut inspecter travers les murs sur une grande profondeur, verrouillant la cible si besoin est.\n", + /*303*/ "Le premier mode de l'arbal鑼e est un tir de projectile soporifique, le second un tir de poison mortel effet imm馘iat. C'est avant tout une arme pour les missions demandant une grande discr騁ion. Recharger cette arme prend du temps, attention donc son utilisation en combat.\n", + /*304*/ "Le pistolet tranquillisant est de conception banale. On le trouve dans de nombreux laboratoires et hpitaux travers le monde. Le second mode projette des doses mortelles consommant beaucoup plus de s馘atif.\n", + /*305*/ "Essayez de matriser cette arme du mieux que vous pouvez. Ce qui est certain, c'est qu'elle a 騁 con輹e pour un utilisateur beaucoup plus fort qu'un humain. Agenouillez-vous pour stabiliser votre vis馥. Si un ennemi r騏ssit passer travers le rideau de feu, utilisez les canons comme broyeur pour hacher votre adversaire.\n", + /*306*/ "Un nouveau produit dataDyne pourvu d'une technologie int駻essante. Le mode secondaire active un champ magn騁ique autour d'une grenade, lui permettant d'adh駻er une surface. Au bout d'un certain temps, le champ s'inverse et la grenade tombe de son point d'impact et explose.\n", + /*307*/ "Un lance-roquettes compact et r騏tilisable, qui se recharge apr鑚 chaque tir. Le mode secondaire utilise une variante limit馥 du syst鑪e de verrouillage de cible du CMP150, avec la possibilit de verrouiller une seule cible. Le missile se d駱lace plus lentement en traquant sa cible, un bon timing est donc essentiel.\n", + /*308*/ "Ce lance-roquettes skedar peut soit tirer des roquettes classiques soit des missiles guid駸 par l'utilisateur. Les Skedars 駱rouvent une satisfaction perverse lorsque la cam駻a situ馥 dans la t黎e du missile se rapproche de la cible. Le missile guid acc駘鑽e automatiquement mais peut 黎re ralenti pour plus de maniabilit. L'explosion se produit au contact ou lorsque la d騁ente est press馥.\n", + /*309*/ "Un couteau de combat bien tremp, 馮alement 駲uilibr pour le lancer. La pratique est essentielle pour s'habituer la port馥 et la trajectoire de la lame.\n", + /*310*/ "Le d駱artement des armes exp駻imentales a d騅elopp ce laser de poignet avec deux rayons diff駻ents. Le premier mode envoie une salve une distance consid駻able, tandis que le mode secondaire projette un rayon continu tant que le tir est maintenu.\n", + /*311*/ "La grenade anti-personnelle poss鐡e un d騁onateur r馮l sur 4 secondes. Pour votre plaisir est inclus un mode secondaire: une grenade de proximit effet de ricochet. La grenade rebondit partout et explose au bout d'un certain temps ou si une cible est d騁ect馥.\n", + /*312*/ "Cette grenade Maian s鑪e le chaos dans l'esprit des cr饌tures soumises son effet. Si vous vous trouvez dans l'aire d'effet votre vision deviendra floue et vous l稍herez ce que vous tenez. La grenade peut 黎re r馮l馥 pour exploser l'impact ou d馗lench馥 par d騁ecteur de proximit. Prenez garde la lancer assez loin.\n", + /*313*/ "L'utilisation des mines retardement n馗essite jugement et calcul. La cible peut d駱asser la zone d'effet et vous seriez en danger. Exercez-vous avant de commettre une erreur fatale en situation de combat. La seconde fonction est un d騁ecteur de danger identique celui du K7 Avenger.\n", + /*314*/ "Le secret de l'efficacit des mines de proximit est de savoir les placer l o votre adversaire les attend le moins. Si vous pensez vous trouver dans une zone truff馥 de mines, utilisez le d騁ecteur de danger pour les rep駻er. Cela vous fera peut-黎re perdre du temps, mais si ce n'est pas le cas, cela vous sauvera la vie.\n", + /*315*/ "La derni鑽e g駭駻ation de mines contrl馥s distance, identiques aux mod鑞es plus anciens. Le premier mode place une mine et le second la fait exploser. Si vous ne voyez pas la mine, utilisez les bonnes vieilles techniques du hasard et du timing. \n", + /*316*/ "Holo 1 - Inspecter\n", + /*317*/ "Holo 2 - Mouvement 1\n", + /*318*/ "Holo 3 - Mouvement 2\n", + /*319*/ "Holo 4 - Lutte 1\n", + /*320*/ "Holo 5 - Lutte 2\n", + /*321*/ "Holo 6 - Combat r馥l 1\n", + /*322*/ "Holo 7 - Combat r馥l 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_g.c b/src/files/lang/pal-final/dish_str_g.c new file mode 100644 index 000000000..cb9b761da --- /dev/null +++ b/src/files/lang/pal-final/dish_str_g.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Nehmen Sie das Nachtsicht-Ger舩 vom Tisch, um zu beginnen.\n", + /* 9*/ "Aktivieren Sie die Nachtsicht.\nFinden Sie den Lichtschalter.\nSchalten Sie das Licht wieder ein.\n", + /* 10*/ "Nehmen Sie das Data Uplink-Ger舩 vom Tisch, um zu beginnen.\n", + /* 11*/ "Stellen Sie sich neben das Terminal und setzen Sie den Uplink ein.\n", + /* 12*/ "Sie mssen das Ger舩 bereithalten.\n", + /* 13*/ "Verbindung wurde hergestellt...\n", + /* 14*/ "Das Terminal wurde erfolgreich infiltriert.\n", + /* 15*/ "Verbindung abgebrochen - Entfernung zum PC ist zu gro゚.\n", + /* 16*/ "Nehmen Sie die ECM-Mine vom Tisch, um zu beginnen.\n", + /* 17*/ "Finden Sie den Schaltblock und platzieren Sie die ECM-Mine.\n", + /* 18*/ "Die ECM-Mine wurde nicht korrekt platziert.\n", + /* 19*/ "Die ECM-Mine wurde korrekt platziert.\n", + /* 20*/ "Nehmen Sie den CamSpy vom Tisch, um zu beginnen.\n", + /* 21*/ "Finden Sie den PC im Info-Raum und holografieren Sie ihn.\n", + /* 22*/ "Der PC wurde erfolgreich holografiert.\n", + /* 23*/ "Das Licht wurde wieder eingeschaltet.\n", + /* 24*/ "Nehmen Sie den Tr-Decoder vom Tisch, um zu beginnen.\n", + /* 25*/ "Setzen Sie den Decoder an der Konsole ein, um die Tr zu entriegeln.\n", + /* 26*/ "Sie mssen den Tr-Decoder bereithalten.\n", + /* 27*/ "Decoder wurde angebracht. Crack-Routine wurde initiiert...\n", + /* 28*/ "Decodierung abgeschlossen - Tr wurde entriegelt.\n", + /* 29*/ "Nehmen Sie den Tracker vom Tisch, um zu beginnen.\n", + /* 30*/ "Orten Sie den IR-Scanner mit Hilfe des Trackers.\n", + /* 31*/ "Der IR-Scanner wurde geortet.\n", + /* 32*/ "Nehmen Sie den IR-Scanner vom Tisch, um zu beginnen.\n", + /* 33*/ "Orten Sie die geheime Tr mit Hilfe des IR-Scanners.\n", + /* 34*/ "Die geheime Tr wurde erfolgreich geortet.\n", + /* 35*/ "Nehmen Sie den Rntgen-Scanner vom Tisch, um zu beginnen.\n", + /* 36*/ "Finden Sie die versteckten Schalter, um das Laser-Netz abzuschalten.\n", + /* 37*/ "Das gesamte Laser-Netz wurde abgeschaltet.\n", + /* 38*/ "Nehmen Sie die Verkleidung vom Tisch, um zu beginnen.\n", + /* 39*/ "T舫schen Sie jemanden, um an die Tarnkappe zu gelangen.\n", + /* 40*/ "Die Tarnkappe wurde erlangt.\n", + /* 41*/ "Laser-Netz 1 wurde deaktiviert.\n", + /* 42*/ "Laser-Netz 2 wurde deaktiviert.\n", + /* 43*/ "Ich bin hier, um die Ausrstung abzuholen.\n", + /* 44*/ "Ach, Joanna. So t舫schen Sie niemanden!\n", + /* 45*/ "Da, nehmen Sie das. Lassen Sie es nicht fallen!\n", + /* 46*/ "Die Tarnkappe wurde erfolgreich gesichert.\n", + /* 47*/ "Es war vorgesehen, dass Sie eine Verkleidung tragen.\n", + /* 48*/ "Sie mssen sich ein wenig mehr anstrengen, Joanna.\n", + /* 49*/ "Joanna, wo sind Sie denn rausgekrochen?\n", + /* 50*/ "Sie wurden von einer Kamera erfasst.\n", + /* 51*/ "Nehmen Sie die Tarnkappe vom Tisch, um zu beginnen.\n", + /* 52*/ "Setzen Sie die Tarnkappe ein und orten Sie Carrington.\n", + /* 53*/ "Ich kann ruhigen Gewissens behaupten,\ndass Ihr Training abgeschlossen ist!\n", + /* 54*/ "Mission abgeschlossen - Ger舩e-Training bestanden!\n", + /* 55*/ "Mission fehlgeschlagen - Sie wurden entdeckt.\n", + /* 56*/ "W臧len Sie den Uplink aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 57*/ "W臧len Sie den CamSpy aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 58*/ "W臧len Sie das Nachtsicht-Ger舩 aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie das Ger舩 und lassen Sie den A-Knopf los.\n", + /* 59*/ "W臧len Sie den Tr-Decoder aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tr-Decoder und lassen Sie den A-Knopf los.\n", + /* 60*/ "W臧len Sie den Rntgen-Scanner aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Scanner und lassen Sie den A-Knopf los.\n", + /* 61*/ "W臧len Sie die Verkleidung aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Verkleidung und lassen Sie den A-Knopf los.\n", + /* 62*/ "W臧len Sie den IR-Scanner aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den IR-Scanner und lassen Sie den A-Knopf los.\n", + /* 63*/ "W臧len Sie den Tracker aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tracker und lassen Sie den A-Knopf los.\n", + /* 64*/ "W臧len Sie die Tarnkappe aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Tarnkappe und lassen Sie den A-Knopf los.\n", + /* 65*/ "W臧len Sie die ECM-Mine aus.\n- Halten Sie den A-Knopf gedrckt.\n- トndern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die ECM-Mine und lassen Sie den A-Knopf los.\n", + /* 66*/ "Joanna, schn, Sie zu sehen.\n", + /* 67*/ "Kommen Sie mit, Joanna.\nIch fhre Sie herum.\n", + /* 68*/ "Das Informations-Center befindet sich hinter dieser Tr.\n", + /* 69*/ "Hier haben wir das Entwicklungs-Labor.\n", + /* 70*/ "Hier geht es zum Simulations-Raum.\n", + /* 71*/ "Das ist der Schie゚stand, Jo.\n", + /* 72*/ "Dieser Korridor fhrt zum Hangar.\n", + /* 73*/ "HOVERCRATE \nStellen Sie sich neben die Hovercrate und drcken Sie den B-Knopf.\n", + /* 74*/ "Drcken Sie den B-Knopf erneut, um die Hovercrate loszulassen.\n", + /* 75*/ "HOVERBIKE \nDrcken Sie den B-Knopf zweimal, um das Bike zu fliegen.\n", + /* 76*/ "Drcken Sie den B-Knopf zweimal, um wieder abzusteigen.\n", + /* 77*/ "ヨFFEN VON TワREN \nDrcken Sie den B-Knopf, um eine Tr zu ffnen.\n", + /* 78*/ "Mit Hilfe des B-Knopfs knnen auch andere Objekte aktiviert werden.\n", + /* 79*/ "AUFZワGE \nDrcken Sie den B-Knopf, um den Aufzug zu rufen.\n", + /* 80*/ "W臧rend des Trainings knnen Sie nicht hinausgehen.\n", + /* 81*/ "Code 1 wurde erlangt.\n", + /* 82*/ "Code 2 wurde erlangt.\n", + /* 83*/ "Code 3 wurde erlangt.\n", + /* 84*/ "Code 4 wurde erlangt.\n", + /* 85*/ "BLICK NACH OBEN \n- Drcken Sie den C-Knopf unten, um nach oben zu schauen.\n", + /* 86*/ "BLICK NACH UNTEN \n- Drcken Sie den C-Knopf oben, um nach unten zu schauen.\n", + /* 87*/ "Holoprogramm 2 wurde erfolgreich abgeschlossen.\n", + /* 88*/ "Holoprogramm 4 wurde erfolgreich abgeschlossen.\n", + /* 89*/ "Holoprogramm 5 wurde erfolgreich abgeschlossen.\n", + /* 90*/ "Die Wache wurde erfolgreich entwaffnet.\n", + /* 91*/ "Die Wache wurde erfolgreich KO geschlagen.\n", + /* 92*/ "Entwaffnen Sie diese Person.\n", + /* 93*/ "Schlagen Sie diese Person KO. Tarnung ist der Schlssel.\n", + /* 94*/ "Und die letzte Wache...\n", + /* 95*/ "DUCKEN\n- Halten Sie die R-Taste gedrckt, und drcken Sie den C-Knopf unten.\n", + /* 96*/ "HOCKEN\n- Ducken Sie sich, und halten Sie den C-Knopf unten gedrckt.\n", + /* 97*/ "Holoprogramm 3 wurde erfolgreich abgeschlossen.\n", + /* 98*/ "Bet舩igen Sie alle Schalter.\n", + /* 99*/ "Bet舩igen Sie alle Schalter an der Wand.\n- Sie mssen schnell sein, da sie rasch zurckspringen.\n", + /*100*/ "Erlangen Sie die Codes, indem Sie die Terminals untersuchen.\n- Wenden Sie die Codes an den Wand-Terminals an.\n", + /*101*/ "Code 1 wurde erlangt.\n", + /*102*/ "Code 2 wurde erlangt.\n", + /*103*/ "Code 3 wurde erlangt.\n", + /*104*/ "Code 4 wurde erlangt.\n", + /*105*/ "Aufgabe nicht erfllt - Sie mssen nach vorne schauen.\n", + /*106*/ "Holoprogramm 1 wurde erfolgreich abgeschlossen.\n", + /*107*/ "Unbewaffneter Kampf - Schlagen Sie das Ziel KO.\n- Drcken Sie den Z-Trigger in rascher Abfolge.\n", + /*108*/ "Versuchen Sie sich jetzt gegen ein bewegliches Ziel.\n", + /*109*/ "Und abschlie゚end ein Ziel, das sich auch wehrt.\n", + /*110*/ "Besiegen Sie alle Gegner, ohne selbst getroffen zu werden.\n", + /*111*/ "Aufgabe nicht erfllt - Sie wurden getroffen.\n", + /*112*/ "Holoprogramm 6 wurde erfolgreich abgeschlossen.\n", + /*113*/ "Holoprogramm 7 wurde erfolgreich abgeschlossen.\n", + /*114*/ "TERMINALS\n- Drcken Sie den B-Knopf, um ein Terminal zu aktivieren.\n", + /*115*/ "Aktiveren Sie die roten Terminals an den W舅den.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, ich lasse Sie allein, damit Sie sich vorbereiten knnen.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Menschlich (weiblich)\n", + /*127*/ "23 Jahre 2 Monate\n", + /*128*/ "|CI File #027 -\n\nTrainings-Status: Komplettiert\nBewertung: A++\nAktiver Status: im Einsatz\n\n|Profil -\n\nBestens trainiert, aber unerfahren. Herausragende Reaktionen. Vertraut mit verschiedensten Waffen. Sehr kompetenter All-round-Agent. Durch die Erreichung der besten Trainingsergebnisse musste eine neue Bewertung erdacht werden. Die Verkrperung des idealen Agenten des Carrington Instituts, daher die Bezeichnung 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Menschlich (m舅nlich)\n", + /*131*/ "28 Jahre 5 Monate\n", + /*132*/ "|CI File #009 -\n\nTrainings-Status: Komplettiert\nBewertung: A+\nAktiver Status: Undercover\n\n|Profil -\n\nUnser erfahrenster Undercover-Agent. Hervorragend im Umgang mit der Waffe seiner Wahl (ein Magnum Revolver). Eignet sich perfekt fr Undercover- Missionen, weniger geeignet fr Kampfeins舩ze. Vor Joanna Dark hatte er die Ehre, das beste Trainingsergebnis erreicht zu haben.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Menschlich (m舅nlich)\n", + /*135*/ "62 Jahre 8 Monate\n", + /*136*/ "|CI File #000 -\n\nTrainings-Status: K/A\nBewertung: K/A\nAktiver Status: K/A\n\n|Profil -\n\nIntelligenter, patriarchischer Wissenschaftler/Unternehmer und Grnder des Carrington Instituts. Plant alle Missionen, in die seine Agenten entsandt werden, und betreut jede Operation selber von seinem Bro aus. Kleidet sich mitunter etwas eigenartig.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Menschlich (weiblich)\n", + /*139*/ "39 Jahre ? Monate\n", + /*140*/ "|Analytische Daten -\n\nDer Kopf von dataDyne. Schtig nach Macht; mchte niemandem untergeben sein. Sie hasst es, die Initiative zu verlieren. Ist in der Lage, 舫゚erst skrupellose Aktionen durchzufhren, um die Konkurrenz hinter sich zu lassen. Hat vor allem gegenber Daniel Carrington, den sie verabscheut, keine Skrupel.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Menschlich (m舅nlich)\n", + /*143*/ "46 Jahre ? Monate\n", + /*144*/ "|Analytische Daten -\n\nChef der Nationalen Sicherheit. Es besteht eine Verbindung zu Cassandra De Vries, obwohl es eher nach einer Interessensgemeinschaft aussieht. Er wird tun, was Cassandra ihm sagt, da selbst seine dominante Persnlichkeit durch die von De Vries in den Schatten gestellt wird. Die Graue Eminenz hinter einigen der subversiven Elemente innerhalb der NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Der Caroll-Sapient (AI)\n", + /*147*/ "6 Monate\n", + /*148*/ "|Profil -\n\n Eine von dataDyne entwickelte knstliche Intelligenz mit einer Vorliebe fr Fremdsprachen und Decodierung. Er war in der Lage, eigene Moral zu entwickeln, und konnte aufgrund seiner berragenden Intelligenz die Pl舅e von dataDyne erahnen. Seine Stimme ist 舫゚erst pr艘ise moduliert, und simuliert den Charakter eines Akademikers.\n", + /*149*/ "Elvis\n", + /*150*/ "Maianer (m舅nlich)\n", + /*151*/ "320 Jahre\n", + /*152*/ "|Profil -\n\nEin Alien aus der Rasse der Maianer. Er ist der 'Protektor' (Bodyguard) des Maianischen Botschafters, der auf die Bitte von Carrington zur Erde reist. Protektoren sind im Umgang mit verschiedenen Waffen trainiert. Elvis ist terraphil. Er findet die Erde und alles, was mit ihr in Zusammenhang steht, ausgesprochen faszinierend.\n", + /*153*/ "Mr. Blond\n", + /*154*/ "Menschlich (m舅nlich)\n", + /*155*/ "Endzwanziger\n", + /*156*/ "|Profil -\n\n Ein hellblonder, menschlicher Mann. Sehr gro゚, tr臠t wei゚e Kleidung, meistens einen Regenmantel. Scheint hinter der Verschwrung zu stecken, in die Cassandra und Trent verwickelt sind. Mehr ist nicht bekannt.\n", + /*157*/ "Mr. Blond\n", + /*158*/ "Skedar (verkleidet)\n", + /*159*/ "unbekannt\n", + /*160*/ "|Neuestes Profil -\n\nEs handelt sich um einen Skedar-Krieger, der durch eine holografische Projektion als hellblonder, junger Mann in den sp舩en Zwanzigern erscheint. Eine orale Modulationseinheit verleiht ihm eine pr艘ise, intelligente Stimme. Dieses Ger舩 ist brigens ein hervorragendes Manipulations-Werkzeug der Skedar.\n", + /*161*/ "Der US-Pr舖ident\n", + /*162*/ "Menschlich (m舅nlich)\n", + /*163*/ "50 Jahre\n", + /*164*/ "|Profil -\n\nEin gebildeter, scharfsinniger Afro-Amerikaner, der st舅dig versucht, die beste Entscheidung zu finden. Ist allerdings von Leuten wie Trent Easton umgeben, den er unter Kontrolle zu haben glaubt, nachdem er untersagt hat, die Pelagic II an dataDyne zu vergeben. Ihn als 'lenkbar' zu bezeichnen, wie es die Mehrheit der politischen Kommentatoren ist, w舐e allerdings nichts anderes als ein Akt der Unfairness.\n", + /*165*/ "Maianer\n", + /*166*/ "Die Maianer sind eine au゚erirdische Rasse, die auf der Erde unter dem Namen 'die Grauen' bekannt sind. Sie beobachten die Erde schon seit langer Zeit. Der Menschheit gegenber sind sie wohlgesonnen, und erkennen gro゚es Potential in der Erdbevlkerung. Ihre irdische Kontaktperson ist Daniel Carrington. Ein formeller politischer Kontakt muss aber erst eingeleitet werden.\n", + /*167*/ "Skedar-Krieger\n", + /*168*/ "Die Skedar sind eine kriegerische Rasse von Aliens, die schon seit Jahrhunderten gegen die Maianer k舂pfen. Erst krzlich haben sie einem Waffenstillstand zugestimmt. Da sie selbst sehr klein und schlangen臧nlich sind, benutzen sie zur Fortbewegung und im Kampf mechanische Armaturen. Sehr aggressiv! Sie haben Krieg zu einer Religion erhoben und sind extrem devot.\n", + /*169*/ "Hintergrund\n", + /*170*/ "Vor Millionen von Jahren wurde vom Volk der Cetaner ein gewaltiges au゚erirdisches Schlachtschiff auf dem Grunde des Pazifischen Ozeans versenkt. Auf dem Schiff befindet sich eine nicht erprobte Waffe, die theoretisch in der Lage ist, die nukleare Verbindung zwischen jeglichen Moleklen aufzuheben. Um etwaige Beobachter in dem Glauben zu lassen, das Schiff w舐e zerstrt worden, wurde ein Satellit in das Heimatsystem der Cetaner geschickt. Denn in Wirklichkeit handelt es sich bei dem Schiff um einen lebenden Organismus...\n\nEine andere Rasse, die Maianer, entdeckt im Jahr 2000 das Leben auf der Erde. Sie erkennen zwar ein gewisses Potential in der menschlichen Rasse, beschlie゚en aber, die fr sie primitiv wirkenden Menschen sich ohne ihre Einmischung entwickeln zu lassen.\nDie Maianer trafen im Jahr 1650 (Erdzeitrechnung) auf die Skedar. Es kommt zu einem Kampf, der sich zu einem langwierigen Krieg ausweitet. Nach Jahrhunderten des Kampfs entsteht ein unsicherer Frieden. Fanatische Skedar versuchen st舅dig, diesen Frieden durch terroristische Aktionen zu stren. Aber die Maianer lassen sich auf keine Kampfhandlungen ein.\n\nDie Maianer erkennen, dass aufgrund fortschreitender Technologien und gewissen '舫゚eren Einflssen' immer mehr Krisenherde auf der Erde entstehen. Sie befrchten, dass noch mehr Unruhe entstehen knnte, wenn sie ihre Existenz offenbaren wrden. Daher beschlie゚en sie, den Planeten weiter zu beobachten, bis die Menschen ein hheres Entwicklungsstadium erreicht haben.\n\n1985 greift Daniel Carrington dem Plan der Maianer vor, indem er eines ihrer Schiffe kontaktiert, das die Erde vom Orbit aus beobachtet. Er hat einen Plan, der beiden Parteien von Nutzen sein knnte. Das Resultat w舐e eine schnellere Ann臧erung zwischen Menschen und Maianern. Die Maianer haben Vertrauen in Carrington und erlauben ihm, ihre Technologien auf der Erde einzufhren.\n\n2006 entdecken die fanatischen Skedar den Satelliten der Cetaner. Daraufhin suchen sie die Erde nach dem Schlachtschiff ab. Dabei setzen sie ihre wenig subtilen Methoden ein, zu denen auch die Entfhrung von Menschen und die Verstmmelung von Tieren gehren. Ihre Untersuchungsergebnisse weisen auf einen Ort im Pazifischen Ozean hin, wo sie das Schiff auch finden. Allerdings sind sie nicht in der Lage, es ohne Hilfe zu bergen.\n\nNun beginnen die Skedar selbst damit, die Erde zu erforschen. Sie erstellen eine Liste mit Firmen, die ber die ntigen Ressourcen verfgen, um ihnen bei der Bergung behilflich zu sein. An der Spitze dieser Liste steht der Name dataDyne. Cassandra De Vries, der Vorstand der Firma, wird von den Skedar kontaktiert. Ihr wird ein Deal vorgeschlagen, der sich zu gut anhrt, um wahr zu sein - und genauso ist es auch. Als Dank fr die Bergungsarbeiten versprechen die Skedar, dass sie dataDyne mit gengend Technologien versorgen, um die Firma zum m臘htigsten Konzern des Planeten zu machen. Alles, was dataDyne tun muss, ist eine knstliche Intelligenz zu erschaffen. Sie sollte in der Lage sein, jeglichen Cetanischen Code knacken zu knnen. Keine leichte Aufgabe, aber durchaus im Bereich des Mglichen. Die Arbeiten beginnen.\n\nCassandra De Vries kontaktiert den Kopf der NSA, Trent Easton, und informiert ihn ber alle Details. Er soll versuchen, ein Tiefsee-Forschungsschiff der Regierung zu leihen. Aber der Pr舖ident verweigert seine Zusage. Es gibt keine Mglichkeit das Schiff zu stehlen, ohne dass die Aufmerksamkeit der US-Regierung auf dataDyne gelenkt wird. Daher wird ein Plan ausgeheckt, demzufolge der Pr舖ident durch einen Klon ersetzt werden soll. Auf diese Weise w舐e die Kontrolle in den H舅den von Easton und De Vries. Au゚erdem wrden dadurch noch einige Extra-Vergnstigungen fr die Verschwrer herausspringen, nachdem die Operation der Skedar erst durchgefhrt worden ist.\n\nAllerdings h舩ten die beiden nicht viel Zeit, sich mit ihrem Triumpf zu brsten, denn die Skedar beabsichtigen, die Cetanische Waffe an der Erde zu testen, bevor sie damit gegen die Maianer vorgehen. Cassandra ist durch ihre Machtgier zu sehr geblendet, als dass sie diese Taktik durchschauen knnte. Leider betrifft dieses Verhalten auch Trent Easton, der ebenso durch Visionen von Luxus und Macht hindurch die Tatsachen nicht mehr erkennen kann.\n\nAber dataDyne hat etwas produziert, das durchaus in der Lage ist, diese Gefahr zu erkennen: Der Sapient, die knstliche Intelligenz, die dafr vorgesehen war, die Zutrittscodes des Cetanischen Schiffs zu knacken. Als die Maschine wagt, ihre Bedenken zu 舫゚ern, veranlasst Cassandra De Vries, dass dem Sapienten seine Persnlichkeit entzogen werden soll. In einem Akt der Verzweiflung tritt die Maschine mit dem Carrington Institut in Kontakt. Unter dem Namen Dr. Caroll dringt ein Hilferuf an Daniel Carringtons Ohr...\n", + /*171*/ "Die Geschichte\n", + /*172*/ "Joanna Dark, eine frischgebackene Agentin, wird damit beauftragt, einen Wissenschaftler aus der Forschungsabteilung tief unter dem dataDyne-Geb舫de zu befreien. Ihr Erstaunen ist gro゚, als sie erkennt, dass es sich bei Dr. Caroll um eine KI handelt. Nichtsdestotrotz setzt sie ihre Mission fort, und bringt ihn/es in Sicherheit. W臧rend der Mission wird der Alarm ausgelst, und Joanna muss sich bis ins oberste Stockwerk vork舂pfen, um dort von einem Fluchtschiff abgeholt zu werden.\n\ndataDyne erkennt in Daniel Carrington den Drahtzieher dieser Aktion. Zwei Tage sp舩er wird er in seiner eigenen Villa als Geisel genommen. Verlangt wird die Aush舅digung der KI im Austausch fr Daniel Carringtons Leben. Was dataDyne nicht wei゚, ist die Tatsache, dass sich die KI bereits in der Villa befindet. Carrington wollte im Gespr臘h mit Dr. Caroll mehr ber die von dataDyne geplanten Aktivit舩en erfahren. Joanna rettet Daniel, kann aber nicht verhindern, dass Dr. Caroll in die H舅de des Konzerns f舁lt. Allerdings konnte Carrington genug Information in Erfahrung bringen, um ein Team Maianischer Spezialisten auf die Erde zu bestellen.\n\nJoanna wird nach Chicago geschickt, um bei einem Meeting der Verschwrer im G5-Building zu spionieren. Sie erf臧rt, dass Trent Easton, der Chef der NSA, ebenso in diese Konspiration verwickelt ist, wie ein seltsamer skandinavischer Mann, der offensichtlich der Kopf des ganzen Plots ist. Nachdem von Trent errtert worden ist, wie er gegen den Pr舖identen vorgehen mchte, sendet Jo einen Hilferuf an das Institut. Allerdings erf臧rt sie, dass noch eine dringendere Aufgabe auf sie wartet.\n\nDas Spezialisten-Team wurde von den Verschwrern abgefangen. Die ワberlebenden des Absturzes sowie die Trmmer der Maschine wurden in die Area 51 nach Nevada gebracht. Joanna wird dort abgesetzt, um mit einem anderen Agenten des Instituts Kontakt aufzunehmen. Zusammen sollen sie alle ワberlebenden und deren Ausrstung in Sicherheit bringen. Nachdem es Joanna gelingt, ins medizinische Labor einzudringen, lftet sie das gr゚te Geheimnis des Carrington Instituts: Bei den Verbndeten handelt es sich um Maianer. Aliens, die als Eie Grauen' bekannt sind. Der Au゚erirdische, den sie retten kann, wird Elvis genannt. Er war ein Bodyguard des Maianischen Botschafters, der das Spezialistenteam anfhren sollte.\n\nNachdem es Joanna gelungen ist, den einzigen ワberlebenden der Maianischen Delegation zu retten, wendet sie sich wieder dem Pr舖identen und seiner Bedrohung durch dataDyne zu. Sie gibt sich als Crew-Mitglied aus, um in die Basis zu gelangen, wo die Air Force One stationiert ist. Es gelingt ihr auch, an Bord zu gelangen. W臧rend des Flugs treten Trent und der getarnte Skedar in Aktion. Aber wiederum gelingt es Joanna, beide aufzuhalten. W臧rend Trents Leute das Flugzeug nach dem Pr舖identen absuchen, wird dieser von Joanna zu einer Fluchtkapsel gebracht. Trents Plan w舐e gewesen, den glcklosen Politiker an Bord eines Skedar-UFO zu bringen, das an der Air Force One angedockt hat. Jo gelingt es zwar, die Halterung zu besch臈igen, sie schafft es aber nicht, sie zu zerstren. Die Agentin verst舅digt Elvis, der einen Kamikaze-Angriff auf das UFO durchfhrt. Alle drei Vehikel strzen ber Alaska ab. Die Fluchtkapsel kann die AF1 aber noch verlassen.\n\nAls Jo erwacht und versucht, das Insitut zu erreichen, muss sie feststellen, dass ihre ワbertragung durch ein Strsignal der Skedar unterbrochen wird. Sie macht sich auf, um Elvis und den Pr舖identen zu finden. Dabei trifft sie auf getarnte Skedar-Trupps, die nach ihr suchen. Sie folgt einem dieser Trupps bis zu einem Skedar-Schiff, wo sie einen Klon des Pr舖identen findet. Joanna Dark zerstrt den Klon, deaktiviert das Strsignal und ruft die Kavallerie. Einmal mehr wurden die dunklen Machenschaften der Skedar vereitelt, der Pr舖ident wurde gerettet, und Trent wird von den Skedar fr seine Inkompetenz grausam bestraft.\n\ndataDyne und die Skedar geben nun nichts mehr auf verdeckte Operationen. Sie stehlen das Tiefsee-Forschungsschiff 'Pelagic II' und machen sich auf den Weg zur Absturzstelle des Cetanischen Raumschiffs. Joanna und Elvis unterbrechen die Aktion und finden heraus, worum es ihren Gegnern eigentlich geht. Anschlie゚end gelangen sie mit einem Tauchboot zum Grund des Meeres und sehen zum ersten Mal das au゚erirdische Schlachtschiff. Das Team betritt das Schiff durch den Eingang, der von den Skedar erschaffen wurde und treffen auf einen leblosen Skedar. Offenbar scheint au゚er ihnen noch jemand an Bord zu sein. Nach zahllosen K舂pfen gegen Skedar und Cetaner, erreichen Joanna und Elvis das Herz des Schiffs. Dort angekommen finden sie die KI, die einst Dr. Caroll war. Nachdem seine Persnlichkeit wieder hergestellt wurde, dr舅gt er Joanna und Elvis, das Schiff zu verlassen, da er es endgltig zerstren mchte.\n\nZurck im Carrington Institut bereitet sich Joanna fr einen Empfang im Wei゚en Haus vor, als sich die Ereignisse pltzlich berstrzen. Die berlebenden Skedar richten ihren Zorn nun gegen jene Personen, die sie fr das Scheitern ihrer Mission verantwortlich machen. Joanna durchk舂mt das Institut, um so viele Angestellte wie mglich zu retten. W臧renddessen attackieren die Skedar alle Teile des Geb舫des. Der Mehrheit der anwesenden Personen gelingt die Flucht. Joanna jedoch wird bewusstlos geschlagen, bevor sie sich in Sicherheit bringen kann.\n\nAls sie das Bewusstsein wiedererlangt, befindet sich Joanna in einer Zelle an Bord eines Skedar-Schlachtschiffs. Auch Cassandra De Vries hat das Schicksal ereilt. Allerdings stirbt der Kopf von dataDyne bei dem Versuch, ein Ablenkungsmanver zu starten, um Joanna die Flucht zu ermglichen. Jo gelingt es, die Schutzschilde zu deaktivieren. Elvis erscheint mit einigen Freunden, und eine fulminante 'Party' beginnt.\n\nDas gekaperte Schiff gelangt in den Orbit ber dem Kriegsschrein der Skedar. Elvis kann seinen Augen nicht trauen, da es den Maianern niemals gelungen ist, diesen heiligen Ort der Skedar zu finden. Wird der Schrein zerstrt, w舐e dies auch ein harter Schlag gegen die Moral der Skedar. Auf diese Weise knnte ein anhaltender Frieden, anstatt eines unsicheren Waffenstillstands erzielt werden. Jo macht sich auf die Suche nach dem Anfhrer der Skedar, w臧rend Elvis die Maianische Flotte zu Hilfe ruft.\n\nLetztendlich liegt der Schrein in Trmmern. Elvis bittet um eine Unterbrechung des Bombardements, um nach Joanna zu suchen. Glcklicherweise ist sie am Leben, begraben unter Schutt und Asche. Allerdings h舁t noch ein Skedar ihren Fu゚ umklammert. Elvis gibt ihr eine Waffe, um dieses letzte Hindernis zu beseitigen. Der Schrein wurde zerstrt, die Verschwrung wurde gestoppt, und beide knnen ruhigen Gewissens in den Orbit zurckkehren.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "Die monolithische Firma, zu der dataDyne geworden ist, begann als Systemprogrammierer fr knstliche Intelligenzen. Als klar wurde, dass die Firma ihr Haupteinkommen durch die Zusammenarbeit mit dem Milit舐 bezieht, begann eine junge, aufstrebende Managerin namens Cassandra De Vries Gesch臟te mit Waffenherstellern abzuwickeln. Angebote von Daniel Carrington bezglich einer Zusammenarbeit mit dem Institut im Bereich der Quantentechnik, lehnte sie stets ab. Nach der Fusion mehrerer Firmen schossen die Profite in astronomische Hhen. Nach einem Monat stand ein Vertrag mit der Regierung zur Entwicklung von Waffen. Ein hoher Prozentsatz des Ertrags wurde der Entwicklung von KI-Systemen zugefhrt. Wie sich zeigt, mit hervorragenden Resultaten.\n", + /*175*/ "Carrington Institut\n", + /*176*/ "Als Pfuscher verschrien, schaffte es Daniel Carrington, die erste Anti-Grav-Technologie zu entwickeln. Die dadurch erhaltenen Einknfte trugen dazu bei, das Carrington Institut aufzubauen, eine hochtechnisierte Denkfabrik mitten in den USA. Das Institut ist auch die Ausbildungsst舩te fr Agenten, die in alle L舅der der Welt entsandt werden, um die Fortschritte verschiedener Technologien zu verfolgen. Diese ワberwachungsfunktion hat, schon mehrfach Missbrauch verhindert.\n", + /*177*/ "Beschreibung\n- Eine kleine, ferngesteuerte Kamera fr verdeckte Untersuchungen. Ausgerstet fr spektroskopische Holografie. ヨffnet Tren durch Projektion von Krperw舐me.\n\nTraining\n- Holgrafieren Sie das Terminal des Hackers im Raum nebenan.\n\nBedienung\n- Drcken Sie den Z-Trigger um zu holografieren. Durch Drcken des B-Knopfs werden Tren geffnet. Drcken Sie die R-Taste, um sich umzusehen.\n", + /*178*/ "Beschreibung\n- Verst舐kt Licht, um die Umgebung besser wahrnehmen zu knnen. Lebensformen werden hervorgehoben. Unter normaler Beleuchtung ist die Wahrnehmung berlastet.\n\nTraining\n- Finden Sie den Lichtschalter im Dunkeln und bet舩igen Sie ihn.\n\nBedienung\n- W臧len Sie das Nachtsichtger舩 aus Ihrem Inventar. W臧len Sie es nochmals, um es zu deaktivieren.\n", + /*179*/ "Beschreibung\n\n- Vorrichtung um Codes zu knacken. Wird an den jeweiligen Kontrollen angebracht, und geht alle Varianten durch, bis das Schloss geffnet wird.\n\nTraining\n- Setzen Sie den Decoder an der Konsole neben der Tr ein, um sie zu ffnen.\n\nBedienung\n- Stellen Sie sich neben die Konsole und drcken Sie den B-Knopf, nachdem Sie den Decoder ausgew臧lt haben.\n", + /*180*/ "Beschreibung\n\n- Dient dazu, durch feste Objekte zu sehen. Macht Dinge sichtbar, die das Nachtsichtger舩 und die IR-Brillen nicht erfassen knnen.\n\nTraining\n- Suchen Sie mit dem Rntgen-Scanner die zwei versteckten Schalter, und schalten Sie mit ihnen die Laser ab.\n\nBedienung\n- W臧len Sie den Scanner aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*181*/ "Beschreibung\n\n- Verkleiden Sie sich, um nicht erkannt zu werden. Achten Sie aber darauf, nicht von einem scharfsinnigen Gegner demaskiert zu werden.\n\nTraining\n- Grimshaw hat eine Tarnkappe, die mal zum 'Service' msste. Gehen Sie zu ihm und 'erlangen' Sie sie.\n\nBedienung\n- Um die Verkleidung zu tragen, w臧len Sie sie aus Ihrem Inventar.\n", + /*182*/ "Beschreibung\n\n- Verwandelt thermische Daten in sichtbare Bilder. Kann auch in der Dunkelheit benutzt werden. Zeigt auch Anomalien, wie versteckte Tren und brchige W舅de.\n\nTraining\n- Aktivieren Sie den Scanner, finden Sie die Tr und ffnen Sie sie.\n\nBedienung\n- W臧len Sie den Scanner aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*183*/ "Beschreibung\n- Ortet ein bestimmtes Objekt auf einer Radar-Karte. Zeigt auch die relative Lage und Entfernung.\n\nTraining\n- Aktivieren Sie den Tracker und folgen Sie der Signatur, um den Gegenstand zu finden.\n\nBedienung\n- W臧len Sie den Tracker aus Ihrem Inventar. W臧len Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*184*/ "Beschreibung\n- Unterbricht das sichtbare Lichtspektrum rund um den Tr臠er. Erschafft einen cham舁eon臧nlichen Effekt. Das Feld bricht zusammen, wenn der Tr臠er eine Waffe abfeuert.\n\nTraining\n- Aktivieren Sie die Tarnkappe und gehen Sie zu Carrington, um ihn zu berraschen!\n\nBedienung\n- W臧len Sie die Tarnkappe aus Ihrem Inventar. W臧len Sie sie nochmals, um sie zu deaktivieren.\n", + /*185*/ "Beschreibung\n- Sendet ein st舅dig wechselndes Signal, um jegliche elektronische Kommunikation zu stren. Muss direkt am Objekt platziert werden.\n\nTraining\n- Werfen Sie die ECM-Mine an den Schaltblock hinter der versteckten Tr.\n\nBedienung\n- Drcken Sie den Z-Trigger, um die Mine zu werfen. Halten Sie den R-Knopf gedrckt und zielen Sie mit dem analogen 3D-Stick.\n", + /*186*/ "Beschreibung\n- Stellt eine Verbindung zwischen dem Agenten und den Hackern des Instituts her, die dann Daten kopieren oder elektronisch gesicherte Schlsser knacken knnen.\n\nTraining\n- Hacken Sie sich mit dem Data Uplink in das Terminal in der Ecke, um eine geheime Tr zu ffnen.\n\nBedienung\n- Stellen Sie sich neben das Terminal und drcken Sie den B-Knopf, nachdem Sie den Uplink ausgew臧lt haben.\n", + /*187*/ "SCHIESSEN\n Drcken Sie den Z-Trigger, um eine Waffe abzufeuern.\n", + /*188*/ "AUTO RELOAD\n Lassen Sie den Z-Trigger los, wenn Sie keine Munition mehr haben.\n", + /*189*/ "MANUELLER RELOAD\n Drcken Sie den B-Knopf, um manuell nachzuladen.\n", + /*190*/ "Zielen: Halten Sie die R-Taste gedrckt, um den Ziel-Modus zu aktivieren.\n", + /*191*/ "Justieren Sie Ihr Visier, indem Sie den analogen 3D-Stick bewegen.\n", + /*192*/ "AUTO FEUER\n Halten Sie den Z-Trigger gedrckt, um automatisch zu feuern.\n", + /*193*/ "ZIELHヨHE\n Drcken Sie die C-Knpfe oben oder unten, um die Sicht anzupassen.\n", + /*194*/ "ZOOM\n Halten sie die R-Taste gedrckt, um den Zoom-Modus zu aktivieren.\n", + /*195*/ "SCHNELLFEUER\n Drcken Sie den Z-Knopf in rascher Abfolge, um schneller zu feuern.\n", + /*196*/ "Carrington Institut\0|Basis der Operationen\n", + /*197*/ "Lucerne Tower\0|Globales Hauptquartier\n", + /*198*/ "Laboratorgeschoss\0|Unterirdisches Forschungslabor\n", + /*199*/ "Carrington Villa\0|Private Residenz\n", + /*200*/ "Chicago\0|Die dunklen Gassen der Stadt\n", + /*201*/ "G5-Building\0|Deckmantel der dataDyne Corporation\n", + /*202*/ "Area 51\0|Nahe dem Groom Dry Lake, Nevada\n", + /*203*/ "Sttzpunkt Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Das Flugzeug des Pr舖identen\n", + /*205*/ "Absturzstelle\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Tiefsee-Forschungsschiff\n", + /*207*/ "Cetanisches Schiff\0|Das gr゚te au゚erirdische Schiff\n", + /*208*/ "Skedar-Schiff\0|Raumfschiff fr Truppentransporte\n", + /*209*/ "Heimat der Skedar\0|Der Planet des Kriegs-Schreins\n", + /*210*/ "Jumpship\0|Agiler Truppentransporter\n", + /*211*/ "HoverCrate\0|Antigraviations-Vorrichtung\n", + /*212*/ "HoverBike\0|Niedrigfliegendes Vehikel\n", + /*213*/ "Reinigungs-Roboter\0|Dein hilfreicher kleiner Freund\n", + /*214*/ "Hovercopter\0|Urbanes Gunship\n", + /*215*/ "G5-Roboter\0|Urbaner Kampf-Droid\n", + /*216*/ "A51 Interceptor\0|Robotische Abfang-Einheit\n", + /*217*/ "Maianisches Schiff\0|Sp臧- und Patrouillen-Schiff\n", + /*218*/ "Skedar-Shuttle\0|Truppen-Landungsschiff\n", + /*219*/ "Das Instituts-Geb舫de beinhaltet viele verschiedene Bereiche: Bros und Laboratorien, Workshops und Hangars. Da es von der Au゚enwelt relativ isoliert ist, knnen die Operationen leichter verdeckt werden.\n", + /*220*/ "Mitten im Gesch臟tsviertel hebt sich der dataDyne-Wolkenkratzer durch seine enorme Gr゚e von der Umgebung ab.\n", + /*221*/ "Die schwer bewachten, gut versteckten Labors beinhalten den Schlssel zu dataDynes Zukunft. In ihnen arbeiten Techniker an streng geheimen Projekten, die dataDyne noch weiter nach oben bringen sollen.\n", + /*222*/ "Daniel Carringtons Residenz ist quasi sein Fluchtort vor dem Stress innerhalb des Instituts. Neben einem Observatorium verfgt die Villa ber einen Windkraft-Generator und einen gut ausgestatteten Weinkeller.\n", + /*223*/ "Ein schmutziger, verkommener Stadtteil Chicagos, abgeschnitten vom Bodenverkehr. Hier hat die G5-Corporation ihr Hauptquartier.\n", + /*224*/ "Im G5-Building befindet sich ein Meetingraum, der durch Anti-Aufnahme-Ger舩e geschtzt wird. Dies ist fr dataDyne der sicherste Ort, um vertrauliche Pl舅e zu besprechen.\n", + /*225*/ "Diese Sektion des als Area 51 bekannten Luftwaffensttzpunktes befindet sich nahe des Groom Dry Lake. Helipads und Kommunikationstrme lassen Rckschlsse auf die Gr゚e des unterirdischen Komplexes zu.\n", + /*226*/ "Eine von mehreren Luftbasen, die als Etappenziele der Air Force One dienen. Typischerweise befindet sich die Basis in einer sehr unwirtlichen Umgebung, geschtzt vor nicht autorisierten Augen.\n", + /*227*/ "Diese spezielle Air Force One wurde fr kalte Klimata optimiert. Sehr ntzlich, wenn sie in Nord-Alaska eingesetzt wird. Die Destination ist Oslo, Norwegen.\n", + /*228*/ "Das abgeschossene Flugzeug kam in einem felsigen, eisbedeckten Landstrich im Arktischen Kreis zu einem abrupten Stillstand.\n", + /*229*/ "Die Pelagic II befindet sich im Besitz der US-Regierung. Das Schiff ist in der Lage, Tiefsee-Operationen unter allen meteorologischen Bedingungen durchzufhren. Dies ist das einzige Schiff seiner Art.\n", + /*230*/ "Ein riesenhaftes Schiff extraterrestrischer Herkunft, das schon seit Millionen von Jahren auf dem Meeresgrund liegt.\n", + /*231*/ "Ein interplanetares Schiff, das Skedar-Krieger zu ihrem Einsatzort bringt. Teil der stark reduzierten Skedar-Kampfflotte.\n", + /*232*/ "Ein sehr trockener, von Erdbeben, Sandstrmen und Hurricanes zerfurchter Planet. Teil eines komplexen Sonnensystems, in dessen Zentrum sich drei Sonnen befinden.\n", + /*233*/ "Ein kleines, schnelles und gut manvrierbares Flugger舩. Geeignet, um Agenten in urbanen Gebieten abzusetzen. Kann sowohl computergesteuert, als auch ferngesteuert werden. Bietet Platz fr bis zu vier Agenten.\n", + /*234*/ "Ein Antigravitations-System zur Untersttzung bei Verladearbeiten. Wird an der Seite einer Kiste angebracht. Ein AG-Feld hebt die Kiste an, und hebt ein wenig der Tr臠heit auf.\n", + /*235*/ "Eine niedrigfliegende Patrouillen-Einheit. Setzt ein kleines AG-Ger舩 ein, um zu schweben. Der Antrieb erfolgt ber zwei starke Turbinen.\n", + /*236*/ "H舁t alles rein und sauber. Hat Zugang zu allen Bereichen eines Geb舫des. Es wird geraten, diese Roboter nicht zu besch臈igen, da sie teilweise einen alternativen Zugang zu stark bewachten R舫men ermglichen.\n", + /*237*/ "Ein urbanes Patrouillen-Vehikel. Die Besatzung besteht aus zwei Mann, bewaffnet mit einer Vulcan-Kanone und zwei Raketenwerfern. Kann durchaus durch MG-Feuer oder einer gut gezielten Rakete abgeschossen werden.\n", + /*238*/ "Ein Kampfroboter fr urbane Eins舩ze. Setzt AG-Technik ein, um zu schweben. Schwer bewaffnet und gepanzert. Wird meist eingesetzt, um unwillkommene G舖te fernzuhalten. Frei nach dem Motto: Zuerst schie゚en, dann fragen.\n", + /*239*/ "Eine robotische Variante des Hoverbike, verfgt ber st舐kere AG-Technik und Turbinen. Erreicht alle Geschwindigkeiten von Schrittgeschwindigkeit bis Mach 2. Obwohl gut bewaffnet, liegt sein Vorteil in der Manvrierbarkeit.\n", + /*240*/ "Designed fr einen Maianischen Piloten. Ein Passagier wrde sich sehr eingeengt fhlen - ein menschlicher Passagier noch mehr!\n", + /*241*/ "Kann bis zu zehn voll bewaffnete und ausgerstete Skedar transportieren. Unsichtbar fr konventionelles Radar. Sendet starke Strsignale ber eine weite Entfernung aus, um Kommunikation und Erfassung unmglich zu machen.\n", + /*242*/ "Beschreibung\n- Ein guter Agent bemerkt alles um ihn herum.\n\nTraining\n- Untersuchen Sie alle Objekte, indem Sie sie betrachten.\n\nBedienung\n-nach oben schauen - Drcken Sie den C-Knopf unten\n-nach unten schauen - Drcken Sie den C-Knopf oben.\n-Individuelle Sicht - Halten Sie die R-Taste gedrckt und ver舅dern sie die Sicht mit dem analogen 3D-Stick.\n", + /*243*/ "Beschreibung\n- Sidesteps und Strafing knnen Ihnen aus der Patsche helfen.\n\nTraining\n- Bet舩igen Sie alle Schalter. Sie mssen schnell sein, da sich die Schalter rasch zurcksetzen.\n\nBedienung\n- Sidestep links - Drcken Sie den C-Knopf links.\n- Sidestep rechts - Drcken Sie den C-Knopf rechts.\n\n", + /*244*/ "Beschreibung\n- Durch Ducken und Hocken knnen Sie neue Bereiche finden.\n\nTraining\n- Arbeiten Sie sich an den Hindernissen vorbei, und bet舩igen Sie die Schalter.\n\nBedienung\n- Ducken - Halten Sie die R-Taste gedrckt und drcken Sie den C-Knopf unten.\n- Hocken - Halten Sie beim Ducken den C-Knopf unten gedrckt.\n- Aufstehen - R-Taste\n\n", + /*245*/ "Beschreibung\n- Ein unbewaffneter Kampf gegen mehrere Gegner kann mitunter sehr schwierig sein.\n\nTraining\n- Schlagen Sie alle Gegner KO, ohne selbst getroffen zu werden.\n\nBedienung\n- Schlag - Drcken Sie den Z-Trigger in schneller Abfolge, um dem Gegner mehrere Schl臠e zu verpassen.\n\n", + /*246*/ "Beschreibung\n- Wenn Sie einen Gegner entwaffnen, bringt Ihnen das vielleicht eine neue Waffe.\n\nTraining\n- Entwaffen Sie alle Gegner, ohne selbst getroffen zu werden.\n\nBedienung\n- Entwaffnen - Halten sie den B-Knopf gedrckt und drcken Sie den Z-Trigger, um einen Gegner zu entwaffnen.\n- KO-Schlag - Schlagen Sie einen unachtsamen Gegner von hinten nieder.\n", + /*247*/ "Beschreibung\n- Unbewaffneter Kampf gegen mehrere Gegner.\n\nTraining\n- Besiegen Sie alle unbewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*248*/ "Beschreibung\n- Unbewaffneter Kampf gegen bewaffnete und unbewaffnete Gegner.\n\nTraining\n- Besiegen Sie alle bewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*249*/ "Nutzen Sie den Zielmodus, um gr゚ere Pr艘ision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*250*/ "ワberlegen Sie sich, wohin Sie gehen wollen, bevor sie loslegen. Stellen Sie sich so auf, dass Sie ein Minimum an Bewegung aufbringen mssen, wenn Sie sich zwischen den Zielen bewegen.\n", + /*251*/ "Wenn Sie sich ducken, erreichen Sie Orte, die fr Sie ansonsten unzug舅glich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen knnen. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*252*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie mssen. Halten Sie sich fr einen raschen Rckzug bereit, wenn der Gegner seinerseits zum Angriff bergeht.\n", + /*253*/ "Bleiben Sie nur solange in der N臧e des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschlie゚end au゚er Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*254*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen knnen, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*255*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschlie゚end ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*256*/ "Nutzen Sie den Zielmodus, um gr゚ere Pr艘ision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*257*/ "Sidesteps und Strafing knnen Ihnen aus der Patsche helfen.\n", + /*258*/ "Wenn Sie sich ducken, erreichen Sie Orte, die fr Sie ansonsten unzug舅glich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen knnen. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*259*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie mssen. Halten Sie sich fr einen raschen Rckzug bereit, wenn der Gegner seinerseits zum Angriff bergeht.\n", + /*260*/ "Bleiben Sie nur solange in der N臧e des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschlie゚end au゚er Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*261*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen knnen, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*262*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschlie゚end ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*263*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Ger舩 anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*264*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie mglich. Adjustieren Sie Ihr Ziel mit den C-Knpfen oder gehen Sie in den Ziel-Modus.\n", + /*265*/ "Der CamSpy kann schwierig zu steuern sein. Lassen Sie sich Zeit.\n", + /*266*/ "Ntzlich im Kampf, aber achten Sie auf ワberladung.\n", + /*267*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich n臧er ans Zielobjekt.\n", + /*268*/ "Der Tracker gibt nur die Richtung und relative Hhe an. Er verfgt ber keine Kartenfunktion, die Sie direkt zum Ziel fhrt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*269*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen fhren kann. Sch舩zen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*270*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschr舅kt, setzen Sie daher dieses Ger舩 nur im Bedarfsfall ein.\n", + /*271*/ "Eine berzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Tr臠ers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*272*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier 舫゚erst wichtig.\n", + /*273*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Ger舩 anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*274*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie mglich. Adjustieren Sie Ihr Ziel mit den C-Knpfen oder gehen Sie in den Ziel-Modus.\n", + /*275*/ "Der CamSpy ist nicht unsichtbar. Er knnte entdeckt werden, also Vorsicht, wenn Sie in belebtem Gebiet operieren. Vergessen Sie nicht, dass der CamSpy an dem Ort bleibt, an dem Sie ihn abgelegt haben.\n", + /*276*/ "Ntzlich im Kampf, aber achten Sie auf ワberladung. Versuchen Sie, die Situation abzusch舩zen, und reagieren Sie, bevor es der Gegner tut.\n", + /*277*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich n臧er ans Zielobjekt.\n", + /*278*/ "Der Tracker gibt nur die Richtung und relative Hhe an. Er verfgt ber keine Kartenfunktion, die Sie direkt zum Ziel fhrt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*279*/ "Der Visor verengt Ihre periphere Sicht, was in Kampfsituationen zu Problemen fhren kann. Sch舩zen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*280*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschr舅kt, daher setzen Sie dieses Ger舩 nur im Bedarfsfall ein.\n", + /*281*/ "Eine berzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Tr臠ers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*282*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier 舫゚erst wichtig. Vermeiden Sie es, eine Waffe abzufeuern, bevor Sie sich nicht 100 %ig sicher sind, einen Treffer zu landen.\n", + /*283*/ "Die Falcon 2 ist eine sehr genaue Handfeuerwaffe. Jeden Fehlschuss verantworten Sie daher selbst. Die Sekund舐-Funktion ist der Schlag mit der Waffe und somit am Schie゚stand nutzlos.\n", + /*284*/ "Zur Erhhung der Genauigkeit wurde ein Zielfernrohr an der Waffe montiert. Ebenso wie bei der nicht modifizierten Version, ist die Sekund舐-Funktion am Schie゚stand leider nutzlos.\n", + /*285*/ "Die schallged舂pfte Version der Falcon 2 eignet sich hervorragend dazu, gegenber Ihren Gegnern den ワberraschungsmoment zu nutzen. Testen Sie Ihre Genauigkeit, um sicherzugehen, keine Chance zu verpassen.\n", + /*286*/ "Die MagSec 4 stellt Feuerkraft in den Vordergrund. Dies zeigt sich speziell im Dreifach-Schu゚ Sekund舐-Modus. Der einzige Nachteil ist das kleine Magazin.\n", + /*287*/ "Eine typische Skedar-Waffe, brutal und kraftvoll. Wenn Sie bereit sind, ein wenig mehr Munition zu opfern, knnen Sie den Schu゚ um ein Vielfaches verst舐ken.\n", + /*288*/ "Diese vielseitige Pistole hat zwei verschiedene Feuer-Modi. Ein Standard-Schuss, oder ein Explosiv-Geschoss. Die Maianischen Ingenieure haben es geschafft, diese Funktion nicht auf Kosten der Munition, sondern der Feuerrate zu integrieren.\n", + /*289*/ "Der Schlssel zur DY357 ist das Wissen, wann nachzuladen ist. Ein sechs Schuss umfassendes Magazin erfordert Ihre Aufmerksamkeit. Das Gewicht der Waffe kann sich als ntzlich erweisen, wenn Sie jemanden damit niederschlagen.\n", + /*290*/ "Trent Easton sucht immer nach dem gewissen Etwas, und diese Waffe ist keine Ausnahme. Das gleiche gilt fr die Kugeln. Sind sie ins Ziel eingedrungen, zerbersten sie in tausend Stcke.\n", + /*291*/ "Ein verl舖sliches und effektives Maschinengewehr. Es steht wohl fest, warum diese Waffe der dataDyne-Bestseller der letzten zwei Jahre ist. Dabei ist die Sekund舐-Funktion noch gar nicht mit in Betracht gezogen. Das Zielauswahl-System ist ein exzellentes Feature, dass Ihnen viel トrger ersparen kann.\n", + /*292*/ "Das Cyclone-Maschinengewehr wurde speziell dafr designed, NICHT genau zu sein. Sie sollten trotzdem ausgiebig damit trainieren. Die weite Streuung der Kugeln eignet sich hervorragend, Feuerschutz zu geben.\n", + /*293*/ "Dieses Maschinengewehr entsprang Maianischer Flexibilit舩 und verfgt ber eine interessante Sekund舐-Funktion: ein Hochgeschwindigkeits-Schuss, der feste Objekte leicht durchdringt. In diesem Modus wird die Feuerrate natrlich reduziert, um den Mechanismus zu schonen.\n", + /*294*/ "Die RC-P120 verwendet spezielle Mineral-Kugeln, gepaart mit hoher Feuerrate und einem gro゚en Magazin. Die perfekte Waffe im Einsatz gegen die Skedar. Die Kugeln knnen auch als Energielieferant fr die integrierte Tarnfuktion eingesetzt werden. Das Training wurde diesem Umstand angepasst.\n", + /*295*/ "Die Waffe kann nicht nur als Laptop getarnt werden, als Sekund舐-Funktion kann sie auch als Selbstschussanlage an der entsprechenden Postion installiert werden.\n", + /*296*/ "Dieses Modell wurde von dataDyne erfolgreich im US-Milit舐 eingefhrt. In ワbereinstimmung mit dataDynes Tendenz, den Leuten bse ワberraschungen zu bereiten, wurde dem Basismodell eine Ann臧erungs-Mine eingebaut. Wird der Sekund舐-Modus aktiviert, bedeutet das, dass die Waffe fortgeworfen werden muss.\n", + /*297*/ "So weit wir es beurteilen knnen, verfgt die Waffe als Sekund舐-Funktion ber einen Sensor, der mgliche Gefahrenquellen ortet und anzeigt. Obwohl die Waffe sehr stark ist, verfgt das Magazin ber ein nur kleines Fassungsvermgen. \n", + /*298*/ "Der erste Versuch des Instituts, eine untersttzende Zweitwaffe zu kreieren, resultierte in diesem Modell. Der Sekund舐-Modus ist ein permanenter Zoom.\n", + /*299*/ "Die schwerere Variante des Dragon. Die Ann臧erungsmine wurde durch einen kleinen Granatwerfer ersetzt. Im US-Milit舐 hat diese Waffe klarerweise gro゚en Anklang gefunden. Gewhnen Sie sich im Training an die Flugbahn der Granaten.\n", + /*300*/ "Subtilit舩 z臧lt hier nicht. Zwei Modi stehen zur Verfgung: einfacher Schuss und Doppelschuss. Das Magazin ist relativ gro゚, die Ladezeiten jedoch eher lang.\n", + /*301*/ "Ein gut verarbeitetes, schallged舂pftes Sniper-Gewehr mit hervorragendem Zoom. Das Einzige, was die Genauigkeit mindern knnte, ist der Schtze. Gehen Sie in die Hocke, um Ihr Ziel besser fixieren zu knnen.\n", + /*302*/ "Obwohl die Technologie schon etwas berholt ist, sch舩zen wir noch immer die F臧igkeiten des Fernsicht-Gewehrs. Der Schuss ist nahezu unaufhaltbar, die Zielerfassung geht bis zu einem gewissen Grad sogar durch W舅de.\n", + /*303*/ "Die Prim舐-Funktion feuert einen vergifteten Bolzen ab, der allerdings nicht viel Schaden anrichtet. Sehrwohl aber der Sekund舐-Schuss. Es handelt sich um eine Tarn-Waffe mit langer Ladezeit. Daher eher unpraktisch im Feuergefecht.\n", + /*304*/ "Das Bet舫bungsgewehr findet in seinen Grundzgen in vielen medizinischen Labors und Krankenh舫sern Verwendung. Die Dosis des Bet舫bungsmittels kann, bei kurzen Distanzen, erhht werden, um die Wirkung zu vervielfachen.\n", + /*305*/ "Versuchen Sie, diese Waffe unter Kontrolle zu halten. Sie wurde definitiv nicht fr einen menschlichen Schtzen konzipiert. Wenn Sie in die Knie gehen, knnen Sie Ihr Ziel leichter erfassen. Es ist stark zu bezweifeln, dass auch nur ein Feind an den Feuerst゚en vorbeikommt.\n", + /*306*/ "Ein neueres dataDyne-Produkt mit einer sehr interessanten Technologie. Die Sekund舐-Funktion legt ein magnetisches Feld um die Bombe, wodurch eine Haftung an W舅den ermglicht wird. Nach einiger Zeit f舁lt die Bombe zu Boden und detoniert.\n", + /*307*/ "Ein kompakter, wiederverwendbarer Raketenwerfer. L臈t nach jedem Schuss selbst nach. Die Sekund舐-Funktion ermglicht die Aufschaltung auf ein Ziel. Die Rakete bewegt sich in diesem Modus langsamer. Planen Sie dies beim Timing Ihrer Schsse ein.\n", + /*308*/ "Der handliche Skedar-Raketenwerfer feuert entweder eine normale Rakete, oder eine ferngelenkte Rakete ab. Vermutlich verschafft diese Funktion den Skedar eine perverse Befriedigung, da sie das flchtende Ziel durch eine Kamera beobachten knnen. Ein Agent des Carrington Instituts findet dafr natrlich keine Verwendung. Die Detonation erfolgt bei Zielkontakt oder via Auslser.\n", + /*309*/ "Ein gut ausgewogenes Kampfmesser, das sich auch als Wurfmesser eignet. ワbung ist unumg舅glich, wenn Sie diese Waffe meistern wollen.\n", + /*310*/ "Die Experimentalwaffen-Abteilung hat einen kleinen, aber sehr effektiven Laser entwickelt. Zwei Feuermodi sind verfgbar. Einerseits kann ein Langstrecken-Laser abgefeuert werden, andererseits ist auch ein wesentlich st舐kerer Kurzstrecken-Laser verfgbar.\n", + /*311*/ "Diese Splitter-Granate detoniert vier Sekunden nach Aktivierung. Zu Ihrer Unterhaltung haben wir eine zweite Funktion integriert: Ann臧erungs-Pinball! Die Granate wird umherspringen, bis der Timer abgelaufen ist, oder der Sensor eine Bewegung erfasst und die Granate zur Detonation bringt.\n", + /*312*/ "Diese Maianische Granate vergreift sich an den Neuronen denkender Kreaturen. Sollten Sie sich im Detonationsradius befinden, verschwimmt Ihre Sicht und Sie lassen alles fallen, was sich in Ihren H舅den befindet. Die Detonation erfolgt bei Kontakt oder bei Ann臧erung.\n", + /*313*/ "Um Zeitznder-Minen effektiv einzusetzen, ist gutes Timing Voraussetzung. Andernfalls knnte das Ziel einfach an der Mine vorbeilaufen. Verbessern Sie Ihre F臧igkeiten im Training, bevor Sie im Einsatz einen kritischen Fehler begehen. Bei der Sekund舐-Funktion handelt es sich um den allseits beliebten Gefahren-Anzeiger.\n", + /*314*/ "Der Schlssel zur erfolgreichen Platzierung von Ann臧erungs-Minen ist, sie dort zu platzieren, wo sie der Gegner nicht erwartet. Sollten Sie selbst in so ein Minenfeld geraten, nutzen Sie den Sekund舐-Modus, der einen Gefahren-Anzeiger beinhaltet. Etwas zeitaufwendig, aber mitunter berlebensnotwendig.\n", + /*315*/ "Wiederum eine neue Variante ferngezndeter Minen, die aber auf dem blichen Prinzip aufbaut. Die Prim舐-Funktion platziert die Mine, die Sekund舐-Funktion l舖st sie detonieren. Knnen Sie die Mine nicht sehen, mssen Sie sich auf Ihr Gefhl verlassen. \n", + /*316*/ "Holo 1 - Umschauen\n", + /*317*/ "Holo 2 - Bewegung 1\n", + /*318*/ "Holo 3 - Bewegung 2\n", + /*319*/ "Holo 4 - Unbewaffnet 1\n", + /*320*/ "Holo 5 - Unbewaffnet 2\n", + /*321*/ "Holo 6 - Live-Kampf 1\n", + /*322*/ "Holo 7 - Live-Kampf 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_i.c b/src/files/lang/pal-final/dish_str_i.c new file mode 100644 index 000000000..537d0b08f --- /dev/null +++ b/src/files/lang/pal-final/dish_str_i.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Innanzitutto prendi la Vista Notturna dal tavolo.\n", + /* 9*/ "Attiva la Vista Notturna.\nTrova interruttore.\nRiaccendi le luci.\n", + /* 10*/ "Prendi il Connettore Dati dal tavolo.\n", + /* 11*/ "Avvicinati al terminale e usa il Connettore Dati.\n", + /* 12*/ "Devi tenere in mano il Connettore Dati.\n", + /* 13*/ "Stabilito collegamento...\n", + /* 14*/ "Il codice del terminale stato decifrato.\n", + /* 15*/ "Collegamento interrotto: sei troppo lontano dal PC.\n", + /* 16*/ "Prendi la mina ECM dal tavolo.\n", + /* 17*/ "Trova la centralina e piazzale sopra una mina ECM.\n", + /* 18*/ "Mina ECM in posizione errata.\n", + /* 19*/ "Mina ECM piazzata correttamente.\n", + /* 20*/ "Prendi la TeleSpia dal tavolo.\n", + /* 21*/ "Trova il PC sala informazioni per l'olografia.\n", + /* 22*/ "Olografia riuscita.\n", + /* 23*/ "Riattivate le luci.\n", + /* 24*/ "Prendi il decodificatore porta dal tavolo.\n", + /* 25*/ "Usa il decodificatore per sbloccare la porta.\n", + /* 26*/ "Devi tenere in mano il decodificatore porta.\n", + /* 27*/ "Applicato decodificatore. Decodifica in corso...\n", + /* 28*/ "Decodifica completata. La porta stata sbloccata.\n", + /* 29*/ "Prendi il puntatore dal tavolo.\n", + /* 30*/ "Trova lo scanner a infrarossi con il puntatore.\n", + /* 31*/ "Trovato lo scanner a infrarossi.\n", + /* 32*/ "Prendi lo scanner a infrarossi dal tavolo.\n", + /* 33*/ "Trova la porta segreta con lo scanner a infrarossi.\n", + /* 34*/ "Trovata la porta segreta.\n", + /* 35*/ "Prendi lo scanner a raggi X dal tavolo.\n", + /* 36*/ "Trova gli interruttori e disattiva le griglie laser.\n", + /* 37*/ "Disattivate tutte le griglie laser.\n", + /* 38*/ "Prendi il travestimento dal tavolo.\n", + /* 39*/ "Convinci qualcuno a darti il dispositivo mimetico.\n", + /* 40*/ "Trovato il dispositivo mimetico.\n", + /* 41*/ "Disattivata la griglia laser 1.\n", + /* 42*/ "Disattivata la griglia laser 2.\n", + /* 43*/ "Sono qui per prendere l'attrezzatura.\n", + /* 44*/ "Vattene, Joanna. Non mi far fregare da te!\n", + /* 45*/ "Ecco a te! E adesso non perderlo!\n", + /* 46*/ "Ricevuto il dispositivo mimetico.\n", + /* 47*/ "Devi usare il travestimento, ricordi?\n", + /* 48*/ "Puoi fare di meglio, Joanna.\n", + /* 49*/ "Joanna, da dove te ne sei sbucata?\n", + /* 50*/ "Sei stata scoperta dalle telecamere!\n", + /* 51*/ "Prendi il dispositivo mimetico dal tavolo.\n", + /* 52*/ "Usa il dispositivo mimetico e trova Carrington.\n", + /* 53*/ "Credo proprio che il tuo addestramento\nsia completo!\n", + /* 54*/ "Missione compiuta - Addestramento superato!\n", + /* 55*/ "Missione fallita - Sei stata scoperta!\n", + /* 56*/ "Seleziona il Connettore Dati.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il Connettore Dati e rilascia A.\n", + /* 57*/ "Seleziona la TeleSpia.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la TeleSpia e rilascia A.\n", + /* 58*/ "Seleziona la Vista Notturna.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la Vista Notturna e rilascia A.\n", + /* 59*/ "Seleziona il decodificatore porta.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il decodificatore porta e rilascia A.\n", + /* 60*/ "Seleziona lo scanner a raggi X.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli lo scanner a raggi X e rilascia A.\n", + /* 61*/ "Seleziona il travestimento.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il travestimento e rilascia A.\n", + /* 62*/ "Seleziona lo scanner a infrarossi.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli scanner a infrarossi e rilascia A.\n", + /* 63*/ "Seleziona il puntatore.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il puntatore e rilascia A.\n", + /* 64*/ "Seleziona il dispositivo mimetico.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il dispositivo mimetico e rilascia A.\n", + /* 65*/ "Seleziona la mina ECM.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la mina ECM e rilascia A.\n", + /* 66*/ "Joanna, vedo che stai bene!\n", + /* 67*/ "Seguimi!\nTi condurr al reparto addestramento.\n", + /* 68*/ "Il centro informazioni oltre questa porta.\n", + /* 69*/ "Qui abbiamo il laboratorio strumentazioni.\n", + /* 70*/ "Questo porta al reparto addestramento replicanti.\n", + /* 71*/ "Questo il poligono di tiro.\n", + /* 72*/ "Questo corridoio porta all'hangar.\n", + /* 73*/ "ANTIGRAVITタ\nPremi B vicino all'Antigravit per prenderlo...\n", + /* 74*/ "Premi B di nuovo per lasciarlo.\n", + /* 75*/ "AEROMOTO\nPremi B due volte vicino all'Aeromoto per salire...\n", + /* 76*/ "Premi B due volte per scendere dall'aeromoto.\n", + /* 77*/ "PORTE\nPremi B vicino ad una porta per aprirla.\n", + /* 78*/ "Il pulsante B attiver anche qualsiasi strumento l vicino.\n", + /* 79*/ "ASCENSORI\nPremi B vicino all'ascensore per chiamarlo.\n", + /* 80*/ "Impossibile uscire durante l'addestramento.\n", + /* 81*/ "Ottenuto codice di accesso 1.\n", + /* 82*/ "Ottenuto codice di accesso 2.\n", + /* 83*/ "Ottenuto codice di accesso 3.\n", + /* 84*/ "Ottenuto codice di accesso 4.\n", + /* 85*/ "GUARDA IN SU\n- Premi C verso il basso per guardare in alto.\n", + /* 86*/ "GUARDA IN GIル\n- Premi C verso l'alto per guardare in basso.\n", + /* 87*/ "Completato l'oloprogramma 2.\n", + /* 88*/ "Completato l'oloprogramma 4.\n", + /* 89*/ "Completato l'oloprogramma 5.\n", + /* 90*/ "La guardia stata disarmata.\n", + /* 91*/ "La guardia stata messa KO.\n", + /* 92*/ "Disarma quest'avversario in movimento se ci riesci.\n", + /* 93*/ "Metti KO quest'avversario... ci vuole agilit!\n", + /* 94*/ "Ecco l'ultima guardia...\n", + /* 95*/ "SCHIVA\n- Tieni premuto R, poi premi C verso il basso.\n", + /* 96*/ "ACCUCCIATI\n- Tieni premuto R, poi premi e tieni premuto C verso il basso.\n", + /* 97*/ "Completato l'oloprogramma 3.\n", + /* 98*/ "Attiva tutti gli interruttori.\n", + /* 99*/ "Attiva tutti gli interruttori a parete.\n Fai presto o saranno resettati.\n", + /*100*/ "Scopri i codici d'accesso esaminando i terminali.\n Usa i codici per i terminali a parete.\n", + /*101*/ "Scoperto codice 1.\n", + /*102*/ "Scoperto codice 2.\n", + /*103*/ "Scoperto codice 3.\n", + /*104*/ "Scoperto codice 4.\n", + /*105*/ "Addestramento fallito - Devi guardare avanti.\n", + /*106*/ "Completato l'oloprogramma 1.\n", + /*107*/ "Combattimento a amni nude: stendi l'avversario.\n Premi Z ripetutamente per sferrare i colpi.\n", + /*108*/ "Ora prova contro un avversario in movimento...\n", + /*109*/ "E infine contro un avversario che contrattacca.\n", + /*110*/ "Sconfiggi tutti i nemici senza essere colpita.\n", + /*111*/ "Addestramento fallito: sei stata colpita!\n", + /*112*/ "Completato l'oloprogramma 6.\n", + /*113*/ "Completato l'oloprogramma 7.\n", + /*114*/ "TERMINALI\n- Premi B vicino al terminale per usarlo.\n", + /*115*/ "Ora attiva il terminale rosso alla parete.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bene, Jo, ora preparati per la missione!\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Umano (femmina)\n", + /*127*/ "23 anni 2 mesi\n", + /*128*/ "|File CI nー027 -\n\nStadio addestramento: Completo\nGrado addestramento: A++\nStato attivo: Assegnato\n\n|Profilo -\n\nAddestramento avanzato ma inesperta. Reazione eccellente. Abilissima con svariate armi. Agente molto competente e versatile. Massimo punteggio di addestramento registrato nella creazione di un nuovo grado di formazione. Incarna l'agente ideale del Carrington Institute, da cui il nome 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Umano (maschio)\n", + /*131*/ "28 anni 5 mesi\n", + /*132*/ "|File CI nー009 -\n\nStadio addestramento: Completo\nGrado addestramento: A+\nStato attivo: Segreto\n\n|Profilo -\n\nIl nostro agente segreto pi capace. Molto preciso con la sua arma preferita (Magnum Revolver). Perfetto per le missioni in incognito. Meno adatto alla lotta aperta. Prima di Joanna Dark, deteneva il punteggio pi alto nell'addestramento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Umano (maschio)\n", + /*135*/ "62 anni 8 mesi\n", + /*136*/ "|File CI nー000 -\n\nStadio addestramento: N/D\nGrado addestramento: N/D\nStato attivo: N/D\n\n|Profilo -\n\nIntelligente scienziato/imprenditore e fondatore del Carrington Institute. Pianifica tutte le missioni che affida ai suoi agenti e esegue ogni operazione dal computer del suo ufficio. Strano gusto in fatto di abbigliamento.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Umano (femmina)\n", + /*139*/ "39 anni ? mesi\n", + /*140*/ "|Scheda psicanalitica -\n\nLa mente della dataDyne Corp. Assetata di potere, detesta non essere il capo. Odia perdere il comando. ネ senza scrupoli e pronta a tutto pur di vincere la sua battaglia contro Daniel Carrington, che disprezza con tutte le sue forze.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Umano (maschio)\n", + /*143*/ "46 anni ? mesi\n", + /*144*/ "|Scheda psicanalitica -\n\nCapo del National Security Agency, legato a Cassandra De Vries da una strana amicizia, che sembra pi che altro un'alleanza d'interesse. Tende a fare tutto ci che dice Cassandra, forse perch, pur avendo una forte personalit, non basta a sovrastarla. Riferimento per molte teste calde dell'NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Il Sapiente Caroll (AI)\n", + /*147*/ "6 mesi\n", + /*148*/ "|Profilo -\n\nUn'intelligenza artificiale creata dalla dataDyne Corp. con spiccate abilit linguistiche e di lettura codici. Fortunatamente ha principi morali e, grazie al suo formidabile livello di intelligenza, ha fiutato alcuni piani futuri della dataDyne. Dispone di propriet di linguaggio e di stile, tanto da sembrare un docente universitario.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (maschio)\n", + /*151*/ "320 anni\n", + /*152*/ "|Profilo -\n\nUn alieno della razza Maian. ネ il 'difensore' (guardia del corpo) dell'ambasciatore Maian invitato sulla Terra da Daniel Carrington. I difensori sono addestrati per l'uso preciso di una vasta gamma di armi. Elvis un terrafilo: per lui il mondo terrestre incredibilmente affascinante.\n", + /*153*/ "Mr Blonde\n", + /*154*/ "Umano (maschio)\n", + /*155*/ "Va per i 30\n", + /*156*/ "|Profilo -\n\nUn umano maschio con capelli biondissimi. Molto alto, sempre vestito di bianco, porta spesso un impermeabile. Sembra che orchestri il complotto in cui sono coinvolti Cassandra e Trent. Di lui non si sa altro.\n", + /*157*/ "Mr Blonde\n", + /*158*/ "Skedar (in incognito)\n", + /*159*/ "Sconosciuta\n", + /*160*/ "|Profilo Aggiornato -\n\nSi tratta di un guerriero Skedar che si aggira entro la proiezione olografica di un uomo biondissimo sui 30 anni. Il dispositivo di modulazione orale gli conferisce un tono di voce chiaro, piacevole e convincente. ネ un subdolo mezzo di propaganda per gli Skedar.\n", + /*161*/ "Il Presidente degli USA\n", + /*162*/ "Umano (maschio)\n", + /*163*/ "50 anni\n", + /*164*/ "|Profilo -\n\nUn afro-americano istruito e astuto che cerca di fare la cosa giusta ma attorniato da gente come Trent Easton. Dopo aver respinto la richiesta di prestito del Pelagic II avanzata dalla dataDyne, crede di avere Trent sotto controllo. La maggioranza dei commentatori politici lo ritiene facilmente influenzabile, giudizio forse azzardato.\n", + /*165*/ "I Maian\n", + /*166*/ "I Maian sono la razza di alieni noti sulla Terra come i 'Grigi'. Hanno studiato la Terra molto a lungo, per svariati secoli, e sono bendisposti verso gli umani, comprendendone il grande potenziale. Il loro contatto sulla Terra Daniel Carrington, per manca ancora un contatto politico formale.\n", + /*167*/ "Guerriero Skedar\n", + /*168*/ "Gli Skedar sono una razza aliena bellicosa, da sempre in lotta contro i Maian. Solo di recente hanno firmato un armistizio. Lottano e si muovono in enormi armature meccanizzate, poich non sono altro che piccole creature simili ai rettili. Sono molto aggressivi: hanno fatto della guerra la loro religione... e sono molto devoti.\n", + /*169*/ "Situazione\n", + /*170*/ "Milioni di anni fa un'enorme e potente nave aliena si inabiss nell'Oceano Pacifico. Era dotata di un'arma molto pericolosa, ma ancora sconosciuta, in grado di rompere i legami nucleari che tengono assieme le molecole. Affinch possibili occhi indiscreti credessero che la nave fosse andata distrutta, fu diffuso nella galassia da cui era partita un apposito messaggio e vari componenti del sistema di propulsione furono distrutti proprio nel sistema solare che era stato scelto come nascondiglio. In realt questa astronave era un Cetan, una creatura possente, vigile e aliena.\n\nUn'altra razza extraterrestre, i Maian, scoprirono la vita sulla terra nel 2000 a.C. Ne videro un enorme potenziale, ma decisero di lasciare che la primitiva razza umana si sviluppasse senza la loro intrusione.\n\nI Maian incontrarono gli Skedar vicino al Delta Eridano nel 1650 d.C. (data terrestre) e le schermaglie iniziali si trasformarono presto in una guerra sanguinosa. Solo dopo centinaia di anni di lotta si arriv ad una pace molto delicata che frange di Skedar continuavano a ledere con attacchi terroristici, a cui i Maian non capitolarono mai.\n\nMa anche l'umanit continuava ad essere una preoccupazione per i Maian che guardavano delusi come la Terra subisse continue crisi causate dall'avvento della tecnologia e da 'agenti estranei'. Temevano che annunciare la loro presenza potesse solo scatenare altre guerre sul pianeta e cos decisero di continuare pazientemente le loro osservazioni finch gli umani non si fossero dimostrati pi 'maturi'.\n\nDaniel Carrington fu sicuramente 'precoce' e nel 1985 d.C. contatt una nave Maian in orbita sopra la terra, proponendo un piano vantaggioso per tutti che avrebbe accelerato i contatti tra gli umani e i Maian. Ritenendo Carrington un uomo onesto, i Maian approvarono il suo piano e acconsentirono a che egli diffondesse la loro tecnologia tramite il suo rinomato Istituto di Ricerca e Sviluppo.\n\nMa nel 2006 d.C. alcuni estremisti Skedar rintracciarono l'antico messaggio Cetan. Cominciarono subito a perlustrare la Terra con minuzia e con ogni mezzo, rapendo persone e mutilando animali per arrivare a scoprire il luogo in cui era dispersa la nave da guerra. Col tempo riuscirono inevitabilmente a scovare il punto esatto in cui l'incrociatore riposava sul fondo del Pacifico, ma per raggiungerlo avrebbero avuto bisogno dell'aiuto degli umani.\n\nConducendo i loro studi sulla Terra, gli Skedar compilarono una lista di aziende con le risorse necessarie per il recupero della nave. Capolista era la dataDyne Corporation. Ne contattarono il presidente, Cassandra De Vries e le proposero un accordo troppo bello per essere vero, ed ovviamente non lo era. In cambio dell'aiuto per recuperare la 'loro' nave dal fondo dell'Oceano, gli Skedar promisero di cedere alla dataDyne tutta la tecnologia aliena necessaria per diventare la pi grande azienda sul pianeta. La dataDyne doveva solo costruire un automa con abilit linguistiche e di decodifica... compito sospetto, ma di sicuro alla loro altezza. I lavori cominciarono immediatamente.\n\nCassandra De Vries rifer i dettagli del piano a Trent Easton, direttore dell'NSA, che cerc invano di ottenere l'approvazione del Presidente al prestito di un sottomarino per ricerche sul fondo oceanico. N gli Skedar n la dataDyne avrebbero potuto rubare il sommergibile senza scatenare la furia del governo USA, quindi elaborarono un piano ben pi sinistro per la sostituzione del Presidente con un clone che solo loro potessero controllare. Una volta consegnata alla storia l'operazione Skedar, Trent e Cassandra sarebbero stati ovviamente ricompensati di tanto rischio.\n\nMa non avrebbero avuto molto tempo per esultare. Il piano finale degli estremisti Skedar era di sperimentare il separatore molecolare sulla Terra prima di eliminare i Maian, e n Cassandra n Trent si accorsero della trappola, accecati com'erano dalla brama di potere e successo.\n\nMa la dataDyne aveva creato inconsapevolmente qualcosa che poteva ben capire il pericolo di questa intricata cospirazione: l'automa Sapiente costruito per infrangere il codice di accesso alla nave Cetan. Quando questo rivel le sue preoccupazioni sulla missione per cui era progettato, Cassandra ordin di manipolargli il cervello togliendogli cos la personalit. Pensava decisamente troppo... Disperato, il Sapiente decise di reagire ai complotti della dataDyne e degli Skedar, e con una mossa coraggiosa adott lo pseudomino di Dr. Caroll e contatt il Carrington Institute chiedendo aiuto...\n", + /*171*/ "La storia\n", + /*172*/ "L'inesperta agente Joanna Dark incaricata di una missione consistente nel prelevare uno scienziato dall'area ad alta sicurezza nei sotterranei della dataDyne. Quando trova il Dr. Caroll rimane sorpresa nello scoprire che si tratta di un automa creato dalla dataDyne, tuttavia resta fedele al suo incarico di portarlo al sicuro. Durante l'operazione scatta l'allarme e Joanna deve farsi strada per raggiungere sul tetto l'eliporto e la navetta di salvataggio, le uniche vie di scampo.\n\nIn risposta a questa incursione, due giorni dopo la dataDyne prende in ostaggio Daniel Carrington nella sua villa; in cambio della sua vita vogliono la restituzione dell'automa di loro 'propriet'. A loro insaputa l'automa si trova gi nella villa dove Carrington lo stava interrogando sui piani futuri della dataDyne. Joanna riesce a salvare il capo dell'istituto, ma non pu impedire che la dataDyne si riprenda il Dr. Caroll. Tuttavia, Carrington ha scoperto abbastanza da decidere di richiedere l'intervento di una squadra di specialisti Maian sulla Terra.\n\nJoanna inviata a Chicago per spiare una riunione di cospiratori nell'edificio G5, una copertura della dataDyne Corporation. Qui scopre che anche Trent Easton, direttore dell'NSA, coinvolto nella faccenda, assieme ad alcuni Scandinavi che sembrano avere il controllo della losca situazione. Quando Trent rivela il piano per il rapimento del Presidente, Joanna comunica la notizia alla base, ma scopre che un altro compito pi urgente richiede il suo intervento, prima dell'affare Trent.\n\nGli specialisti Maian sono stati intercettati e abbattuti dai cospiratori, che hanno trasportato rottami e sopravvissuti presso l'Area 51 in Nevada. Dopo essere stata istruita su come recuperare i superstiti e le loro attrezzature, a Joanna viene affiancato un altro agente del Carrington Institute. Quando irrompe nel laboratorio, Joanna riesce a scoprire il segreto dell'istituto: i loro alleati sono i Maian, la razza aliena nota come i Grigi. Il Maian che riesce a salvare si chiama Elvis, era la guardia del corpo dell'ambasciatore Maian che era stato inviato sulla Terra come capo della squadra di specialisti.\n\nDopo aver aiutato i superstiti della delegazione Maian, Joanna pu tornare a occuparsi del Presidente e dei piani della dataDyne contro di lui. Fingendo di essere un membro dell'entourage del Presidente, riesce ad accedere alla base aerea dove staziona l'Air Force One e addirittura ad imbarcarsi. Dopo il decollo, Trent e uno Skedar in incognito entrano in azione, ma Joanna l per fermarli. Porta il Presidente su una capsula di sicurezza, mentre una squadra degli uomini di Trent saccheggia l'aereo e trasborda i politici sull'UFO Skedar che si era agganciato all'Air Force One tramite un cordone ombelicale. Joanna danneggia il cordone ma non riesce a romperlo, allora Elvis fa un ultimo tentativo per distruggerlo lanciadovisi contro ad alta velocit. I tre velivoli precipitano in una regione sperduta dell'Alaska e dall'Air Force One viene lanciata la capsula di salvataggio.\n\nIn seguito Joanna cerca di ristabilire i contatti con l'istituto, ma gli Skedar riescono ad impedire le comunicazioni. Cos si incammina tra la neve alla ricerca del Presidente e di Elvis, e incontra squadre di Skedar in incognito in cerca di lei, di Elvis e del Presidente. Decide di seguire un gruppo di Skedar fino alla navicella Skedar affondata e qui scopre il clone del Presidente: riesce a distruggerlo velocemente e a disattivare il dispositivo di disturbo delle comunicazioni, infine chiama i rinforzi. Il Presidente salvo, gli Skedar hanno fallito e ora Trent dovr pagare cara la sua incompetenza.\n\nMa non finita. Ignorando qualsiasi cautela, la dataDyne e gli Skedar rubano il 'Pelagic II', il sottomarino di ricerca del Governo, e si dirigono nel punto in cui affond la nave Cetan. Joanna e Elvis devono intralciare l'attivit a bordo e cos scoprono il vero senso del piano Skedar. Dopo aver paralizzato le operazioni di immersione e fatto rientrare i sommergibili, raggiungono il fondo dell'oceano dove scoprono l'incrociatore Cetan affondato. Un varco realizzato dagli Skedar li fa entrare nella nave dove inciampano nel cadavere di un guerriero Skedar... la squadra d'assalto non deve averla passata liscia. Eliminando gli aggressivi Skedar superstiti e sfuggendo ai Cetan, Joanna e Elvis arrivano al centro della nave, dove trovano l'automa una volta noto come Dr. Caroll. Dopo che sono riusciti a ristabilire la sua personalit, l'automa li convince ad abbandonare la nave in modo che lui possa distruggerla una volta per tutte.\n\nRientrati al Carrington Institute, Joanna si appresta ad andare alla Casa Bianca per il ricevimento presidenziale quando scoppia l'inferno. I superstiti dello squadrone d'assalto Skedar si vogliono vendicare dando la caccia ai responsabili del loro fallimento nel recupero della nave Cetan. Joanna aiuta i dipendenti dell'istituto a mettersi in salvo negli hangar, mentre gli Skedar sferrano attacchi in vari punti dell'istituto: la maggioranza dei dipendenti riesce a salvarsi, ma alla fine Joanna viene stordita e fatta prigioniera.\n\nSi ritrova in una cella a bordo della nave Skedar assieme a Cassandra De Vries. In un momento drammatico, il presidente della dataDyne offre volontariamente la sua vita per creare lo scompiglio che sar necessario a Joanna per fuggire. Facendosi strada nella nave, Joanna riesce a trovare e disattivare gli scudi anti-attracco consentendo a Elvis di portare alcuni amici per la tanto attesa sparatoria.\n\nLa nave d'assalto catturata entra nell'orbita sopra il Tempio di Guerra Skedar, con grande sorpresa di Elvis poich i Maian non sono mai riusciti a trovare questo 'luogo sacro' in tutti gli anni di guerra interraziale. Distruggere il Tempio significherebbe infliggere un duro colpo agli Skedar e la pace duratura sostituirebbe l'instabile tregua. Cos Joanna si concentra sul leader Skedar, il sacerdote a capo del Tempio, mentre Elvis torna alla nave d'assalto per organizzare le flotte Maian.\n\nDopo la furiosa battaglia, del Tempio non rimane che una rovina e Elvis interrompe il bombardamento per cercare Joanna. ネ viva ma tenuta in trappola sotto le macerie dagli ultimi tenaci Skedar comparsi all'ultimo momento, proprio mentre stava scappando. Elvis le passa un'arma per convincere gli Skedar a lasciarla andare e, a lavoro completato, con il Tempio Skedar raso al suolo, i due eroi possono finalmente rientrare in orbita. La razza Skedar giunta al capolinea: il morale sotto i piedi e il complotto mandato in fumo per sempre.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "L'azienda monolitica che oggi la dataDyne era stata originariamente creata come impresa di programmazione di sistemi di intelligenza artificiale. Tuttavia, quando emerse che la maggior parte dei profitti scaturiva dalla sua opera di difesa per conto della macchina militare statunitense, un manager giovane e intraprendente di nome Cassandra De Vries inizi a stringere accordi con produttori di armi, ignorando le offerte di collaborazione di Daniel Carrington e del suo istituto per condurre una ricerca congiunta relativa al computo dei quanti e all'intelligenza artificiale. Dopo la fusione con la terza azienda produttrice di armi, i profitti del gruppo andarono alle stelle. Nel giro di un mese la dataDyne ottenne un appalto governativo per lo sviluppo di nuove armi sotto la guida di Cassandra De Vries. Una buona parte dei profitti del gruppo furono reinvestiti nella ricerca relativa all'intelligenza artificiale con risultati sorprendenti.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Deriso e considerato un inventore bizzarro, Daniel Carrington fu il primo a divulgare le tecnologia antigravitazionale. Con i proventi ottenuti da questa invenzione e altri sviluppi fond il Carrington Institute, una fucina tecnologica situata in una sperduta localit degli USA. L'istituto anche il campo di addestramento per la formazione di agenti la cui missione girare il mondo per tenere sotto controllo lo sviluppo tecnologico, per ragioni ben note a Daniel Carrington.\n", + /*177*/ "Description\n- Una minuscola telecamera per esplorazioni clandestine e l'olografia spettroscopica. Apre le porte emettendo impulsi di calore.\n\nIstruzioni di addestramento\n- Olografa il terminale hacker nella sala informatica a fianco.\n\nFunzionamento\n- Premi Z per l'olografia. Premi B per aprire le porte. Tieni premuto R per guardarti intorno.\n", + /*178*/ "Descrizione\n- Migliora la qualit della luce presente per visualizzare l'area circostante. Rileva le fonti di vita. Sovraccarica in condizioni di luce normale, 'annebbiando' il display.\n\nIstruzioni di addestramento\n- - Procedi al buio, trova l'interruttore e attivalo per riaccendere la luce.\n\nFunzionamento\n- Seleziona Vista Notturna dall'inventario per attivarla. Riselezionala per disattivarla.\n", + /*179*/ "Descrizione\n\n- Sistema indipendente di decodifica. Si applica al quadro comandi e esegue tutte le combinazioni finch non trova quella esatta.\n\nIstruzioni di addestramento\n- Trova la porta chiusa e usa il decodificatore per aprirla.\n\nFunzionamento\n- Stai vicino alla porta e premi B mentre tieni il decodificatore.\n", + /*180*/ "Descrizione\n\n- Usato per guardare attraverso le pareti e gli oggetti. ネ pi potente della Vista Notturna e dello scanner a infrarossi.\n\nIstruzioni di addestramento\n- Con lo scanner a raggi X cerca i due interruttori nascosti e attivali per disattivare le griglie laser.\n\nFunzionamento\n- Seleziona lo scanner a raggi X dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*181*/ "Descrizione\n\n- Il travestimento serve per non destare sospetti, ma fa comunque attenzione a non farti scoprire da qualche nemico perspicace.\n\nIstruzioni di addestramento\n- Grimshaw ha un dispositivo mimetico pronto per essere usato. Vai alla porta accanto e 'compralo' da lui.\n\nFunzionamento\n- Per indossare il travestimento, selezionalo dall'inventario.\n", + /*182*/ "Descrizione\n\n- Trasforma i dati termici in immagini visibili. Pu essere usato al buio e rileva anomalie come porte nascoste e pareti sottili.\n\nIstruzioni di addestramento\n- Accendi lo scanner a infrarossi, trova la porta nascosta e aprila.\n\nFunzionamento\n- Seleziona lo scanner a infrarossi dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*183*/ "Descrizione\n- Localizza un oggetto specifico su una mappa radar HUD, mostrandone le dimensioni e la distanza.\n\nIstruzioni di addestramento\n- Attiva il Puntatore e segui il segno del radar per trovare l'oggetto.\n\nFunzionamento\n- Seleziona il Puntatore dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*184*/ "Descrizione\n- Distorce lo spettro visibile della luce attorno a chi lo indossa, creando un effetto camaleontico. Il campo si infrange quando chi lo indossa spara.\n\nIstruzioni di addestramento\n- Attiva il dispositivo mimetico e entra nell'ufficio di Carrington per sorprenderlo!\n\nFunzionamento\n- Seleziona il dispositivo mimetico dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*185*/ "Descrizione\n- Emette un segnale in continuo movimento studiato per mandare in tilt i dispositivi elettronici di comunicazione. Funziona solo se posto sull'oggetto.\n\nIstruzioni di addestramento\n- Lancia la mina ECM sulla centralina luce dalla porta segreta.\n\nFunzionamento\n- Premi Z per lanciare la mina. Tieni premuto R e muovi il Control Stick per mirare bene prima del lancio.\n", + /*186*/ "Descrizione\n- Crea un collegamento tra l'agente in missione e gli hacker dell'Istituto in sede,che possono cos scaricare i dati o decodificare codici elettronici a distanza.\n\nIstruzioni di addestramento\n- Usa il Connettore Dati per accedere al terminale nell'angolo e aprire una porta segreta.\n\nFunzionamento\n- Vai vicino al terminale e premi B tenendo il Connettore Dati.\n", + /*187*/ "SPARO\n Premi Z per far fuoco.\n", + /*188*/ "AUTORICARICA\n Rilascia Z quando non hai pi munizioni.\n", + /*189*/ "RICARICA MANUALE\n Premi B per ricaricare prima di rimanere a secco.\n", + /*190*/ "MIRA: Tieni premuto R per accedere alla modalit Mira.\n", + /*191*/ "Usa il Control Stick per spostare la visuale di mira.\n", + /*192*/ "AUTOFUOCO\n Premi Z per fuoco continuo automatico.\n", + /*193*/ "CAMBIA MIRA\n Premi C in alto o in basso per spostare la visuale in alto o in basso.\n", + /*194*/ "ZOOM\n Tieni premuto R per avviare la modalit Zoom.\n", + /*195*/ "FUOCO RAPIDO\n Premi Z velocemente per spari rapidi.\n", + /*196*/ "Carrington Institute\0|Base operativa\n", + /*197*/ "Lucerne Tower\0|Quartier Generale Globale\n", + /*198*/ "Laboratorio sotterraneo\0|Centri di ricerca sotterranei\n", + /*199*/ "Villa Carrington\0|Residenza privata sulla costa\n", + /*200*/ "Chicago\0|Sobborghi delle citt濬n", + /*201*/ "Edificio G5\0|Sede della dataDyne\n", + /*202*/ "Area 51\0|Vicino al Groom Dry Lake, Nevada\n", + /*203*/ "Base aerea in Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'aereo presidenziale\n", + /*205*/ "Luogo del disastro\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Sottomarino per ricerche oceaniche\n", + /*207*/ "Astronave Cetan\0|Segno degli alieni sulla Terra\n", + /*208*/ "Nave d'assalto Skedar\0|Astronave per trasporto truppe\n", + /*209*/ "Patria Skedar\0|Il pianeta del Tempio di Guerra\n", + /*210*/ "Navetta\0|Agile navicella per il trasporto truppe\n", + /*211*/ "Antigravit濬0|Dispositivo antigravit濬n", + /*212*/ "Aeromoto\0|Veicolo per spostamenti a bassa quota\n", + /*213*/ "PuliRobot\0|Il tuo fedele amico\n", + /*214*/ "Cannoniera\0|Cannoniera urbana AG\n", + /*215*/ "Robot G5\0|Droide da combattimento urbano\n", + /*216*/ "Intercettatore A51\0|Robot intercettatore aereo\n", + /*217*/ "Vascello Maian\0|Vascello di esplorazione e perlustrazione\n", + /*218*/ "Navetta Skedar\0|Navicella aliena per trasporto truppe\n", + /*219*/ "L'edificio dell'istituto comprende svariate aree: uffici e laboratori, aule e hangar. ネ piuttosto isolato dall'ambiente esterno per garantire il massimo della segretezza.\n", + /*220*/ "Nel bel mezzo del quartiere finanziario si erge il cupo grattacielo della dataDyne Corporation.\n", + /*221*/ "Questi laboratori ben protetti e nascosti conservano la chiave del futuro della dataDyne. Qui dentro alcuni ingegneri lavorano a progetti segreti mirati a garantire la supremazia della dataDyne.\n", + /*222*/ "Di propriet dell'istituto, questa residenza appartata usata da Daniel Carrington per sfuggire dallo stress del lavoro. Oltre ad un osservatorio dispone di generatore elettrico e di una cantina ben fornita.\n", + /*223*/ "Un quartiere piuttosto fatiscente di Chicago, immerso nel traffico. Qui si trova la sede della G5 Corporation.\n", + /*224*/ "L'edificio G5 dispone di una sala riunioni segreta protetta contro registrazioni illecite. Questo il luogo ideale per le cospirazioni e i piani segreti della dataDyne.\n", + /*225*/ "Questa parte del grande complesso noto come Area 51 si trova ai piedi dei colli attorno al lago Groom Dry. Eliscali e torri di comunicazione esterni danno un'idea dell'estensione del complesso sottoterra.\n", + /*226*/ "Una delle tante basi aeree disponibili per lo stazionamento dell'Air Force One. Solitamente la base aerea si trova sperduta in una regione inospitale, al sicuro da sguardi indiscreti.\n", + /*227*/ "Quest'Air Force One particolarmente adatto ai climi freddi, come quelli dell'Alaska del Nord. La destinazione di volo Oslo, Norvegia.\n", + /*228*/ "I rottami dell'aereo colpito sono finiti nel paesaggio roccioso innevato del Circolo Polare Artico.\n", + /*229*/ "Di propriet del governo USA, il Pelagic II pu condurre operazioni subacquee in alto mare in ogni condizione climatica. ネ l'unico sommergibile al mondo per la ricerca sul fondo oceanico.\n", + /*230*/ "Un'enorme nave di costruzione aliena che riposa da milioni di anni sul fondo oceanico.\n", + /*231*/ "Una nave d'assalto interplanetaria che trasporta guerrieri Skedar verso le zone di guerra. Fa parte dell'ormai ridotta flotta Skedar.\n", + /*232*/ "Un pianeta molto arido, sconvolto da terremoti, tempeste di sabbia e uragani. Fa parte di un sistema solare complesso comprendente tre soli.\n", + /*233*/ "Una navetta da trasporto piccola, veloce e facile da manovrare, progettata per l'uso in aree urbane. Pu essere comandata dal computer o pilotata a distanza. Pu trasportare tre o quattro agenti con l'attrezzatura.\n", + /*234*/ "Un dispositivo antigravit usato dai magazzinieri. ネ applicato al lato della cassa da imballaggio. Quando attivo, il campo AG innalza la cassa ed elimina parte dell'inerzia.\n", + /*235*/ "Una moto da perlustrazione a bassa quota. Si libra grazie alla piccola unit antigrevit, ma ha un potente motore per gli spostamenti rapidi direzionali.\n", + /*236*/ "Mette in ordine e pulisce. Ha accesso a tutte le aree di un edificio: gli agenti possono avvalersi dell'aiuto di questi robot perch possono facilitare involontariamente l'ingresso a zone riservate.\n", + /*237*/ "Un veicolo di soppressione e perlustrazione urbana: con equipaggio di due persone, armato di cannone sulla punta e di due missili sulle ali. Pu essere eliminato con raffiche di spari o un missile ben mirato.\n", + /*238*/ "Un robot da combattimento urbano. Utilizza un'unit antigravit per librarsi; ben armato e schermato. Spesso usato per tenere alla larga i curiosi grazie alla programmazione 'zitto e spara'.\n", + /*239*/ "Versione motorizzata dell'Aeromoto, con dispositivi AG e turbina pi potenti; pu facilmente raggiungere Mach 2 e ha un'autonomia di molte ore se procede a velocit ridotta. Anche se ben armato il suo punto forte la manovrablit.\n", + /*240*/ "Progettato per il trasporto del solo pilota Maian. Un passeggero ci starebbe stretto, soprattutto se fosse umano.\n", + /*241*/ "Pu portare al campo di battaglia dieci guerrieri Skedar armati fino ai denti. Sfugge ai radar tradizionali. Pu trasmettere potenti onde di disturbo su una vasta area mandando in tilt comunicazioni e apparecchi radar.\n", + /*242*/ "Descrizione\n- Un buon agente nota tutto ci che lo circonda.\n\nIstruzioni di addestramento\n- Esamina tutti gli oggetti guardandoli direttamente.\n\nFunzionamento\n- Guardare su: pulsante C in basso\n- Guardare gi: pulsante C in alto\n- Guardare attorno: pulsante R per attivare la mira e Control Stick.\n", + /*243*/ "Descrizione\n- Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n\nIstruzioni di addestramento\n- Attiva tutti gli interruttori anteriori ma fai presto perch si disattivano a tempo.\n\nFunzionamento\n- Passo a sinistra: pulsante C a sinistra\n- Passo a destra: pulsante C a destra\n\n", + /*244*/ "Descrizione\n- Accucciandoti e strisciando potrai rilevare nuove aree da esplorare.\n\nIstruzioni di addestramento\n- Fatti strada tra gli ostacoli usando le mosse disponibili. Attiva gli interruttori.\n\nFunzionamento\n- Accucciarsi: pulsante R e poi pulsante C verso il basso.\n- Strisciare: quando sei accucciato, pulsante R e poi C verso il basso.\n- Alzarsi: pulsante R.\n\n", + /*245*/ "Descrizione\n- Lottare a mani nude contro pi avversari pu essere difficile.\n\nIstruzioni di addestramento\n- Metti KO tutti i nemici senza farti colpire.\n\nFunzionamento\n- Pugno: premi Z pi volte da disarmato per lanciare una scarica di pugni.\n\n", + /*246*/ "Descrizione\n- Disarmando un nemico potrai impossessarti della sua arma.\n\nIstruzioni di addestramento\n- Metti KO/disarma tutti i nemici senza essere colpito.\n\nFunzionamento\n- Disarmare: tieni premuto B e poi premi Z per disarmare il nemico.\nPugno KO: colpisci il nemico alle spalle.\n", + /*247*/ "Descrizione\n- Lottare a mani nude contro pi nemici.\n\nIstruzioni di addestramento\n- Batti tutti i nemici disarmati senza essere colpito.\n\n", + /*248*/ "Descrizione\n- Lottare contro pi nemici, sia armati che disarmati.\n\nIstruzioni di addestramento\n- Batti tutti i nemici armati senza essere colpito.\n\n", + /*249*/ "Per una maggiore precisione e libert quando ti guardi attorno, usa la modalit Mira.\n", + /*250*/ "Pensa a dove vuoi andare prima di effettuare la prova. Poniti in un punto dove dovrai spostarti il meno possibile tra gli obiettivi.\n", + /*251*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai pi veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando necessario.\n", + /*252*/ "Attaccare gli avversari alle spalle pu essere scorretto, ma cos sar pi facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*253*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*254*/ "Non stare l a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*255*/ "Quando sei sicuro delle tue abilit di lotta a mani nude, va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*256*/ "Per una maggiore precisione e libert quando ti guardi attorno, usa la modalit Mira.\n", + /*257*/ "Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n", + /*258*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai pi veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando necessario.\n", + /*259*/ "Attaccare gli avversari alle spalle pu essere scorretto, ma cos sar pi facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*260*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*261*/ "Non stare l a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*262*/ "Quando sei sicuro delle tue abilit di lotta a amni nude va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*263*/ "Tieni sempre d'occhio l'obiettivo quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*264*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il pi possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalit Mira.\n", + /*265*/ "La TeleSpia pu essere difficile da controllare, abbi pazienza.\n", + /*266*/ "Utile nel combattimento, ma pu causare problemi per sovraccarico.\n", + /*267*/ "Se hai problemi ad attaccare il decodificatore, prova a stare pi vicino all'obiettivo.\n", + /*268*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ci che ti circonda e preparati ad esplorare.\n", + /*269*/ "La visiera riduce il campo visivo e ci pu essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*270*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perch pu impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*271*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*272*/ "Usa i dispositivi mimetici quando non c' nessuno che possa vederti.\n", + /*273*/ "Tieni sempre d'occhio il target quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*274*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il pi possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalit Mira.\n", + /*275*/ "La TeleSpia non invisibile, i nemici potrebbero scoprirla: attento quando entri in un'area abitata. Ricorda che la TeleSpia rimarr nel punto dove l'hai lasciata a meno che tu la riprenda.\n", + /*276*/ "Utile nel combattiemto, ma pu causare problemi per sovraccarico. Evita questo inconveniente e reagisci prima del nemico.\n", + /*277*/ "Se hai problemi ad attaccare il decodificatore, prova a stare pi vicino all'obiettivo.\n", + /*278*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ci che ti circonda e preparati ad esplorare.\n", + /*279*/ "La visiera riduce il campo visivo e ci pu essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*280*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perch pu impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*281*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*282*/ "Usa i dispositivi mimetici quando non c' nessuno che possa vederti. Evita di sparare se non strettamente necessario finch non sei sicuro della riuscita del tuo attacco.\n", + /*283*/ "La Falcon 2 una pistola molto precisa: qualsiasi errore dipende da te. La modalit secondaria la botta col calcio, inutile nel poligono.\n", + /*284*/ "Per sfruttare al meglio la precisione della Falcon 2, essa dotata di un cannocchiale. Come per la Falcon 2 non modificata, la modalit secondaria inutile durante la prova al poligono.\n", + /*285*/ "La versione della Falcon 2 con silenziatore eccezionale per azioni in incognito e per cogliere l'avversario di sorpresa. Assicurati della tua precisione per non rischiare di sprecare l'occasione.\n", + /*286*/ "La Magsec 4 dotata di un'eccezionale potenza di sparo ma non troppo precisa, soprattuto se usata nella modalit secondaria a tre esplosioni. Il vero svantaggio dell'arma il caricatore ridotto.\n", + /*287*/ "ネ una tipica arma Skedar, potente e brutale. Sacrificando parte del caricatore, il colpo pu essere caricato in modo da essere devastante. La carica di munizioni superiore un bonus.\n", + /*288*/ "Questa versatile pistola ha due sistemi di sparo: uno standard e uno esplosivo. Gli ingegneri Maian sono riusciti a realizzarla contenendo il consumo di energia dell'arma, sebbene la gittata sia ridotta.\n", + /*289*/ "Con la DY357 bisogna sapere quando ricaricare: un caricatore a sei colpi ti fa stare sempre all'erta quando fai fuoco. Il peso della pistola pu essere un vantaggio se si deve stendere qualcuno.\n", + /*290*/ "Trent Easton cerca sempre quel qualcosa in pi e questa pistola non fa eccezione. Persino le pallottole sono speciali; sono progettate per frammentarsi nell'avversario ed eliminarlo velocemente.\n", + /*291*/ "Un fucile mitragliatore affidabile e efficace: facile capire perch sia il modello pi venduto della dataDyne, anche se non prevista la modalit secondaria. Il sistema di designazione e puntamento eccellente e vale la pena di imparare il funzionamento completo dell'arma.\n", + /*292*/ "Il fucile mitragliatore Ciclone non stato progettato come arma di precisione, anche se vale la pena fare pratica. Pu sparare molte pallottole in poco tempo ed quindi un'eccellente arma di soppressione.\n", + /*293*/ "La flessibilit Maian nel design ha prodotto questo fucile mitragliatore con un'interessante modalit secondaria: una pallottola superveloce ad alta penetrazione. Come per la Phoenix, la velocit di fuoco ridotta nella modalit secondaria, per evitare danni al meccanismo di sparo e alla canna.\n", + /*294*/ "La RC-P120 spara una speciale pallottola minerale che, assieme all'alta velocit e al notevole caricatore, ne fa uno strumento perfetto da usare contro gli Skedar, se necessario. Le pallottole possono essere usate per alimentare un prototipo di dispositivo mimetico: l'addestramento stato adeguarsi a tale caratteristica.\n", + /*295*/ "La pistola si chiude in modo da sembrare un laptop e pu essere usata come sentinella in modalit secondaria per coprire una via d'uscita o proteggere un luogo.\n", + /*296*/ "Questo il modello che la dataDyne ha fornito all'esercito USA, anche se non ancora stato adottato ufficialmente. Poich la dataDyne riserva sempre brutte sorprese, il fucile d'assalto di base dispone di una mina di prossimit sotto la canna. Usare la modalit secondaria significa dover poi buttar via l'arma.\n", + /*297*/ "Per quanto se ne sa, la modalit secondaria dell'arma sembra essere un rilevatore di minacce, mine guidate, esplosivi nascosti (tipo la Dragon nella modalit secondaria)e pistole automatiche. Anche se potente, il caricatore del fucile d'assalto troppo piccolo.\n", + /*298*/ "Il primo tentativo dell'istituto di creare un'arma di supporto l'AR34, un semplice fucile d'assalto. La modalit secondaria uno zoom costante. Richiede un addestramento preciso.\n", + /*299*/ "La versione pi pesante della Dragon, con un piccolo lanciagranate al posto della mina di prossimit. Adottato dall'esercito USA come arma pesante di supporto e a ragione! Esercitati con la traiettoria delle granate.\n", + /*300*/ "La precisione d'uopo! Ci sono due modalit: esplosione singola o doppia. Il caricatore piuttosto capiente per un fucile a pompa, ma si devono considerare i lunghi tempi di ricarica.\n", + /*301*/ "Un fucile cecchino sofisticato, con silenziatore e zoom. L'unico elemento funzionale che riduce la precisione il cecchino. Usa la modalit secondaria per accucciarti e prendere la mira.\n", + /*302*/ "Pur essendo tecnologicamente molto avanzato le caratteristiche del fucile TeleVista sono lampanti. Il colpo inarrestabile e penetra nelle pareti in grande profondit, puntando e seguendo gli obiettivi se necessario.\n", + /*303*/ "La prima funzione della balestra un colpo narcotico non letale, mentre la seconda annienta all'istante. ネ un'arma per missioni in incognito e il caricamento richiede molto tempo, quindi non adatta in caso di fuoco serrato.\n", + /*304*/ "La pistola sedativo la stessa usata in molti ospedali e laboratori. Pu essere caricata sia con piccole quantit di sedativo sia con dosaggi letali. Il contenuto nel serbatoio cala a seconda del dosaggio.\n", + /*305*/ "Cerca di controllare quest'arma al meglio. ネ pensata per esseri pi forti degli umani, questo chiaro. Inginocchiarsi aiuta a prendere la mira, ma non ad aggiustarla. Se l'avversario si trova nella linea del fuoco, le canne possono essere usate come un macinatore.\n", + /*306*/ "Un prodotto recente della dataDyne dall'interessante tecnologia. La modalit secondaria attiva un campo magnetico attorno alla bomba, conferendo aderenza per un breve periodo, dopo di che il campo svanisce e la bomba cade dal punto d'impatto esplodendo.\n", + /*307*/ "Un lanciamissili compatto riutilizzabile, si ricarica dopo ogni lancio. La modalit secondaria usa una variante del sistema di puntamento del fucile mitragliatore CMP150,con un solo bersaglio designato. Il missile viaggia a velocit ridotta mentre segue l'obiettivo: calcola bene i tempi!\n", + /*308*/ "Questo lanciamissili Skedar pu lanciare un missile non guidato o uno telecomandato. Forse gli Skedar hanno la loro soddisfazione quando la telecamera zooma sul bersaglio, ma un agente del Carrington Institute superiore a certe cose. Il missile guidato accelera automaticamente, ma pu essere rallentato per manovrarlo meglio. L'esplosione avviene a contatto o a comando.\n", + /*309*/ "Un pugnale da lotta temprato, bilanciato anche per il lancio. ネ necessario fare molta pratica per ottenere una traiettoria precisa della lama lanciata.\n", + /*310*/ "Il reparto sperimentazione armi ha realizzato questo laser da polso, a due raggi, piccolo ma efficace. La modalit primaria ha una gittata considerevole, la secondaria spara un raggio continuo, finch il grilletto premuto.\n", + /*311*/ "La granata antiuomo a frammentazione esplode dopo quattro secondi dall'attivazione. Per perfezionare l'ordigno stata aggiunta una modalit secondaria ping-pong. La granata salta da una parte all'altra fino ad esaurimento della carica o attivazione del rilevatore di prossimit.\n", + /*312*/ "Questa granata Maian crea il caos nei neuroni delle creature coscienti. Trovandoti nel raggio di esplosione ti si annebbier la vista e gli oggetti ti cadranno di mano. Pu essere fatta esplodere a impatto o per prossimit. Lanciala abbastanza lontano da te.\n", + /*313*/ "Ci vuole prudenza nell'uso di mine a orologeria, altrimenti il bersaglio pu sfuggire dal raggio di esplosione e inseguirti. Fai molta pratica prima di rischiare di compiere gravi errori sul campo. La modalit secondaria un rilevatore di minaccia come quello del fucile d'assalto K7 Vendetta.\n", + /*314*/ "Il segreto per un buon piazzamento della mina di prossimit metterla dove l'avversario non se l'aspetta. Se ti trovi all'estremit di destinazione della mina di prossimit, usa il rilevatore di minaccia della modalit secondaria per proteggerti. Pu sembrare una perdita di tempo, ma pu salvarti la vita.\n", + /*315*/ "L'ultimo modello delle mine a esplosione a distanza, sostanzialmente come le precedenti. La modalit primaria piazza la mina, mentre la secondaria d il comando di esplosione. Se non vedi la mina, dovrai cercare di calcolare a mente il tempo. \n", + /*316*/ "Olog. 1 - Guardati attorno\n", + /*317*/ "Olog. 2 - Movimento 1\n", + /*318*/ "Olog. 3 - Movimento 2\n", + /*319*/ "Olog. 4 - A mani nude 1\n", + /*320*/ "Olog. 5 - A mani nude 2\n", + /*321*/ "Olog. 6 - Lotta aperta 1\n", + /*322*/ "Olog. 7 - Lotta aperta 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_s.c b/src/files/lang/pal-final/dish_str_s.c new file mode 100644 index 000000000..f3721a697 --- /dev/null +++ b/src/files/lang/pal-final/dish_str_s.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Recoge la Visin Nocturna de la mesa para empezar.\n", + /* 9*/ "Activa la Visin Nocturna.\nLocaliza el interruptor de la luz.\nEnciende las luces.\n", + /* 10*/ "Recoge el Conector de Datos de la mesa para empezar.\n", + /* 11*/ "Sitate cerca de la terminal y usa el Conector.\n", + /* 12*/ "Necesitas sostener el Conector de Datos.\n", + /* 13*/ "Conexin establecida...\n", + /* 14*/ "La Terminal ha sido intervenida con 騙ito.\n", + /* 15*/ "Conexin perdida: demasiado lejos del PC.\n", + /* 16*/ "Recoge la Mina ECM de la mesa para empezar.\n", + /* 17*/ "Localiza el Puerto y con馗tale una Mina ECM.\n", + /* 18*/ "La Mina ECM ha sido colocada incorrectamente.\n", + /* 19*/ "La Mina ECM ha sido colocada correctamente.\n", + /* 20*/ "Recoge la C疥ara Espa de la mesa para empezar.\n", + /* 21*/ "Localiza la Sala del PC de Informacin y holografala.\n", + /* 22*/ "Sala del PC de Informacin holografada correctamente.\n", + /* 23*/ "Las luces han sido reactivadas.\n", + /* 24*/ "Recoge el Decodificador de Puertas de la mesa para empezar.\n", + /* 25*/ "Usa el Decodificador en la puerta para desbloquearla.\n", + /* 26*/ "Necesitas estar sujetando el Decodificador de Puertas.\n", + /* 27*/ "Decodificador colocado. Iniciando rutinas de 'crackeo'...\n", + /* 28*/ "Decodificacin completada. La puerta ha sido desbloqueada.\n", + /* 29*/ "Recoge el Rastreador de la mesa para empezar.\n", + /* 30*/ "Localiza el Esc疣er de Infrarrojos con el Rastreador.\n", + /* 31*/ "El Esc疣er de Infrarrojos ha sido localizado con 騙ito.\n", + /* 32*/ "Recoge el Esc疣er de Infrarrojos de la mesa para empezar.\n", + /* 33*/ "Localiza la puerta secreta usando el Esc疣er de Infrarrojos.\n", + /* 34*/ "La puerta secreta ha sido localizada con 騙ito.\n", + /* 35*/ "Recoge el Esc疣er de Rayos-X de la mesa para empezar.\n", + /* 36*/ "Encuentra los interruptores ocultos para apagar la rejilla l疽er.\n", + /* 37*/ "Todas las rejillas l疽er han sido desactivadas.\n", + /* 38*/ "Recoge el Disfraz de la mesa para empezar.\n", + /* 39*/ "Engaa a alguien para que te d el Dispositivo de Ocultacin.\n", + /* 40*/ "Dispositivo de Ocultacin recuperado con 騙ito.\n", + /* 41*/ "Rejilla L疽er 1 desactivada.\n", + /* 42*/ "Rejilla L疽er 2 desactivada.\n", + /* 43*/ "Estoy aqu para recoger el equipo.\n", + /* 44*/ "Vete, Joanna. 。No engaas a nadie!\n", + /* 45*/ "Aqu lo tienes. No lo dejes caer.\n", + /* 46*/ "El Dispositivo de Ocultacin ha sido asegurado con 騙ito.\n", + /* 47*/ "Se supone que debes usar el Disfraz, ソrecuerdas?\n", + /* 48*/ "Lo tienes que hacer bastante mejor, Joanna.\n", + /* 49*/ "Joanna, ソde dnde has salido?\n", + /* 50*/ "Has sido detectado por la c疥ara.\n", + /* 51*/ "Recoge el Dispositivo de Ocultacin de la mesa para empezar.\n", + /* 52*/ "Usa el Dispositivo de Ocultacin y localiza a Carrington.\n", + /* 53*/ "。Creo que podemos asegurar que tu entrenamiento\nha sido completado!\n", + /* 54*/ "Misin completada - 。Entrenamiento de Dispositivos pasado!\n", + /* 55*/ "Misin fallada: Has sido detectada.\n", + /* 56*/ "Elegir el Conector.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Conector de Datos y suelta el Botn A.\n", + /* 57*/ "Elegir la C疥ara Espa.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la C疥ara Espa y suelta el Botn A.\n", + /* 58*/ "Elegir la Visin Nocturna.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Visin Nocturna y suelta el Botn A.\n", + /* 59*/ "Elegir el Decodificador de Puertas.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Decodificador y suelta el Botn A.\n", + /* 60*/ "Elegir el Esc疣er de Rayos-X.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Esc疣er de Rayos-X y suelta el Botn A.\n", + /* 61*/ "Elegir el Disfraz.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Disfraz y suelta el Botn A.\n", + /* 62*/ "Elegir el Esc疣er de Infrarrojos.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Esc疣er de IR y suelta el Botn A.\n", + /* 63*/ "Elegir el Rastreador.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Rastreador y suelta el Botn A.\n", + /* 64*/ "Elegir el Dispositivo de Ocultacin.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Dispositivo y suelta el Botn A.\n", + /* 65*/ "Elegir la Mina ECM.\n- Mant駭 pulsado el Botn A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Mina ECM y suelta el Botn A.\n", + /* 66*/ "Joanna, por fin te encuentro.\n", + /* 67*/ "Ven conmigo.\nTe conducir a las salas de entrenamiento.\n", + /* 68*/ "El centro de informacin est tras esta puerta.\n", + /* 69*/ "Aqu tenemos el laboratorio de dispositivos.\n", + /* 70*/ "Esto conduce a la sala de entrenamiento de simulantes.\n", + /* 71*/ "ノste es el campo de tiro, Joanna.\n", + /* 72*/ "Este corredor conduce al hangar.\n", + /* 73*/ "ANTIGRAV\nPulsa el Botn B cerca del Antigrav para cogerlo...\n", + /* 74*/ "Cogiendo la caja, pulsa el Botn B para soltarla.\n", + /* 75*/ "AEROMOTO \nPulsa dos veces B cerca de una Aeromoto para subir.\n", + /* 76*/ "Pulsa dos veces B en la Aeromoto para bajar.\n", + /* 77*/ "ABRIENDO PUERTAS\nPulsa el Botn B cerca de una puerta para abrirla.\n", + /* 78*/ "El Botn B tambi駭 activar cualquier objeto cercano.\n", + /* 79*/ "ASCENSORES\nPulsa el Botn B cerca de la puerta\npara llamar al ascensor.\n", + /* 80*/ "No se puede salir cuando el entrenamiento est en marcha.\n", + /* 81*/ "Has obtenido el Cdigo Interruptor 1.\n", + /* 82*/ "Has obtenido el Cdigo Interruptor 2.\n", + /* 83*/ "Has obtenido el Cdigo Interruptor 3.\n", + /* 84*/ "Has obtenido el Cdigo Interruptor 4.\n", + /* 85*/ "MIRAR ARRIBA\n- Pulsa el Botn C Abajo para mirar hacia arriba.\n", + /* 86*/ "MIRAR ABAJO\n- Pulsa el Botn C Arriba para mirar hacia abajo.\n", + /* 87*/ "El Holoprograma 2 ha sido completado con 騙ito.\n", + /* 88*/ "El Holoprograma 4 ha sido completado con 騙ito.\n", + /* 89*/ "El Holoprograma 5 ha sido completado con 騙ito.\n", + /* 90*/ "El guarda ha sido desarmado con 騙ito.\n", + /* 91*/ "El guarda ha sido derribado con 騙ito.\n", + /* 92*/ "Desarma a este objetivo vivo si puedes.\n", + /* 93*/ "Derriba a este objetivo: ocultarse es la clave.\n", + /* 94*/ "Y el guarda final...\n", + /* 95*/ "AGACHARSE\n- Mant駭 el Botn R, entonces pulsa el Botn C Abajo para agacharte.\n", + /* 96*/ "ARRASTRARSE\n- Una vez agachado, mant駭 el Botn R, entonces pulsa el Botn C abajo para arrastrarte.\n", + /* 97*/ "El Holoprograma 3 ha sido completado con 騙ito.\n", + /* 98*/ "Activa todos los interruptores.\n", + /* 99*/ "Activa todos los interruptores del muro.\n- Date prisa, ya que se reinician r疳idamente.\n", + /*100*/ "Obt駭 los cdigos de acceso examinando los terminales. \n- Usa los cdigos en los terminales del muro.\n", + /*101*/ "El Cdigo 1 ha sido obtenido.\n", + /*102*/ "El Cdigo 2 ha sido obtenido.\n", + /*103*/ "El Cdigo 3 ha sido obtenido.\n", + /*104*/ "El Cdigo 4 ha sido obtenido.\n", + /*105*/ "Entrenamiento fallado: debes mirar al frente.\n", + /*106*/ "El Holoprograma 1 ha sido completado con 騙ito.\n", + /*107*/ "Combate sin armas: derriba al objetivo.\n- Pulsa el Botn Z repetidamente para golpear.\n", + /*108*/ "Ahora int駭talo contra un objetivo en movimiento...\n", + /*109*/ "Y por ltimo contra un objetivo que contraataca.\n", + /*110*/ "Derrota a todos los enemigos sin ser alcanzado.\n", + /*111*/ "Entrenamiento fallado: te han acertado.\n", + /*112*/ "El Holoprograma 6 ha sido completado con 騙ito.\n", + /*113*/ "El Holoprograma 7 ha sido completado con 騙ito.\n", + /*114*/ "TERMINALES\n- Pulsa el Botn B cerca de la terminal\npara usarla.\n", + /*115*/ "Ahora activa las terminales rojas del muro.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bien, Joanna, te dejo. Prep疵ate para la misin.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humano (Mujer)\n", + /*127*/ "23 aos 2 meses\n", + /*128*/ "|Fichero IC #027 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A++\nEstatus Actual: Asignado\n\n|Perfil -\n\nAltamente entrenada pero sin experiencia. Reaccin excelente. Experta en gran variedad de armas. Agente muy competente en todo momento. La m疽 alta puntuacin en entrenamiento, lo que llev a la creacin de un nuevo nivel. Es la encarnacin del agente ideal del Instituto Carrington, de ah su nombre clave: 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Humano (Hombre)\n", + /*131*/ "28 aos 5 meses\n", + /*132*/ "|Fichero IC #009 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A+\nEstatus Actual: Secreto\n\n|Perfil -\n\nNuestro agente secreto con mayor experiencia. Muy preciso con su arma favorita (un Revlver Magnum). Perfectamente preparado para misiones secretas. Menos preparado en combate normal. Tras Joanna Dark, tiene el honor de tener la puntuacin m疽 alta en entrenamiento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humano (Hombre)\n", + /*135*/ "62 aos 8 meses\n", + /*136*/ "|Fichero IC #000 -\n\nEstatus Entrenamiento: N/D\nGrado de Entrenamiento: N/D\nEstatus Actual: N/D\n\n|Perfil -\n\nInteligente y patriarcal cientfico/empresario, fundador del Instituto Carrington. Planifica todas las misiones de sus agentes y controla cada operacin desde su oficina. Con un gusto un tanto personal en la ropa.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humano (Mujer)\n", + /*139*/ "39 aos ? meses\n", + /*140*/ "|An疝isis -\n\nDirectora de la Corporacin dataDyne. Adicta al poder; detesta ser subordinada de nadie. Odia perder la iniciativa. No muestra ninguna clase de escrpulos si con ello consigue superarse en su competicin con Daniel Carrington, al cual aborrece.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humano (Hombre)\n", + /*143*/ "46 aos ? meses\n", + /*144*/ "|An疝isis -\n\nDirector de la Agencia Nacional de Seguridad. Tiene una cierta amistad con Cassandra De Vries, aunque parece m疽 una unin de inter駸. Tiende a hacer lo que dice Cassandra, ya que aunque tiene una personalidad dominante, no lo es tanto como la de ella. Cabeza visible de los elementos m疽 granujas de la ANS.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "La Inteligencia Caroll (IA)\n", + /*147*/ "6 meses\n", + /*148*/ "|Perfil -\n\nInteligencia artificial creada por la Corporacin dataDyne con habilidades de lenguaje y apertura de cdigos. Afortunadamente, tiene moral, y debido a su formidable nivel de inteligencia, ha adivinado algunos de los planes futuros de dataDyne. Su voz es muy precisa y educada y simula la personalidad de un acad駑ico.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Macho)\n", + /*151*/ "320 aos\n", + /*152*/ "|Perfil -\n\nAliengena de la raza Maian. Es un 'Protector' (guardaespaldas) del embajador Maian que viaja a la Tierra a peticin de Daniel Carrington. Los Protectores est疣 entrenados para dominar una gran variedad de armamento. Elvis es un terrfilo, es decir, est fascinado por el planeta Tierra y todo lo que contiene.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humano (Hombre)\n", + /*155*/ "Unos 30 aos\n", + /*156*/ "|Perfil -\n\nEs un sorprendente hombre rubio. Muy alto, viste ropa blanca, habitualmente una gabardina. Parece ser la cabeza pensante de la conspiracin en la que Cassandra y Trent est疣 involucrados. Poco m疽 se sabe.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disfrazado)\n", + /*159*/ "desconocida\n", + /*160*/ "|Perfil Actualizado -\n\nSe trata de un guerrero Skedar disfrazado con la proyeccin hologr畴ica de un impresionante humano rubio de unos 30 aos. Su unidad de modulacin oral da al Skedar una precisa, persuasiva, e inteligente voz. Es un instrumento de propaganda y manipulacin de los Skedar, inusualmente sutil.\n", + /*161*/ "Presidente de EE.UU.\n", + /*162*/ "Humano (Hombre)\n", + /*163*/ "50 aos\n", + /*164*/ "|Perfil -\n\nAltamente educado, es un perspicaz afroamericano que intenta hacer lo correcto, pero que est rodeado de gente como Trent Easton. Cree que tiene a Trent bajo control tras rechazar la peticin de pr駸tamo del Pelagic II a la Corporacin dataDyne. La mayora de comentaristas polticos piensa que es f當il de controlar, lo cual quiz疽 sea injusto.\n", + /*165*/ "Maian\n", + /*166*/ "Los Maian son la raza de aliengenas conocida en la Tierra como los 'Grises'. Han vigilado la Tierra durante largo tiempo, bastantes siglos, y han sido benevolentes con la humanidad, siendo conscientes del potencial de la raza humana. Su contacto en la Tierra es Daniel Carrington. Todava debe hacerse un contacto poltico formal.\n", + /*167*/ "Guerreros Skedar\n", + /*168*/ "Los Skedar son una raza aliengena guerrera que luch con los Maian durante siglos y slo ahora han aceptado un alto el fuego. Suelen usar armaduras para caminar y luchar, ya que son criaturas bastante pequeas y con forma de serpiente. Son muy agresivos y extremadamente devotos; han hecho de la Guerra una religin.\n", + /*169*/ "Antecedentes\n", + /*170*/ "Hace millones de aos, una gigantesca nave aliengena de inmenso poder, creada por una raza aliengena llamada Cetan, se hundi en el Oc饌no Pacfico. Estaba equipada con una nueva arma devastadoramente peligrosa: la 'fuerza nuclear de acople d饕il', que en teora puede causar que las cadenas que unen las mol馗ulas fallen. Aunque algunos hubieran credo en la innegable destruccin de la nave, un mensaje-c疳sula fue enviado a casa, y partes vitales de los sistemas de navegacin fueron destruidas en el sistema estelar que eligieron como escondite.\n\n Esta nave era un Cetan, una gigantesca, criatura aliengena centinela.\n\nOtra raza extraterrestre, los Maian, encontr vida en la Tierra en el 2000 AC. Detectaron un gran potencial, pero decidieron dejar a la primitiva raza humana desarrollarse sin intromisiones.\n\nLos Maian encontraron a los Skedar cerca de Delta Eridanus en el 1650 DC (fecha terr痃uea), y la escaramuza resultante pronto floreci en una guerra total. Slo tras cientos de aos de lucha se logr un tratado de paz, aunque los fan疸icos Skedar se saltaban continuamente los acuerdos de esta paz con actividades terroristas. Afortunadamente, los Maian rehusaron abandonar.\n\nLa humanidad, tambi駭, continu siendo una causa que concerna a los Maian, los cuales vean con decepcin cmo la Tierra sufra m疽 y m疽 crisis debido al crecimiento de la tecnologa y a 'situaciones fuera de contexto'. Sintieron que anunciar su presencia slo precipitara guerras futuras en el planeta, y tranquilamente decidieron continuar en observacin hasta que la raza madurara m疽.\n\nDaniel Carrington se adelant a todos en el 1985 DC al contactar con una nave Maian en rbita sobre la Tierra. Propuso un plan que poda ayudar a ambas partes, resultando as un contacto acelerado entre Humanos y Maian. Viendo que su plan era sensato, y que se trataba de una persona ntegra, los Maian permitieron a Carrington lanzar su tecnologa al dominio pblico a trav駸 de sus grandes empresas de Investigacin y Desarrollo.\n\nEntonces, en el 2006 DC, los fan疸icos Skedar dieron con la c疳sula-mensaje Cetan. Inmediatamente comenzaron a rastrear la Tierra de un modo particularmente duro, abduciendo gente y mutilando animales en un intento de determinar la localizacin del crucero de batalla perdido. Con el tiempo, sus pruebas les condujeron inevitablemente al lecho marino del Oc饌no Pacfico; de todos modos, para alcanzarla, necesitaran ayuda de los nativos.\n\nLlevando a cabo su propio estudio de la Tierra, los Skedar confeccionaron una corta lista de compaas que posean los recursos para ayudarles a recuperar la nave hundida. En lo m疽 alto de esa lista estaba la Corporacin dataDyne. Contactaron con su directora, Cassandra De Vries, y se presentaron con un trato que sonaba demasiado bien para ser cierto: el cual, por cierto, lo era. A cambio de su ayuda para levantar 'su' nave del lecho marino, los Skedar prometieron dotar a dataDyne con suficiente tecnologa aliengena para convertirse en la mayor corporacin sobre la faz del planeta. Todo lo que dataDyne tena que hacer era construir una unidad de IA con habilidades de lenguaje y 'rotura' de cdigos, que era justo lo que necesitaban. Se comenz a trabajar en el proyecto inmediatamente.\n\nCassandra De Vries le mostr al director de la ANS, Trent Easton, los detalles del plan, pero sus intentos de conseguir la aprobacin Presidencial para el pr駸tamo de una nave de investigacin a profundidad, fueron repetidamente rechazados. No exista la posibilidad de que los Skedar o dataDyne pudieran robar la nave sin desatar la ira del Gobierno de los EE.UU., as que decidieron trazar un plan bastante m疽 siniestro para reemplazar al Presidente con un clon que ellos pudieran controlar. Por supuesto, esto prometa recompensas extra para Trent y Cassandra cuando la operacin Skedar pasara a la historia.\n\nDe todas formas, no tuvieron mucho tiempo para regodearse. El plan ltimo de los fan疸icos Skedar era probar la 'fuerza nuclear de acople-d饕il' en la Tierra antes de eliminar a los Maian, y tanto Cassandra como Trent permanecieron ciegos ante la posibilidad de ser traicionados, as que enamorados de las visiones de poder y lujo, continuaron adelante.\n\nPero dataDyne haba creado inconscientemente algo que poda ver demasiado claro el peligro que implicaba una conspiracin de tal magnitud: la sabia IA construida para abrir los cdigos de acceso de la nave Cetan. Cuando se mostr disconforme con la misin para la que haba sido diseada, la respuesta de Cassandra fue ordenar que su personalidad fuera eliminada. Claramente, pensaba demasiado. En su desesperacin, y en un movimiento que podra sellar o romper un mejor trato que el 'pacto' entre dataDyne y los Skedar, la IA adopt el seudnimo de Dr. Caroll y contact con el Instituto Carrington con una splica de ayuda...\n", + /*171*/ "La Historia\n", + /*172*/ "A la inexperta agente Joanna Dark se le asign una misin relacionada con la 'extraccin' de un cientfico de un 疵ea de desarrollo de alta seguridad sita bajo el rascacielos de dataDyne. Despu駸 del encuentro, se sorprende al descubrir que el 'Dr. Caroll' es una IA creada por la propia dataDyne, pero ella contina con su tarea de escoltarle/lo a un lugar seguro. Cuando salta la alarma, Joanna tiene que abrirse camino hacia lo alto del edificio para alcanzar el helipuerto y la lanzadera que supone su nica va de escape.\n\nEn respuesta a esta incursin, dataDyne marca a Daniel Carrington como un objetivo personal y lo toma como reh駭 dos das despu駸 en su villa privada. Demandan la devolucin de la IA, su 'propiedad', a cambio de su vida. No lo saben, pero la IA ya est en la villa, donde fue interrogada por Carrington sobre los planes de futuro de dataDyne. Finalmente, Joanna rescata al director del Instituto pero es incapaz de evitar que dataDyne se apodere de nuevo del Dr. Caroll. De todas formas, Carrington conoce lo suficiente como para dar el paso dr疽tico de reclamar en la Tierra un equipo de especialistas Maian.\n\nJoanna es enviada para espiar la reunin de los conspiradores en el Edificio G5, una tapadera de la Corporacin dataDyne. Es aqu donde averigua que Trent Easton, director de la ANS, y aquellos hombres nrdicos, que parecen tener el control del mortal plan, est疣 involucrados. Cuando Trent revela el plan de usurpar la posicin Presidencial, Joanna comunica por radio las novedades a la base, slo para descubrir que otra tarea todava m疽 urgente requiere de ella, antes incluso de llevar a cabo cualquier accin contra Trent.\n\nLos especialistas Maian han sido interceptados y derribados por los conspiradores, y los supervivientes y los restos del accidente son transportados al チrea 51, en Nevada. Con la misin de rescatar supervivientes y recuperar sus equipos, Joanna es 'introducida' para enlazar con otro agente del Instituto Carrington. Cuando irrumpe en el laboratorio m馘ico, Joanna descubre finalmente el secreto del Instituto, sus aliados son los Maian, la raza aliengena comnmente conocida como los 'Grises'. El Maian en particular que ella rescata responde al nombre de Elvis. Fue un guardaespaldas del Embajador que viajaba a la cabeza del equipo de especialistas.\n\nHabiendo asistido al resto de la delegacin Maian, Joanna puede volver al asunto del Presidente y a los planes de dataDyne en su contra. Se hace pasar por miembro del s駲uito Presidencial para acceder a la base a駻ea donde el Air Force One est ubicado, y consigue colarse con 騙ito en el avin. Nada m疽 despegar, Trent y el Skedar disfrazado mueven pieza, pero Joanna est all para detenerles. Apresura al Presidente a la c疳sula de escape mientras un equipo de hombres de Trent registran detenidamente el avin, en un intento de arrastrar al desgraciado poltico a bordo del OVNI Skedar, unido al AF1 por un tubo. Joanna debilita el tubo pero es incapaz de romperlo, y en ltima instancia Elvis intenta romper el tubo estrell疣dose contra 駘 a gran velocidad. Las tres naves caen en picado sobre la 'inexplorada' Alaska, y la c疳sula de escape del AF1 se eyecta.\n\nUna vez consciente, Joanna intenta informar por radio pero las comunicaciones est疣 bloqueadas debido a interferencias provenientes de la nave Skedar. Vagando por la nieve en busca del Presidente y de Elvis, se encuentra con grupos de Skedar ocultos que la buscan a ella, al Presidente, a Elvis y las pertenencias del Presidente. Localiza un grupo de vuelta a la nave Skedar derribada, donde descubre un clon del Presidente: r疳idamente lo destruye, apaga el origen de las interferencias y pide ayuda a la 'caballera'. Los planes Skedar han vuelto a ser frustrados, el Presidente est seguro y la incompetencia de Trent le ha llevado a un sucio destino a manos de sus 'aliados'.\n\nPero aqu no acaba la cosa. Descuidando toda precaucin, dataDyne y los Skedar roban el navo de investigacin del Gobierno, el 'Pelagic II', y se ponen en marcha hacia el lugar del siniestro en el Pacfico. Joanna y Elvis acuden para desbaratar la actividad a bordo y averiguar qu se esconde tras el gran plan Skedar. Despu駸 de paralizar las operaciones de inmersin del navo y replegar el sumergible, bajan al fondo oce疣ico, donde hacen el primer avistamiento del crucero de batalla Cetan derribado. Un portal hecho por los Skedar les permite el acceso a la nave, donde se encuentran con el cad疱er de un guerrero Skedar... Parece que el equipo de asalto no las tena todas consigo. Venciendo a los restantes vengativos Skedar y evitando a los Cetan, Joanna y Elvis se abren camino hasta el corazn de la nave, donde encuentran la IA que una vez fue Dr. Caroll. Se las apaan para restaurarle la personalidad, despu駸 de lo cual les ayuda a abandonar la nave para poder destruirla por el bien de todos.\n\nM疽 tarde, de vuelta en el Instituto Carrington, Joanna est a punto de salir hacia una recepcin Presidencial en la Casa Blanca cuando se arma un gran revuelo. Los supervivientes del equipo de asalto Skedar est疣 descargando su ira en aquellos en los que piensan recae la responsabilidad de su error al perder la nave Cetan. Joanna corre por el Instituto, ayudando a los empleados del IC a alcanzar la seguridad de los hangares, mientras los Skedar lanzan ataques en varias partes del edificio: la mayora de los empleados pudieron ponerse a salvo mientras Joanna mantena la resistencia, pero finalmente es golpeada e inconsciente es tomada como prisionera.\n\nJoanna despierta en una celda a bordo de la nave de asalto Skedar, con Cassandra De Vries como nica compaa. Por sorpresa, la directora de dataDyne, de buena gana da su vida para crear la distraccin necesaria para que Joanna escape. Luchando a trav駸 de la nave, logra localizar y desactivar los escudos de la baha de carga, permitiendo a Elvis llevar a unos cuantos amigos a la tan esperada 'fiesta' de la nave.\n\nLa ya capturada nave de asalto entra en rbita sobre el Templo de Batalla Skedar, lo que sorprende a Elvis ya que los Maian nunca antes haban encontrado 'el m疽 sagrado' lugar Skedar en todos los aos de Guerra interracial. Si el Templo es destruido, la moral Skedar ser abatida, y se lograr una paz verdadera en vez de un intil 'alto el fuego'. Joanna busca al lder Skedar, el m疽 alto sacerdote del Templo de Batalla, mientras Elvis regresa a la nave de asalto para traer a la flota Maian.\n\nAl despertar de tan culminante batalla, el templo est devastado. Elvis pide que se pare el bombardeo para encontrar a Joanna. Est viva pero retenida bajo una pila de escombros donde un tenaz Skedar la atrapa durante los ltimos segundos de su intento de escapar. Elvis le entrega r疳idamente un arma para convencer al Skedar de que la deje irse, y con el trabajo ya hecho, el Templo y la moral Skedar en ruinas y la conspiracin desbaratada, los dos parten a la rbita m疽 cercana.\n", + /*173*/ "Corporacin dataDyne\n", + /*174*/ "La monoltica corporacin que dataDyne ha llegado a ser comenz su negocio como programadora de sistemas de IA. Cuando de verdad comenz a crecer, fue cuando consigui trabajos como contratista de los militares norteamericanos, y su joven y din疥ica gerente Cassandra De Vries empez a cerrar tratos con fabricantes de armas, mientras ignoraba las ofertas de Daniel Carrington y el Instituto para colaborar en el desarrollo de ordenadores cu疣ticos e IAs. Cuando la tercera compaa armamentstica fue comprada por dataDyne, los beneficos se tornaron astronmicos. Tras recibir un contrato del gobierno para el desarrollo de armas, Cassandra De Vries fue promocionada a Directora. Una significativa parte de los beneficios de la corporacin fueron redirigidos a desarrollo de IAs, con resultados excelentes.\n", + /*175*/ "Instituto Carrington\n", + /*176*/ "Brevemente considerado como inventor chiflado, Daniel Carrington fue el primero en crear la tecnologa anti-gravedad. Las ganancias obtenidas, as como su desarrollo, le permitieron crear el Instituto Carrington, un remanso de creadores de tecnologa situado en un remoto lugar de los EE.UU. De hecho, el Instituto es un campo de entrenamiento para agentes que son enviados por todo el planeta para seguir el desarrollo tecnolgico actual, por razones que slo conoce el propio Daniel Carrington.\n", + /*177*/ "Descripcin\n- Una pequea c疥ara remota para exploracin sigilosa. Realiza holografas espectroscpicas. Abre puertas proyectando un impulso de calor del tamao de un humano.\n\nInstrucciones de Entrenamiento\n- Crea un holograma del terminal hacker de al lado de la Sala de Informacin.\n\nOperativa\n- El Botn Z toma una holografa. El Botn B abrir cualquier puerta en el camino. Mant駭 el Botn R para mirar.\n", + /*178*/ "Descripcin\n- Mejora la luz visible para producir una imagen del 疵ea circundante. Tambi駭 refleja formas de vida. En niveles normales de luz se produce una sobrecarga que 'blanquea' el visor.\n\nInstrucciones de Entrenamiento\n- Busca el interruptor de la luz en la oscuridad y actvalo.\n\nOperativa\n- Selecciona la Visin Nocturna de tu inventario para activarla. Hazlo de nuevo para desactivarla.\n", + /*179*/ "Descripcin\n- Dispositivo para apertura de cdigos. Se aplica sobre el panel de control y busca la combinacin hasta que la puerta se abra.\n\nInstrucciones de Entrenamiento\n- Encuentra el panel de la puerta cerrada y usa el Descodificador de Puertas en 駘 hasta que la abras.\n\nOperativa\n- Sitate cerca del panel de la puerta y pulsa el Botn B mientras sujetas el Descodificador para usarlo.\n", + /*180*/ "Descripcin\n- Se usa para ver a trav駸 de muros slidos y objetos. Puede ver cosas que la Visin Nocturna y el Esc疣er de Infrarrojos no pueden.\n\nInstrucciones de Entrenamiento\n- Con el Esc疣er de Rayos-X, busca los dos interruptores ocultos y actvalos para apagar la cuadrcula l疽er.\n\nOperativa\n- Elige el Esc疣er de Rayos-X de tu inventario para activarlo. Seleccinalo otra vez para desactivarlo.\n", + /*181*/ "Descripcin\n- Evita problemas al usar un disfraz. Pero, siempre debes estar alerta ante la posibilidad de ser desenmascarado por un enemigo espabilado.\n\nInstrucciones de Entrenamiento\n- Grimshaw tiene un Dispositivo de Ocultacin esper疣dote. Ve a la puerta de al lado para 'hacerte' con uno.\n\nOperativa\n- Para llevar el disfraz, simplemente elgelo en tu inventario.\n", + /*182*/ "Descripcin\n- Traslada datos termales en im疊enes visibles. Puede ser usado en la oscuridad y tambi駭 revela anomalas como puertas ocultas o muros debilitados.\n\nInstrucciones de Entrenamiento\n- Enciende el Esc疣er de Infrarrojos, encuentra la puerta oculta y 畸rela.\n\nOperativa\n- Elige el Esc疣er de Infrarrojos en tu inventario para activarlo. Reelgelo para desactivarlo.\n", + /*183*/ "Descripcin\n- Localiza un objeto en el mapa radar del visor. Muestra la posicin relativa y la distancia.\n\nInstrucciones de Entrenamiento\n- Activa el Rastreador y sigue la seal de radar hasta obtener el objeto.\n\nOperativa\n- Selecciona el Rastreador en tu inventario para activarlo. Reelgelo para desactivarlo.\n", + /*184*/ "Descripcin\n- Trastorna el espectro visible de luz alrededor del portador, creando un efecto camalenico. Este campo desaparece cuando el portador dispara.\n\nInstrucciones de Entrenamiento\n- Activa el Dispositivo de Ocultacin y dirgete a la oficina de Carrington para sorprenderle.\n\nOperativa\n- Selecciona el Dispositivo de Ocultacin para activarlo. Reelgelo para desactivarlo.\n", + /*185*/ "Descripcin\n- Emite una seal constante que sirve para bloquear cualquier dispositivo de comunicacin electrnica. Debe ser colocado en el objeto para ser efectivo.\n\nInstrucciones de Entrenamiento\n- Lanza la Mina ECM en el Puerto tras la puerta secreta.\n\nOperativa\n- Pulsa el Botn Z para lanzar la mina. Mant駭 el Botn R y mueve el Stick de Control para afinar tu puntera antes de lanzar.\n", + /*186*/ "Descripcin\n- Comunica al agente de campo con los hackers del Instituto sitos en el CG, quienes pueden romper cerraduras electrnicas a distancia.\n\nInstrucciones de Entrenamiento\n- Usa el Conector de Datos para 'hackear' la terminal de la esquina, abriendo as una puerta secreta.\n\nOperativa\n- Sitate en la terminal y pulsa el Botn B mientras sujetas el Conector de Datos.\n", + /*187*/ "DISPARAR\n Pulsa el Botn Z para disparar el arma.\n", + /*188*/ "RECARGA AUTOMチTICA\n Suelta el Botn Z cuando no tengas municin.\n", + /*189*/ "RECARGA MANUAL\n Pulsa el Botn B para recargar en cualquier momento.\n", + /*190*/ "Apuntar: Mant駭 el Botn R para entrar en el modo Apuntar.\n", + /*191*/ "Usa el Stick de Control para mover la mirilla.\n", + /*192*/ "AUTODISPARO\n Mant駭 el Botn Z para disparar autom疸icamente.\n", + /*193*/ "ALTERAR VISTA\n Pulsa el Botn C Arriba o el Botn C Abajo para mover la vista arriba/abajo.\n", + /*194*/ "ZOOM\n Mant駭 el Botn R para entrar en el modo Zoom.\n", + /*195*/ "FUEGO RチPIDO\n Pulsa el Botn Z r疳ido para disparar m疽 velozmente.\n", + /*196*/ "Instituto Carrington\0|Base de operaciones\n", + /*197*/ "Edificio Lucerne\0|Cuartel General Global\n", + /*198*/ "Stano Laboratorio\0|Laboratorios subterr疣eos\n", + /*199*/ "Villa Carrington\0|Propiedad privada en la costa\n", + /*200*/ "Chicago\0|Barrios Bajos de la ciudad\n", + /*201*/ "Edificio G5\0|Edificio de la Corporacin dataDyne\n", + /*202*/ "チrea 51\0|Cerca de Lago Seco, Nevada\n", + /*203*/ "Base A駻ea Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Avin del Presidente\n", + /*205*/ "Lugar del Impacto\0|Isla Victoria 71 N 118 O\n", + /*206*/ "Pelagic II\0|Navo especializado de profundidad\n", + /*207*/ "Nave Cetan\0|Nave aliengena en la Tierra\n", + /*208*/ "Nave de Asalto Skedar\0|Nave espacial de transporte\n", + /*209*/ "Mundo Skedar\0|El planeta del Templo de Batalla\n", + /*210*/ "Lanzadera\0|チgil transporte de tropas\n", + /*211*/ "AntiGrav\0|Dispositivo de Anti-gravedad\n", + /*212*/ "Aeromoto\0|Vehculo a駻eo de baja altitud\n", + /*213*/ "Bot de Limpieza\0|Tu ayudante especial\n", + /*214*/ "Hovercptero\0|Nave de asalto urbana\n", + /*215*/ "Robot G5\0|Droide urbano de combate\n", + /*216*/ "Interceptor A51\0|Interceptor a駻eo robtico\n", + /*217*/ "Nave Maian\0|Nave de reconocimiento y patrulla\n", + /*218*/ "Lanzadera Skedar\0|Nave aliengena de tropas\n", + /*219*/ "El edificio del Instituto comprende diferentes 疵eas: oficinas y laboratorios, talleres y hangares. Est bastante aislado del mundo exterior, lo que ayuda a mantener las operaciones en secreto.\n", + /*220*/ "En el centro del distrito financiero, el austero rascacielos de la Corporacin dataDyne destaca sobre sus vecinos.\n", + /*221*/ "Fuertemente guardados, estos bien escondidos laboratorios son la clave del futuro de dataDyne. En ellos, los t馗nicos trabajan secretamente para situar a dataDyne en lo m疽 alto.\n", + /*222*/ "Perteneciente al Instituto, esta apartada residencia es utilizada por Daniel Carrington como retiro de su trabajo en el Instituto. Tambi駭 tiene un observatorio, su propio generador el馗trico y una amplia bodega.\n", + /*223*/ "Es una srdida y mugrienta parte de Chicago, ahora cerrada al tr畴ico. Es aqu donde la Corporacin G5 tiene su cuartel general.\n", + /*224*/ "Dentro del Edificio G5 hay una sala de reuniones protegida por sistemas antigrabacin. Para dataDyne es el lugar m疽 seguro para formular sus planes confidenciales.\n", + /*225*/ "Esta seccin de la gigantesca instalacin conocida como チrea 51 est situada al pie de las colinas de Lago Seco. Helipuertos exteriores y torres de comunicacin indican el posible tamao del complejo subterr疣eo.\n", + /*226*/ "Una de las muchas bases a駻eas reforzadas para acoger al Air Force One cuando reposta. Normalmente, estas bases a駻eas est疣 en lugares remotos en regiones inhspitas, lejos de ojos entrometidos.\n", + /*227*/ "Este Air Force One en particular est optimizado para climas fros, siendo muy til cuando se usa en el norte de Alaska. El destino del vuelo es Oslo, Noruega.\n", + /*228*/ "En este rocoso paisaje cubierto de nieve en pleno Crculo チrtico, descansan los restos de un avin destrozado.\n", + /*229*/ "Propiedad del gobierno norteamericano, el Pelagic II es capaz de consumar operaciones a muy baja profundidad en cualquier condicin. Es el nico navo de desarrollo a baja profundidad del mundo.\n", + /*230*/ "Se trata de una nave gigantesca de construccin aliengena que reposa en el fondo oce疣ico desde hace millones de aos.\n", + /*231*/ "Es una nave de asalto interplanetaria que transporta guerreros Skedar a zonas de guerra. Pertenece a la muy reducida flota de batalla Skedar.\n", + /*232*/ "Se trata de un planeta extremadamente 疵ido, asolado por terremotos, tormentas de arena y huracanes. Es parte de un complejo sistema solar que incluye tres soles.\n", + /*233*/ "Este pequeo, r疳ido, y altamente manejable transporte de agentes ha sido diseado para uso en 疵eas urbanas. Puede ser controlado por ordenador o remotamente. Tiene espacio suficiente en su interior para tres o cuatro agentes, m疽 su equipamiento.\n", + /*234*/ "Este dispositivo anti-gravedad fue diseado para ayudar en los almacenes. Se aplica en el lateral de una caja. Cuando se activa, el campo antigravitatorio levanta el cajn y le quita algo de inercia.\n", + /*235*/ "Es una moto de patrulla de baja altitud. Usa una pequea unidad antigravedad para elevarse, y una poderosa turbina para moverse y proveer de control direccional.\n", + /*236*/ "Mantiene el lugar limpio y ordenado. Suele tener acceso a todas las 疵eas de un edificio. Los agentes han sido adiestrados en mantener estos robots intactos, ya que pueden conseguir acceso a zonas sensibles.\n", + /*237*/ "Vehculo de patrulla urbana y eliminacin, con tripulacin de dos hombres, y armado con un can en el morro, y dos sistemas de misiles en las alas. Puede ser eliminado con fuego sostenido, o preferentemente, un cohete bien dirigido.\n", + /*238*/ "Es un robot de combate diseado para guerrilla urbana. Usa una unidad anti-gravedad. Est fuertemente armado. Se suele usar para mantener lejos a visitantes no deseados, gracias a su programacin de '1ー dispara, despu駸 pregunta'.\n", + /*239*/ "Variacin robtica de la Aeromoto, con mayor poder gravitatorio y de turbina; puede alcanzar velocidad Mach 2 f當ilmente y avanzar durante horas a velocidad de crucero. Aunque bien armada, se basa en su manejabilidad m疽 que en el escudo.\n", + /*240*/ "Est diseada para llevar a un nico piloto Maian. Un pasajero se puede sentir atorado: si 駸te es humano, puede ser an peor.\n", + /*241*/ "Es capaz de llevar a la batalla a diez guerreros Skedar completamente armados. Es indetectable por el radar convencional. Puede emitir seales de bloqueo sobre 疵eas considerables: 駸tas interrumpen las comunicaciones as como los equipos de deteccin.\n", + /*242*/ "Descripcin\n- Un buen agente siempre observa lo que hay a su alrededor.\n\nInstrucciones de Entrenamiento\n- Examina todos los objetos mir疣dolos directamente.\n\nOperativa\n-Mirar arriba: Pulsa el Botn C Abajo\n-Mirar abajo: Pulsa el Botn C Arriba\n-Vista Libre: Mant駭 pulsado el Botn R para entrar en el modo Apuntar, y usa el Stick de Control para mirar.\n", + /*243*/ "Descripcin\n- Esquivar y eludir te puede sacar de muchos problemas.\n\nInstrucciones de Entrenamiento\n- Activa todos los interruptores. S r疳ida, ya que cada botn se reiniciar en un tiempo lmite.\n\nOperativa\n- Esquivar Izquierda: Botn C Izquierda\n- Esquivar Derecha: Botn C Derecha\n\n", + /*244*/ "Descripcin\n- Agacharse puede abrir nuevas 疵eas de exploracin.\n\nInstrucciones de Entrenamiento\n- Avanza evitando los obst當ulos utilizando los movimientos disponibles. Activa los interruptores.\n\nOperativa\n- Agacharse: Mant駭 el Botn R, y pulsa el Botn C Abajo.\n- Arrastrarse: Una vez agachado, mant駭 el Botn R, y pulsa el Botn C Abajo.\n- Levantarse: Presiona el Botn R.\n\n", + /*245*/ "Descripcin\n- Luchar contra mltiples oponentes en combates mano a mano puede ser difcil.\n\nInstrucciones de Entrenamiento\n- Derriba a todos los enemigos sin ser golpeado.\n\nOperativa\n- Puetazo: Pulsa el Botn Z repetidamente cuando est駸 desarmado para lanzar una r畴aga de puetazos.\n\n", + /*246*/ "Descripcin\n- Desarmar a un enemigo te puede proporcionar una nueva arma.\n\nInstrucciones de Entrenamiento\n- Derriba/desarma a todos los enemigos sin ser golpeado.\n\nOperativa\n- Desarmar: Mant駭 el Botn B, entonces pulsa el Botn Z para desarmar al enemigo.\n- Puetazo KO: Golpea a un enemigo desprevenido por detr疽.\n", + /*247*/ "Descripcin\n- Lucha contra mltiples oponentes en combate mano a mano.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*248*/ "Descripcin\n- Lucha contra mltiples oponentes, unos armados y otros no.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*249*/ "Para mayor precisin y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*250*/ "Piensa dnde quieres ir antes de intentar la prueba. Establece tu posicin en un lugar que requiera la menor cantidad de movimiento posible entre objetivos.\n", + /*251*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves m疽 r疳ido cuando est疽 en pie. Para avanzar lo m疽 r疳ido posible, intenta agacharte slo cuando lo necesites.\n", + /*252*/ "Atacar a los enemigos por detr疽 no es muy honorable, pero har bastante m疽 f當il derribarlos. Slo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*253*/ "Slo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nueva arma.\n", + /*254*/ "No esperes a ser alcanzada, 。mu騅ete! No te centres en un solo oponente; intenta situar dnde se encuentran todos. Si no puedes ver a todos, mu騅ete hasta que sea posible.\n", + /*255*/ "Ve a por los oponentes armados slo si est疽 segura de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*256*/ "Para mayor precisin y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*257*/ "Esquivar y eludir te puede sacar de muchos problemas.\n", + /*258*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves m疽 r疳ido cuando est疽 en pie. Para avanzar lo m疽 r疳ido posible, intenta agacharte slo cuando lo necesites.\n", + /*259*/ "Atacar a los enemigos por detr疽 no es muy honorable, pero har bastante m疽 f當il derribarlos. Slo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*260*/ "Slo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nuevo arma.\n", + /*261*/ "No esperes a ser alcanzada; 。mu騅ete! No te centres en un solo oponente; intenta situar dnde se encuentran todos. Si no puedes ver a todos, mu騅ete hasta que sea posible.\n", + /*262*/ "Ve a por los oponentes armados slo si est疽 seguro de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*263*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexin.\n", + /*264*/ "Asegrate de que la mina aterriza en el sitio correcto acerc疣dote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botn R.\n", + /*265*/ "La C疥ara Espa puede ser difcil de controlar, as que tmate tu tiempo.\n", + /*266*/ "Es til en combate, pero puede causar problemas cuando se sobrecarga.\n", + /*267*/ "Si tienes problemas para usar el Decodificador, intenta acercarte m疽 al objetivo poni駭dote cara a cara.\n", + /*268*/ "El Rastreador slo indica la direccin y altura relativa; no muestra un mapa que te gue al blanco. Presta atencin a tus alrededores, y prep疵ate a explorar.\n", + /*269*/ "El visor estrecha tu visin perif駻ica, lo cual puede causar problemas en combate. Asegrate de tu situacin antes de usarlo.\n", + /*270*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podr疽 ver nada a cierta distancia. レsalo con moderacin.\n", + /*271*/ "Un disfraz no es slo la ropa, es la manera en que una persona lo lleva. No actes de manera diferente a la de la persona que est疽 intentando ser.\n", + /*272*/ "Preserva tu Dispositivo de Ocultacin cuando no hay nadie alrededor que pueda observarte.\n", + /*273*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexin.\n", + /*274*/ "Asegrate de que la mina aterriza en el sitio correcto acerc疣dote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botn R.\n", + /*275*/ "La C疥ara Espa no es invisible: los enemigos la pueden descubrir, as que ten cuidado cuando entres en un 疵ea habitada. Recuerda que la C疥ara Espa se quedar donde la dejes hasta que la recojas.\n", + /*276*/ "Es til en combate, pero puede causar problemas cuando se sobrecarga. Intenta anticiparte a las situaciones y reacciona antes que el enemigo.\n", + /*277*/ "Si tienes problemas para usar el Decodificador, intenta acercarte m疽 al objetivo poni駭dote cara a cara.\n", + /*278*/ "El Rastreador slo indica la direccin y altura relativa; no muestra un mapa que te gue al objetivo. Presta atencin a tus alrededores, y prep疵ate a explorar.\n", + /*279*/ "El visor estrecha tu visin perif駻ica, lo cual puede causar problemas en combate. Asegrate de tu situacin antes de usarlo.\n", + /*280*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podr疽 ver nada a cierta distancia. レsalo con moderacin.\n", + /*281*/ "Un disfraz no es slo la ropa, es la manera en que una persona lo lleva. No actes de manera diferente a la de la persona que est疽 intentando ser.\n", + /*282*/ "Preserva tu Dispositivo de Ocultacin cuando no hay nadie alrededor que pueda observarte. Evita disparar a menos que sea absolutamente necesario, y slo si est疽 seguro del 騙ito de tu ataque.\n", + /*283*/ "La Falcon 2 es una pistola muy precisa, as que cualquier error ser tuyo. El modo secundario es golpear con su culata y es, por lo tanto, intil en una prueba de tiro.\n", + /*284*/ "Para hacer un mejor uso de la precisin de la Falcon 2, una mira ha sido puesta en la pistola. Como en la Falcon 2 sin modificar, el modo secundario de golpear con la culata es intil durante la prueba de tiro.\n", + /*285*/ "La versin con silenciador de la Falcon 2 es una excelente arma, diseada para darte la ventaja de la sorpresa sobre tus oponentes. Prueba tu precisin para asegurarte que nunca derrochar疽 tus oportunidades.\n", + /*286*/ "La Magsec 4 tiene un excelente poder de disparo a costa de la precisin, especialmente cuando se usa el modo secundario de r畴aga de 3 tiros. La nica desventaja seria es el tamao limitado de su cargador.\n", + /*287*/ "Esta tpica arma Skedar es brutal y poderosa. Sacrificando algo del cartucho, el disparo puede ser cargado para crear una explosin devastadora. Su capacidad de recarga es alta.\n", + /*288*/ "Esta vers疸il pistola ofrece dos diferentes sistemas de disparo para su municin: un disparo est疣dar o una descarga explosiva. Los ingenieros Maian lo han conseguido sin comprometer el uso de energa del arma, aunque el ritmo de disparo es reducido.\n", + /*289*/ "La clave del uso del DY357 es saber cu疣do recargar. Un cartucho de seis balas implica estar siempre alerta en un tiroteo. El peso del arma puede ser muy til si tienes que golpear a alguien con ella.\n", + /*290*/ "Trent Easton siempre busca facilidades extra, y este arma no es una excepcin. Las balas son tan especiales como el resto del arma; han sido diseadas para hacerse aicos en el interior del oponente y as tumbarle r疳idamente.\n", + /*291*/ "Esta fiable y efectiva metralleta no es difcil de encontrar ya que es el arma m疽 vendida de dataDyne en los ltimos dos aos, incluso si su modo secundario no se tiene en cuenta. Su sistema de adquisicin de objetivos es excelente, y deber疽 familiarizarte con todas las posibilidades de este arma.\n", + /*292*/ "La metralleta Cicln fue diseada especficamente para NO ser precisa, aunque vale la pena practicar. Puede disparar una gran cantidad de balas en poco tiempo, por ello, es una excelente arma de supresin.\n", + /*293*/ "La flexibilidad Maian respecto al diseo ha creado esta metralleta con un interesante modo secundario: una bala de alta velocidad que puede atravesar objetos f當ilmente. El ritmo de disparo, como en la Phoenix, se reduce durante el modo secundario; esto se debe a que se intenta prevenir dao en el mecanismo de disparo y en el can.\n", + /*294*/ "La RC-P120 dispara una bala mineral especial que, acompaada de un ritmo de disparo r疳ido y un amplio cargador, hace de este arma una herramienta perfecta para ser usada contra los Skedar. Las balas pueden ser usadas para recargar un prototipo de Dispositivo de Ocultacin: el entrenamiento ha sido alterado para reflejar esta caracterstica en particular.\n", + /*295*/ "Este arma no slo se parece a un ordenador PC port疸il, sino que puede ser utilizada como arma centinela en el modo secundario para cubrir una ruta de escape o proteger un lugar.\n", + /*296*/ "ノste es el modelo que dataDyne present con 騙ito a los militares de EE.UU., aunque todava tiene que ser aprobado. Siguiendo la tendencia de dataDyne de dar a la gente desagradables sorpresas, el modelo b疽ico del rifle de asalto lleva una mina de proximidad debajo del can. Usar el modo secundario obviamente implica que debes lanzar tu arma.\n", + /*297*/ "Tan lejos como podemos establecer, el modo secundario del arma parece ser que identifica trampas, minas dirigidas, dispositivos explosivos ocultos (como el Dragn en modo secundario), y armas autom疸icas. Aunque poderoso, el cartucho de este rifle de asalto es pequeo. \n", + /*298*/ "Como primera arma con apoyo del Instituto, el AR34 es un rifle de asalto bastante b疽ico. El modo secundario es un zoom permamente. Probar a sujetarlo vale como entrenamiento de precisin.\n", + /*299*/ "Se trata de la variante pesada del Dragn sin mina de proximidad, la cual ha sido reemplazada por un lanzagranadas. Adoptada por los militares norteamericanos como arma de apoyo de brigada pesada: se nota el porqu... Practica para hacerte con la trayectoria de las granadas.\n", + /*300*/ "La delicadeza no es una opcin aqu. Hay dos modos, explosin simple o doble. El cartucho es amplio para una escopeta, pero ten cuidado con el largo tiempo de recarga, y planea tus movimientos en consonancia.\n", + /*301*/ "Esta fina pieza de ingeniera es un rifle de francotirador con silenciador con un zoom de alta tecnologa. Lo nico que puede interferir en la precisin de este arma es el zoom de francotirador. Asegrate de agacharte y mantener tu mirilla en el modo secundario.\n", + /*302*/ "Aunque las t馗nicas actuales de ingeniera nos superan, todava podemos apreciar los efectos del rifle FarSight. Su disparo es imparable, y puede penetrar muros a bastante profundidad, alcanzando objetivos si se necesita.\n", + /*303*/ "La funcin primaria de la ballesta es un disparo de sedante no letal, mientras que el secundario es la muerte instant疣ea. Es un arma principalmente sigilosa, pero su largo tiempo de recarga puede ser un inconveniente durante un tiroteo.\n", + /*304*/ "La pistola tranquilizante es muy comn, pudiendo ser encontrada en laboratorios m馘icos y hospitales de todo el mundo. Puede ser usada con perdigones tranquilizantes, o con dosis letales, que usan bastante m疽 cantidad de la reserva de sedantes.\n", + /*305*/ "Intenta controlar este arma lo mejor que puedas. Fue diseada para usuarios bastante m疽 fuertes que los humanos. Arrodillarse puede ayudar a apuntar el arma, pero no a perfeccionar el tiro. Si algn oponente logra esquivar la lluvia de balas, sus caones pueden usarse como trituradoras para infringir dao.\n", + /*306*/ "Este reciente producto de dataDyne, cuenta con tecnologa muy interesante en su interior. El modo secundario activa un campo magn騁ico alrededor de la bomba, lo que le permite adherirse durante un limitado periodo de tiempo. Cuando ese tiempo pasa, la bomba cae, impacta y explota.\n", + /*307*/ "Es un compacto lanzamisiles reutilizable: recarga tras cada tiro. El modo secundario usa una variante del sistema de blancos de la metralleta CMP150. El misil viaja lentamente lo que le permite seguir al objetivo, as que tenlo en cuenta y planea tus disparos cuidadosamente.\n", + /*308*/ "Este lanzador port疸il de msiles Skedar puede disparar tanto cohetes sin gua, como por control remoto. A los Skedar les produce una perversa satisfaccin cuando la c疥ara se acerca al objetivo, pero un agente del IC est m疽 all de esas cosas. Los cohetes guiados aceleran autom疸icamente, pero pueden ser decelerados para m疽 maniobrabilidad. La detonacin ocurre por contacto o cuando se aprieta el gatillo.\n", + /*309*/ "Este cuchillo finamente pulido, est equilibrado para ser lanzado. La pr當tica es esencial para acostumbrarse al alcance y trayectoria de la hoja lanzada.\n", + /*310*/ "El departamento de armas experimentales ha creado este pequeo pero efectivo l疽er de mueca con dos diferentes rayos. El modo primario genera una explosin a gran distancia, mientras que el secundario provee de un rayo continuo hasta que el gatillo es soltado.\n", + /*311*/ "Cuatro segundos pasan desde la activacin a la detonacin de la granada de fragmentacin antipersonal en el modo b疽ico. Para tu deleite y entretenimiento, se ha incluido un modo secundario: pinball de proximidad. La granada rebotar hasta que la carga explote cuando su detector de proximidad se active.\n", + /*312*/ "Esta granada Maian hace estragos con las neuronas de las criaturas. Si caes en su radio de explosin, tu visin se volver borrosa y no podr疽 agarrar lo que lleves. La granada puede ser activada por lanzamiento o por proximidad. Asegrate de lanzarla cuando est駸 lo suficientemente lejos.\n", + /*313*/ "Se necesita bastante criterio para un uso efectivo de las minas de tiempo, de otro modo, la explosin no afectar al objetivo, y 駸te ir detr疽 tuyo. Mejorar tu habilidad en las pruebas evitar errores crticos. La funcin secundaria es un detector de trampas id駭tico al encontrado en el rifle de asalto Vengador K7.\n", + /*314*/ "La clave de la colocacin correcta de las minas de proximidad es situarlas donde tus oponentes no se esperen encontrarlas. Si t mismo no quieres tener problemas, usa el modo secundario de deteccin de trampas para asegurar tus alrededores. Puede que te haga perder el tiempo, pero si no es as, podr salvar tu vida.\n", + /*315*/ "La ltima variedad de minas remotas detonables, es esencialmente igual a las que ya tenas. El modo primario es poner las minas, mientras que el secundario es dar las rdenes de explosin. Si no puedes ver la mina, deber疽 confiar en el viejo m騁odo de prueba y error. \n", + /*316*/ "Holo 1 - Mirar alrededor\n", + /*317*/ "Holo 2 - Movimiento 1\n", + /*318*/ "Holo 3 - Movimiento 2\n", + /*319*/ "Holo 4 - Comb. sin armas 1\n", + /*320*/ "Holo 5 - Comb. sin armas 2\n", + /*321*/ "Holo 6 - Comb. Directo 1\n", + /*322*/ "Holo 7 - Comb. Directo 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/earE.c b/src/files/lang/pal-final/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-final/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/earJ.c b/src/files/lang/pal-final/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/pal-final/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/earP.c b/src/files/lang/pal-final/earP.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-final/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_f.c b/src/files/lang/pal-final/ear_str_f.c new file mode 100644 index 000000000..e34e6c7d1 --- /dev/null +++ b/src/files/lang/pal-final/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - D駻outer cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les syst鑪es de s馗urit. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux ct駸 du robot pour ne pas subir de d馮穰s.\n\n|Objectif 3: - Arr黎er les exp駻iences\n\nLes exp駻iences des laboratoires du secteur 2 provoquent des interf駻ences avec nos communications, emp鹹hant nos pirates de briser le code de s馗urit. Forcez les scientifiques pr駸ents les interrompre. Vous pouvez vous risquer cette manoeuvre mais l'alarme se d馗lenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Obtenir 馗hantillons tech.\n\nDr. Caroll nous informe que trois autres projets majeurs sont sur le point d'黎re achev駸 dans les laboratoires voisins du sien. R馗up駻ez les prototypes des trois exp駻iences et rapportez-les l'Institut Carrington pour une 騁ude.\n\n|Objectif 5: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 1*/ "LABORATOIRE SOUTERRAIN\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - D駻outer cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les syst鑪es de s馗urit. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux ct駸 du robot pour ne pas subir de d馮穰s.\n\n|Objectif 3: - Arr黎er les exp駻iences\n\nLes exp駻iences des laboratoires du secteur 2 provoquent des interf駻ences avec nos communications, emp鹹hant nos pirates de briser le code de s馗urit. Forcez les scientifiques pr駸ents les interrompre. Vous pouvez vous risquer cette manoeuvre mais l'alarme se d馗lenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contact l'Institut Carrington: il demande 黎re 騅acu des quartiers g駭駻aux de la dataDyne ce soir. Apr鑚 avoir critiqu les implications morales du dernier projet de la dataDyne, celle-ci d馗ida de le conditionner mentalement plutt que de l'駘iminer. Cette op駻ation devrait ainsi le rendre plus coop駻atif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant la zone du labo du Dr. Caroll. Malheureusement, nous avons d騁ect un tr鑚 haut niveau d'interf駻ences 駘ectromagn騁iques autour des laboratoires. Elles perturbent nos 駲uipements de communication. Obligez les scientifiques interrompre leurs exp駻iences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre r馗epteur, il vous sera srement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope test dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a li l'isotope une am駘ioration du syst鑪e de bouclier exp駻imental, un objet 馮alement pr駸ent dans les laboratoires.\n\n|Objectif 2: - Trouver le Dr. Caroll\n\nLe sous-sol est divis en 4 zones de s馗urit. Le Dr. Caroll se trouve dans la derni鑽e de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est d駱loy entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Trouver le Dr. Caroll\n", + /* 10*/ "Arr黎er les exp駻iences\n", + /* 11*/ "D駻outer cycle maintenance\n", + /* 12*/ "Obtenir 馗hantillons tech.\n", + /* 13*/ "Holographier l'isotope radioactif\n", + /* 14*/ "Effets sons m馗anisme.\n", + /* 15*/ "Robots de maintenance activ駸.\n", + /* 16*/ "Robots de maintenance reprogramm駸.\n", + /* 17*/ "Portes s馗urit d騅errouill馥s.\n", + /* 18*/ "Cycle de maintenance activ.\n", + /* 19*/ "Cycle nettoyage activ.\n", + /* 20*/ "Op駻ation refus馥 - robots occup駸.\n", + /* 21*/ "Robots de maintenance d駸activ駸.\n", + /* 22*/ "Objet crucial d騁ruit.\n", + /* 23*/ "Syst鑪e robots maintenance d駸activ.\n", + /* 24*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 25*/ "Qui 黎es-vous?\n", + /* 26*/ "Pertes inacceptables de scientifiques.\n", + /* 27*/ "Terminal inactif.\n", + /* 28*/ "Coupure des syst鑪es actifs.\n", + /* 29*/ "Exp駻ience interrompue.\n", + /* 30*/ "Alarme activ馥.\n", + /* 31*/ "Alarme d駸activ馥.\n", + /* 32*/ "Ne me tuez pas! Je vais vous aider.\n", + /* 33*/ "Qu'est-ce que vous foutez ici?\n", + /* 34*/ "Je vais vous aider...\n", + /* 35*/ "Zut alors. J'ai fait une b黎ise.\n", + /* 36*/ "ACCES REFUSE - code de s馗urit requis.\n", + /* 37*/ "Recherche mot de passe.\n", + /* 38*/ ".", + /* 39*/ "Mot de passe localis - d駻ivation serrure.\n", + /* 40*/ "Contact rompu - r騁ablissement connexion.\n", + /* 41*/ "Porte de s馗urit d駛 d騅errouill馥.\n", + /* 42*/ "Exp駻ience d駛 interrompue.\n", + /* 43*/ "Etrange - l'exp駻ience est d駛 arr黎馥!\n", + /* 44*/ "Quelqu'un a cass mon PC!\n", + /* 45*/ "Obtenir Vue nocturne.\n", + /* 46*/ "Cassandra De Vries: \n", + /* 47*/ "Vue nocturne\n", + /* 48*/ "Mallette de De Vries\n", + /* 49*/ "Vue nocturne obtenue.\n", + /* 50*/ "Obtenir objet de tech bouclier.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Objet de tech bouclier\n", + /* 53*/ "Mallette de De Vries\n", + /* 54*/ "objet de tech bouclier obtenu.\n", + /* 55*/ "Obtenir r馗epteur.\n", + /* 56*/ "\n", + /* 57*/ "R馗epteur\n", + /* 58*/ "Un r馗epteur\n", + /* 59*/ "R馗epteur obtenu.\n", + /* 60*/ "Connexion 騁ablie.\n", + /* 61*/ "Sas de maintenance ouvert.\n", + /* 62*/ "Sas de maintenance d駛 ouvert.\n", + /* 63*/ "ATTENTION - radioactivit d騁ect馥.\n", + /* 64*/ "Que faites-vous dans mon labo?\n", + /* 65*/ "Je ne vous connais pas...\n", + /* 66*/ "Vous 黎es qui, bordel?\n", + /* 67*/ "Arr黎ez l'exp駻ience.\n", + /* 68*/ "Eteignez-moi tout 軋. MAINTENANT!\n", + /* 69*/ "Coupez ce truc.\n", + /* 70*/ "Je vais l'騁eindre.\n", + /* 71*/ "Ne me faites pas de mal!\n", + /* 72*/ "Je vais vous aider.\n", + /* 73*/ "Mes exp駻iences!\n", + /* 74*/ "Voil. C'est 騁eint.\n", + /* 75*/ "Partez... TOUT DE SUITE!\n", + /* 76*/ "S馗urit!\n", + /* 77*/ "J'appelle la s馗urit.\n", + /* 78*/ "Oups. Je me suis tromp...\n", + /* 79*/ "Comment s'est arriv?\n", + /* 80*/ "C'est d駛 騁eint on dirait.\n", + /* 81*/ "Vous avez jou avec 軋, ou quoi?\n", + /* 82*/ "On a tout cass mon 駲uipement!\n", + /* 83*/ "Qu'est-il arriv mon terminal?\n", + /* 84*/ "Racaille, va! Tout est fichu!\n", + /* 85*/ "Connexion perdue - exp駻iences en cours.\n", + /* 86*/ "Objet exp駻imental 1 obtenu.\n", + /* 87*/ "Objet exp駻imental 2 obtenu.\n", + /* 88*/ "Objet exp駻imental 3 obtenu.\n", + /* 89*/ "Obtenir CamSpy.\n", + /* 90*/ "Dr. Caroll: \n", + /* 91*/ "CamSpy\n", + /* 92*/ "Une CamSpy\n", + /* 93*/ "CamSpy obtenue.\n", + /* 94*/ "C'est le secteur le plus prot馮 - Le Dr. Caroll \ndoit s'y trouver.\n", + /* 95*/ "Quelque chose dans les environs consomme beaucoup d'駭ergie.\n", + /* 96*/ "Reprogrammez ce robot de nettoyage - \nil vous fera entrer.\n", + /* 97*/ "Sortez, Joanna! La radioactivit est 駘ev馥. \nUtilisez la CamSpy.\n", + /* 98*/ "Compartiment armes secr鑼es ouvert.\n", + /* 99*/ "Ennemi d騁ect - coffre d'armes ferm.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, 黎es-vous ici?\n", + /*102*/ "Tout...tout danger est 馗art?\n", + /*103*/ "Oui. Tout va bien.\n", + /*104*/ "M...Mais... vous...\n", + /*105*/ "Belle manoeuvre, mon enfant. Il n'y a pas de\ntemps perdre. Nous devons partir!\n", + /*106*/ "Allons. J'ai des informations vitales \nr騅駘er et vous devez me prot馮er.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_g.c b/src/files/lang/pal-final/ear_str_g.c new file mode 100644 index 000000000..0628e05ce --- /dev/null +++ b/src/files/lang/pal-final/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgefhrt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelst wird. Auf keinen Fall drfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Bringen Sie die experimentellen Technologien in Ihren Besitz!\n\nDr. Caroll hat uns darber informiert, dass noch drei weitere Projekte kurz vor dem Abschluss stehen. Ihre Aufgabe ist es, die drei Prototypen zu finden und diese an das Carrington Institut zur Evaluierung zu bergeben. \n\n|5. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 1*/ "UNTERGRUND-LABOR\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgefhrt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelst wird. Auf keinen Fall drfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit besch臟tigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er h舩te sich bei der dataDyne-Fhrung ber die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befrchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie mssen Ihren Uplink einsetzen, um den Sektor betreten zu knnen, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivit舩en vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er knnte ntzlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgefhrt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Finden Sie Dr. Caroll!\n", + /* 10*/ "Unterbrechen Sie alle Experimente!\n", + /* 11*/ "Starten Sie den Wartungszyklus!\n", + /* 12*/ "Finden Sie die technischen Experimente!\n", + /* 13*/ "Holografieren Sie die Isotope!\n", + /* 14*/ "Maschineller Soundeffekt\n", + /* 15*/ "Wartungsroboter aktiviert\n", + /* 16*/ "Wartungsroboter umprogrammiert\n", + /* 17*/ "Sicherheitstren entriegelt\n", + /* 18*/ "Wartungszyklus aktiviert\n", + /* 19*/ "Wartungszyklus-Routine aktiviert.\n", + /* 20*/ "Unerlaubte Operation - Roboter sind besch臟tigt.\n", + /* 21*/ "Wartungsroboter deaktiviert\n", + /* 22*/ "Wichtiges Objekt zerstrt\n", + /* 23*/ "Wartungssystem ist offline.\n", + /* 24*/ "MISSION FEHLGESCHLAGEN \n - Erreichung aller Ziele unmglich\n", + /* 25*/ "Wer sind Sie?\n", + /* 26*/ "Es sind unschuldige Wissenschaftler zu Schaden gekommen.\n", + /* 27*/ "Das Terminal ist nicht aktiv.\n", + /* 28*/ "Aktive Systeme werden heruntergefahren.\n", + /* 29*/ "Das Experiment wurde abgeschaltet.\n", + /* 30*/ "Alarm wurde aktiviert.\n", + /* 31*/ "Alarm wurde deaktiviert.\n", + /* 32*/ "Nicht schie゚en - Ich helfe Ihnen.\n", + /* 33*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 34*/ "Lassen Sie mich Ihnen helfen.\n", + /* 35*/ "Unf舁le passieren manchmal.\n", + /* 36*/ "ZUGRIFF VERWEIGERT - Sicherheitscode erforderlich.\n", + /* 37*/ "Passwort wird gesucht.\n", + /* 38*/ ".", + /* 39*/ "Passwort gefunden - Verriegelung wird umgangen.\n", + /* 40*/ "Kontakt abgebrochen - Link muss wiederhergestellt werden.\n", + /* 41*/ "Sicherheitstr wurde bereits entriegelt.\n", + /* 42*/ "Experiment wurde bereits abgeschaltet.\n", + /* 43*/ "Eigenartig - das Experiment ist bereits abgebrochen worden!\n", + /* 44*/ "Es sieht so aus, als h舩te jemand meinen PC besch臈igt.\n", + /* 45*/ "Erlangen Sie das Nachtsichtger舩.\n", + /* 46*/ "Cassandra De Vries\n", + /* 47*/ "Nachtsichtger舩\n", + /* 48*/ "Aktenkoffer von De Vries\n", + /* 49*/ "Nachtsichtger舩 aufgenommen\n", + /* 50*/ "Finden Sie den Prototypen.\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Prototyp\n", + /* 53*/ "De Vries Aktenkoffer\n", + /* 54*/ "Prototyp aufgenommen\n", + /* 55*/ "Finden sie das Data Uplink-Ger舩.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink-Ger舩\n", + /* 58*/ "Ein Data Uplink-Ger舩\n", + /* 59*/ "Data Uplink-Ger舩 aufgenommen\n", + /* 60*/ "Verbindung hergestellt\n", + /* 61*/ "Wartungsklappe wurde geffnet.\n", + /* 62*/ "Wartungsklappe ist bereits offen.\n", + /* 63*/ "WARNUNG - Radioaktive Substanz entdeckt!\n", + /* 64*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 65*/ "Ich habe Sie hier noch nie gesehen...\n", + /* 66*/ "Wer sind Sie, verdammt noch mal?\n", + /* 67*/ "Brechen Sie das Experiment ab!\n", + /* 68*/ "Ziehen Sie den Stecker raus, SOFORT!\n", + /* 69*/ "Schalten Sie das Ding ab!\n", + /* 70*/ "Ich schalte es ab.\n", + /* 71*/ "Bitte tun Sie mir nichts!\n", + /* 72*/ "Erlauben Sie mir, Ihnen zu helfen.\n", + /* 73*/ "Meine Experimente!\n", + /* 74*/ "Da! Das Experiment ist abgeschaltet!\n", + /* 75*/ "Verschwinden Sie von hier - SOFORT!\n", + /* 76*/ "Security!\n", + /* 77*/ "Ich alarmiere die Security.\n", + /* 78*/ "Unf舁le knnen passieren.\n", + /* 79*/ "Wie konnte das geschehen?\n", + /* 80*/ "Sieht so aus, als w舐e es bereits abgeschaltet.\n", + /* 81*/ "Haben Sie daran herumgefummelt?\n", + /* 82*/ "Jemand hat meine Ausrstung zerstrt!\n", + /* 83*/ "Was ist mit dem Terminal geschehen?\n", + /* 84*/ "Du Vandale - du hast es zerstrt!\n", + /* 85*/ "Verbindung abgebrochen - Experimente sind noch aktiv.\n", + /* 86*/ "Experimentelles Objekt Nr. 1 aufgenommen\n", + /* 87*/ "Experimentelles Objekt Nr. 2 aufgenommen\n", + /* 88*/ "Experimentelles Objekt Nr. 3 aufgenommen\n", + /* 89*/ "Finden Sie den CamSpy.\n", + /* 90*/ "Dr. Carolls\n", + /* 91*/ "CamSpy\n", + /* 92*/ "Ein CamSpy\n", + /* 93*/ "CamSpy aufgenommen\n", + /* 94*/ "Dies ist der Hochsicherheitssektor - Dr. Caroll \nmuss ganz nahe sein.\n", + /* 95*/ "Etwas in diesem Areal verbraucht extrem viel Strom.\n", + /* 96*/ "Programmieren Sie den Wartungsroboter um! \nMit seiner Hilfe kommen Sie weiter.\n", + /* 97*/ "Mach, dass du raus kommst, Jo! Die Strahlung ist zu stark. \nSetz den CamSpy ein.\n", + /* 98*/ "Geheimes Waffenschott geffnet\n", + /* 99*/ "Feind entdeckt - Waffenspeicher verriegelt\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, sind Sie da?\n", + /*102*/ "Ka... kann ich jetzt rauskommen?\n", + /*103*/ "Ja, Sie sind jetzt sicher.\n", + /*104*/ "Wa..was... Sie sind...\n", + /*105*/ "Sehr professionell, meine Liebe, aber wir \ndrfen keine Zeit verlieren! Wir mssen sofort hier raus!\n", + /*106*/ "Kommen Sie. Ich habe wichtige Informationen, und Sie \nmssen mich beschtzen!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_i.c b/src/files/lang/pal-final/ear_str_i.c new file mode 100644 index 000000000..69d4b19ce --- /dev/null +++ b/src/files/lang/pal-final/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ci ti permetter di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Procurati strumento tecnologico sperimentale\n\nIl Dr. Caroll ci ha informato della presenza di altri tre importanti progetti in fase di completamento nei laboratori di fianco al suo. Dovrai raccogliere i prototipi dei tre progetti e portarli al Carrington Institute per l'analisi.\n\n|Obiettivo 5: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 1*/ "LABORATORIO SOTTERRANEO\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ci ti permetter di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finch non accetter la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attivit elettromagnetica l vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sar utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Localizza il Dr. Caroll\n\nIl sotterraneo suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizza il Dr. Caroll\n", + /* 10*/ "Interrompi gli esperimenti\n", + /* 11*/ "Inizia manutenzione sistemi\n", + /* 12*/ "Procurati le tecnologie sperimentali\n", + /* 13*/ "Isotopo olografico radioattivo\n", + /* 14*/ "Effetti sonori macchine\n", + /* 15*/ "Attivati robot di manutenzione\n", + /* 16*/ "Riprogrammati robot di manutenzione\n", + /* 17*/ "Aperte porte di sicurezza\n", + /* 18*/ "Attivato ciclo di manutenzione\n", + /* 19*/ "Attivato ciclo di pulizia di routine\n", + /* 20*/ "Operazione impossibile: robot impegnati\n", + /* 21*/ "Disattivati robot di manutenzione\n", + /* 22*/ "Distrutto strumento essenziale alla missione\n", + /* 23*/ "Sistema robot di manutenzione non in linea\n", + /* 24*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 25*/ "Chi sei?\n", + /* 26*/ "Vittime inaccettabili: uccisi scienziati\n", + /* 27*/ "Terminale non attivo\n", + /* 28*/ "Spegnimento sistemi attivi...\n", + /* 29*/ "Interrotto esperimento\n", + /* 30*/ "Allarme attivato\n", + /* 31*/ "Allarme disattivato\n", + /* 32*/ "Non sparare! Ti aiuter!\n", + /* 33*/ "Cosa diavolo ci fai nel mio laboratorio?\n", + /* 34*/ "Ti dar una mano.\n", + /* 35*/ "Eh s! Succede...\n", + /* 36*/ "ACCESSO NEGATO: inserire codice di sicurezza\n", + /* 37*/ "Ricerca password in corso...\n", + /* 38*/ ".", + /* 39*/ "Trovata password: blocco eliminato\n", + /* 40*/ "Contatto interrotto: ristabilire connessione\n", + /* 41*/ "Porta di sicurezza gi aperta\n", + /* 42*/ "Esperimento gi interrotto\n", + /* 43*/ "Strano: l'esperimento gi chiuso!\n", + /* 44*/ "Qualcuno deve aver manomesso il mio PC!\n", + /* 45*/ "Procurati Vista Notturna\n", + /* 46*/ "Cassandra De Vries:\n", + /* 47*/ "Vista Notturna\n", + /* 48*/ "Cartella di De Vries\n", + /* 49*/ "Presa Vista Notturna\n", + /* 50*/ "Procurati strum. tecn. scudo\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Strum. tecn. scudo\n", + /* 53*/ "Cartella di De Vries\n", + /* 54*/ "Preso strum. tecn. scudo\n", + /* 55*/ "Procurati Connettore Dati.\n", + /* 56*/ "\n", + /* 57*/ "C. Dati\n", + /* 58*/ "Connettore Dati\n", + /* 59*/ "Preso Connettore Dati.\n", + /* 60*/ "Stabilita connessione\n", + /* 61*/ "Sportello di manutenzione aperto\n", + /* 62*/ "Sportello di manutenzione gi aperto\n", + /* 63*/ "ATTENZIONE! Materiale radioattivo!\n", + /* 64*/ "Cosa ci fai nel mio laboratorio?\n", + /* 65*/ "Non ti ho mai visto prima...\n", + /* 66*/ "Chi diavolo sei?\n", + /* 67*/ "Interrompi l'esperimento.\n", + /* 68*/ "Stacca la spina! SUBITO!\n", + /* 69*/ "Spegni quest'affare!\n", + /* 70*/ "Va bene! Lo chiudo!\n", + /* 71*/ "Non farmi del male!\n", + /* 72*/ "Lascia che t'aiuti.\n", + /* 73*/ "I miei esperimenti!\n", + /* 74*/ "Ecco, l'esperimento interrotto.\n", + /* 75*/ "Ora vattene! SUBITO!\n", + /* 76*/ "Sicurezza!\n", + /* 77*/ "Chiamer la sicurezza!\n", + /* 78*/ "Eh s! Succede...\n", + /* 79*/ "Com' potuto succedere?\n", + /* 80*/ "Sembra che sia gi spento!\n", + /* 81*/ "Ci hai messo le mani tu?\n", + /* 82*/ "Qualcuno ha manomesso la strumentazione!\n", + /* 83*/ "Cos' successo al terminale?\n", + /* 84*/ "L'hai rotto, maledizione!\n", + /* 85*/ "Connessione interrotta: esperimento ancora attivo\n", + /* 86*/ "Trovato strumento sperimentale 1\n", + /* 87*/ "Trovato strumento sperimentale 2\n", + /* 88*/ "Trovato strumento sperimentale 3\n", + /* 89*/ "Procurati TeleSpia.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "TeleSpia\n", + /* 93*/ "Presa la TeleSpia.\n", + /* 94*/ "Questo il principale settore di sicurezza: \nil Dr. Caroll non pu essere lontano.\n", + /* 95*/ "C' qualcosa che consuma un sacco qua!\n", + /* 96*/ "Riprogramma quella scatola di latta: \nti dar una mano ad entrare.\n", + /* 97*/ "Attenzione! I piani sono troppo alti.\n Usa la TeleSpia!\n", + /* 98*/ "Aperto compartimento armi segrete\n", + /* 99*/ "Intercettato nemico: bloccato compartimento armi.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, qui dentro?\n", + /*102*/ "Si pu uscire? Via libera?\n", + /*103*/ "S, nessun problema!\n", + /*104*/ "Che... cosa... lei ...\n", + /*105*/ "Molto professionale, mia cara, ma non c' \ntempo da perdere! Dobbiamo uscire subito di qui!\n", + /*106*/ "Andiamo! Sono a conoscenza di informazioni \ndi vitale importanza e tu devi proteggermi!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_s.c b/src/files/lang/pal-final/ear_str_s.c new file mode 100644 index 000000000..22dcf0736 --- /dev/null +++ b/src/files/lang/pal-final/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del 疵ea de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitir llegar m疽 lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios est疣 causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los cdigos de seguridad. Obliga a los cientficos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los cientficos.\n\n|Objetivo Cuatro: - Obtener Objetos de Tecnologa Experimental\n\nEl Dr. Caroll nos inform de que hay otros tres grandes proyectos a punto de ser terminados en los laboratorios adem疽 del suyo. Debes recoger los prototipos de los tres proyectos y traerlos al Instituto Carrington para su evaluacin.\n\n|Objetivo Cinco: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 1*/ "LABORATORIO DEL SOTANO\n", + /* 2*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del 疵ea de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitir llegar m疽 lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios est疣 causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los cdigos de seguridad. Obliga a los cientficos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los cientficos.\n\n|Objetivo Cuatro: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn cientfico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quej a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurar疣 mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexin remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magn騁ica en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los cientficos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser til.\n\n|Objetivo Uno: - Holografiar Istopos Radioactivos\n\nUsa la C疥ara Espa para obtener una foto espectrogr畴ica de los istopos en pruebas en los laboratorios subterr疣eos de dataDyne. El Dr. Caroll ha conectado los istopos a una mejora del actual escudo tecnolgico experimental, tambi駭 presente en los laboratorios.\n\n|Objetivo Dos: - Localizar al Dr. Caroll\n\nEl stano est dividido en cuatro zonas de seguridad: el Dr. Caroll est en la ltima de estas 疵eas, sector cuatro. Entre medias de estos sectores hay sistemas diseados para alejar a los no autorizados, como t. Evtalos lo mejor que puedas, y busca al cientfico en el sector final.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizar al Dr. Caroll\n", + /* 10*/ "Detener los experimentos\n", + /* 11*/ "Iniciar ciclo de mant. de seguridad\n", + /* 12*/ "Obtener experimentos tecnolgicos\n", + /* 13*/ "Holografiar istopos radioactivos\n", + /* 14*/ "Efectos de sonido Fx de maquinaria.\n", + /* 15*/ "Robots de mantenimiento activados.\n", + /* 16*/ "Robots de mantenimiento reprogramados.\n", + /* 17*/ "Puertas de seguridad desbloqueadas.\n", + /* 18*/ "Ciclo de mantenimiento activado.\n", + /* 19*/ "Rutina del ciclo de limpieza activada.\n", + /* 20*/ "Operacin no permitida: robots ocupados.\n", + /* 21*/ "Robots de mantenimiento desactivados.\n", + /* 22*/ "Objeto crtico de la misin destruido.\n", + /* 23*/ "Sistema de mantenimiento de robots apagado.\n", + /* 24*/ "MISIモN FALLADA:\n no se pueden completar los objetivos.\n", + /* 25*/ "ソQui駭 eres t?\n", + /* 26*/ "Bajas de cientficos inaceptables.\n", + /* 27*/ "El terminal no est activo.\n", + /* 28*/ "Quitando energa a los sistemas activos.\n", + /* 29*/ "El experimento ha sido detenido.\n", + /* 30*/ "Alarma activada.\n", + /* 31*/ "Alarma desactivada.\n", + /* 32*/ "No me dispares: te ayudar.\n", + /* 33*/ "ソQu demonios est疽 haciendo en mi laboratorio?\n", + /* 34*/ "D駛ame ayudarte.\n", + /* 35*/ "Pueden ocurrir accidentes.\n", + /* 36*/ "ACCESO DENEGADO - cdigo de seguridad requerido.\n", + /* 37*/ "Buscando el cdigo.\n", + /* 38*/ ".", + /* 39*/ "Cdigo localizado - abriendo cerradura.\n", + /* 40*/ "Contacto perdido - reestableciendo contacto.\n", + /* 41*/ "La puerta de seguridad ya ha sido abierta.\n", + /* 42*/ "El experimento ya ha sido apagado.\n", + /* 43*/ "。Qu extrao: el experimento ya est detenido!\n", + /* 44*/ "Parece que alguien ha roto mi PC.\n", + /* 45*/ "Obt駭 Visin Nocturna.\n", + /* 46*/ "Cassandra De Vries :\n", + /* 47*/ "V. Nocturna\n", + /* 48*/ "Maletn de De Vries\n", + /* 49*/ "Visin Nocturna obtenida.\n", + /* 50*/ "Obt駭 el escudo tecnolgico.\n", + /* 51*/ "Cassandra de Vries:\n", + /* 52*/ "Escudo tecnolgico\n", + /* 53*/ "Maletn de De Vries\n", + /* 54*/ "Escudo tecnolgico obtenido.\n", + /* 55*/ "Obt駭 Conector de Datos.\n", + /* 56*/ "\n", + /* 57*/ "C. Datos\n", + /* 58*/ "Un Conector de Datos\n", + /* 59*/ "Conector de Datos obtenido.\n", + /* 60*/ "Conexin establecida.\n", + /* 61*/ "La rejilla de mantenimiento est abierta.\n", + /* 62*/ "La rejilla de mantenimiento ya est abierta.\n", + /* 63*/ "PELIGRO - material radioactivo detectado.\n", + /* 64*/ "ソQu est疽 haciendo en mi laboratorio?\n", + /* 65*/ "No te he visto antes...\n", + /* 66*/ "ソQui駭 demonios eres?\n", + /* 67*/ "Det駭 el experimento.\n", + /* 68*/ "Tira del enchufe, AHORA.\n", + /* 69*/ "Apaga esa cosa.\n", + /* 70*/ "Lo apagar.\n", + /* 71*/ "Por favor, no me haga dao.\n", + /* 72*/ "D駛eme ayudarle.\n", + /* 73*/ "。Mi experimento!\n", + /* 74*/ "Ya, el experimento est detenido.\n", + /* 75*/ "。Deja este 疵ea AHORA!\n", + /* 76*/ "。Seguridad!\n", + /* 77*/ "Estoy avisando a seguridad.\n", + /* 78*/ "Pueden ocurrir accidentes.\n", + /* 79*/ "ソCmo pudo ocurrir?\n", + /* 80*/ "Parece que ya est apagado.\n", + /* 81*/ "ソHas estado tocando esto?\n", + /* 82*/ "Alguien ha roto mi equipo.\n", + /* 83*/ "ソQu le ha pasado al terminal?\n", + /* 84*/ "Cafre. Lo has roto.\n", + /* 85*/ "Conexin perdida: experimentos todava activos.\n", + /* 86*/ "Objeto experimental 1 obtenido.\n", + /* 87*/ "Objeto experimental 2 obtenido.\n", + /* 88*/ "Objeto experimental 3 obtenido.\n", + /* 89*/ "Obt駭 la C疥ara Espa.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "C疥ara Espa\n", + /* 92*/ "Una C疥ara Espa\n", + /* 93*/ "C疥ara Espa obtenida.\n", + /* 94*/ "ノste es el sector de mayor seguridad: el Dr. Caroll \ndebe estar cerca.\n", + /* 95*/ "Algo est usando mucha energa por aqu.\n", + /* 96*/ "Reprograma ese robot de limpieza: \nte permitir entrar.\n", + /* 97*/ "。Sal, Joanna! Los niveles son demasiado altos. \nUsa la C疥ara Espa.\n", + /* 98*/ "Compartimento de armas secreto abierto.\n", + /* 99*/ "Enemigo detectado: arsenal de armas cerrado.\n", + /*100*/ "ソDr. Caroll?\n", + /*101*/ "Dr. Caroll, ソest usted aqu?\n", + /*102*/ "Pero, ソes seguro salir?\n", + /*103*/ "S, todo despejado.\n", + /*104*/ "ソQu... qu... eres...?\n", + /*105*/ "。Muy profesional, querida, pero no hay tiempo \nque perder! 。Debemos irnos inmediatamente!\n", + /*106*/ "Vamos. Tengo informacin vital, y t \ndebes protegerme.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/eldE.c b/src/files/lang/pal-final/eldE.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-final/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eldJ.c b/src/files/lang/pal-final/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/pal-final/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eldP.c b/src/files/lang/pal-final/eldP.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-final/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_f.c b/src/files/lang/pal-final/eld_str_f.c new file mode 100644 index 000000000..85e9682a3 --- /dev/null +++ b/src/files/lang/pal-final/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Eliminer les snipers du toit\n\nApr鑚 avoir re輹 la demande de ran輟n, nous avons effectu un vol de reconnaissance au-dessus de la villa. Nos prises de vues r騅鑞ent la pr駸ence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les 駘iminer.\n\n|Objectif 2: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Trouver et neutraliser les pirates\n\nA de nombreuses reprises, les hackers de la dataDyne ont tent de pirater les fichiers de l'Institut. Leur t稍he sera plus facile s'ils interviennent directement dans la villa. S'ils lancent une telle op駻ation, vous devrez agir promptement. Assurez-vous aussi que les terminaux contenant des donn馥s vitales pour l'Institut ne sont pas endommag駸.\n\n|Objectif 4: - Capturer un garde ennemi\n\nCapturer un membre de l'駲uipe d'assaut de la dataDyne nous donnerait une id馥 de leurs plans. Surtout ne le tuez pas: assommez-le si vous le pouvez, ainsi il ne pourra pas s'馗happer.\n\n|Objectif 5: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la n馮ociatrice\n\nUn membre de l'Institut s'est port volontaire pour cr馥r une diversion pendant votre entr馥 sur les lieux. Elle sera tr鑚 certainement execut馥 par les soldats de la dataDyne si vous ne la tirez pas de l tr鑚 rapidement. D駱lacez-vous en rampant.\n\n|Objectif 2: - Eliminer les snipers du toit\n\nApr鑚 avoir re輹 la demande de ran輟n, nous avons effectu un vol de reconnaissance au-dessus de la villa. Nos prises de vues r騅鑞ent la pr駸ence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les 駘iminer.\n\n|Objectif 3: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 4: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa priv馥. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nomm馥 Dr. Caroll. Un 駘駑ent que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimul馥 avant leur arriv馥.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la n馮ociatrice\n\nUn membre de l'Institut s'est port volontaire pour cr馥r une diversion pendant votre entr馥 sur les lieux. Elle sera tr鑚 certainement execut馥 par les soldats de la dataDyne si vous ne la tirez pas de l tr鑚 rapidement. D駱lacez-vous en rampant.\n\n|Objectif 2: - Activer l'駮lienne\n\nL'駮lienne et les accumulateurs d'駭ergie sont coup駸. Nous pensons que Daniel est le responsable de cette manoeuvre visant emp鹹her les troupes de la dataDyne d'acc馘er aux syst鑪es de la villa. Une fois le courant r騁abli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Sauver Carrington\n\nSeul Daniel connat la position du Dr. Caroll. Tt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une mani鑽e ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Sauver la n馮ociatrice\n", + /* 6*/ "Eliminer les snipers du toit\n", + /* 7*/ "Activer l'駮lienne\n", + /* 8*/ "Trouver et neutraliser les pirates\n", + /* 9*/ "Sauver Carrington\n", + /* 10*/ "Capturer un garde ennemi\n", + /* 11*/ "N馮ociatrice abattue.\n", + /* 12*/ "Snipers 駘imin駸.\n", + /* 13*/ "N馮ociatrice en s馗urit.\n", + /* 14*/ "Refroidisseurs activ駸.\n", + /* 15*/ "Refroidisseurs d駸activ駸.\n", + /* 16*/ "G駭駻ateurs activ駸.\n", + /* 17*/ "G駭駻ateurs d駸activ駸.\n", + /* 18*/ "Eolienne r饌ctiv馥.\n", + /* 19*/ "Eolienne d駸activ馥.\n", + /* 20*/ "Courant r騁abli dans la villa.\n", + /* 21*/ "Objet crucial d騁ruit.\n", + /* 22*/ "Joanna! C'est Grimshaw. Il y a des hackers dans \nla villa! Arr黎ez-les avant\n qu'ils ne piratent nos fichiers!\n", + /* 23*/ "Les hackers ont copi les fichiers vitaux.\n", + /* 24*/ "Hackers 駘imin駸.\n", + /* 25*/ "Carrington sauv.\n", + /* 26*/ "Objectifs incomplets - mission 馗hou馥.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Fusil sniper\n", + /* 29*/ "Garde ennemi enlev.\n", + /* 30*/ "Obtenir cl de porte.\n", + /* 31*/ "Garde: \n", + /* 32*/ "Cl de porte\n", + /* 33*/ "Cl de porte\n", + /* 34*/ "Cl de porte obtenue.\n", + /* 35*/ "Si je r饌ctive l'駮lienne, je pourrai \nr騁ablir le courant dans le sous-sol.\n", + /* 36*/ "Je dois faire vite ou ils tueront la \nn馮ociatrice!\n", + /* 37*/ "Ils doivent garder Daniel ici.\n", + /* 38*/ "Je dois arr黎er les hackers avant de \nsauver Daniel.\n", + /* 39*/ "Journal de mission de l'agent Dark, 18:46. \nNous avons re輹 un appel de Cassandra de Vries hier soir. \nUne 駲uipe de la dataDyne retient Daniel Carrington \nen otage dans sa villa priv馥 sur la cte, \net 駱argnera sa vie en 馗hange de l'IA.\n", + /* 40*/ "Malheureusement, nous ne l'avons pas. Daniel et \nle Dr. Caroll 騁aient tous deux dans la villa \npour un 'arrangement'. Il semblerait que \nDaniel ait pu dissimuler le Dr. Caroll dans la \nvilla lors de l'arriv馥 des troupes de la \ndataDyne.\n", + /* 41*/ "Par chance notre ruse 'de la n馮ociatrice' \nme donnera l'occasion de surprendre les \nsoldats de la dataDyne. Cette fois il ne \ns'agit pas que de ma propre vie.\n", + /* 42*/ "Monsieur? Etes-vous bless?\n", + /* 43*/ "Non, Joanna. Je vais bien. Mais ces \nordures de la dataDyne m'ont fait dire \no se trouvait le Dr. Caroll. Si seulement \nj'avais pu tenir une minute de plus...\n", + /* 44*/ "Ce n'est pas de votre faute. J'aurais d \nfaire plus vite.\n", + /* 45*/ "Le Dr. Caroll m'a confi qu'il s'attendait \n une telle action. De plus, les hommes \nde la dataDyne, fiers de leur succ鑚, \nont discut alors que je faisais semblant \nd'黎re inconscient. Ils ont mentionn une \nrencontre dans l'immeuble G5 de Chicago, \nen Illinois, ce soir. Vous devez vous y \nrendre, bien qu'il ne vous reste que \npeu de temps pour vous pr駱arer.\n", + /* 46*/ "Aucun probl鑪e, monsieur. Le Dr. Caroll \na-t-il pu vous r騅駘er des informations \nimportantes?\n", + /* 47*/ "En effet, tr鑚 importantes. \nJe vous brieferai sur la route de \nChicago. Nous pourrons peut-黎re encore \nl'aider, m麥e si ces sadiques lui enl钁ent \nsa personnalit. Il veulent en garder \nune sauvegarde l'abri. Il est \nenfin temps que j'appelle certains amis \npour s'occuper de la dataDyne.\n", + /* 48*/ "Op駻ation refus馥 - 駮lienne active.\n", + /* 49*/ "Mission 馗hou馥 - garde ennemi non captur.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_g.c b/src/files/lang/pal-final/eld_str_g.c new file mode 100644 index 000000000..be60715cc --- /dev/null +++ b/src/files/lang/pal-final/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Eliminieren Sie die Scharfschtzen auf dem Dach!\n\nGleich nachdem wir die Forderungen bermittelt bekommen haben, wurde von uns ein Aufkl舐ungsflug ber der Villa durchgefhrt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschtzen auf den D臘hern positioniert wurden. Es ist von hchster Notwendigkeit, diese Schtzen zu eliminieren.\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Finden und stoppen Sie die dataDyne-Hacker!\n\nIn der Vergangenheit hat es sporadische Versuche von dataDyne-Hackern gegeben, Zugriff auf die Daten des Instituts zu erhalten. Es wrde ihre Arbeit stark vereinfachen, wenn sie in der Villa auf die Direktverbindung zum Institut zugreifen knnten. Sollte dies der Fall sein, mssen Sie rasch reagieren. Achten Sie allerdings darauf, dass die Terminals nicht besch臈igt werden drfen, da sonst das Institut Daten der Priorit舩sstufe 1 verliert.\n\n|4. Ziel: - Nehmen Sie eine Wache gefangen!\n\nDie Gefangennahme eines Mitglieds der dataDyne-Truppe verschafft uns Einblick in ihre tats臘hlichen Vorhaben. Sie drfen diese Wachen nicht eliminieren, sondern nur bewusstlos schlagen. Dadurch verhindern Sie auch eine Flucht.\n\n|5. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Retten Sie die Unterh舅dlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Eliminieren Sie die Scharfschtzen auf dem Dach!\n\nGleich nachdem wir die Forderungen bermittelt bekommen haben, wurde von uns ein Aufkl舐ungsflug ber der Villa durchgefhrt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschtzen auf den D臘hern positioniert wurden. Es ist von hchster Notwendigkeit, diese Schtzen zu eliminieren.\n\n|3. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|4. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht wei゚, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfgbar.\n\n|1. Ziel: - Retten Sie die Unterh舅dlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Frher oder sp舩er wird auch dataDyne auf diesen Trichter kommen. Sp舩estens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben fr sie keinen Wert mehr.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Retten Sie die Unterh舅dlerin!\n", + /* 6*/ "Eliminieren Sie die Scharfschtzen!\n", + /* 7*/ "Aktivieren Sie den Generator!\n", + /* 8*/ "Stoppen Sie die Hacker!\n", + /* 9*/ "Retten Sie Carrington!\n", + /* 10*/ "Nehmen Sie eine Wache gefangen!\n", + /* 11*/ "Die Unterh舅dlerin wurde verloren.\n", + /* 12*/ "Die Scharfschtzen wurden eliminiert.\n", + /* 13*/ "Die Unterh舅dlerin konnte sich in Sicherheit bringen.\n", + /* 14*/ "Khlsysteme wurden aktiviert.\n", + /* 15*/ "Khlsysteme wurden deaktiviert.\n", + /* 16*/ "Stromversorgung wurde aktiviert.\n", + /* 17*/ "Stromversorgung wurde deaktiviert.\n", + /* 18*/ "Windmhle wurde aktiviert.\n", + /* 19*/ "Windmhle wurde deaktiviert.\n", + /* 20*/ "Die Stromversorgung der Villa wurde wiederhergestellt.\n", + /* 21*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 22*/ "Joanna! Hier spricht Grimshaw. In der Villa befinden \n sich Hacker! Sie mssen Sie aufhalten, \n bevor sie an unsere Daten gelangen!\n", + /* 23*/ "Die Hacker haben geheime Daten kopiert.\n", + /* 24*/ "Die Hacker wurden eliminiert.\n", + /* 25*/ "Carrington wurde gerettet.\n", + /* 26*/ "Es wurden nicht alle Ziele erreicht - die Mission ist fehlgeschlagen.\n", + /* 27*/ "Laptop-Gewehr\n", + /* 28*/ "Sniper-Gewehr\n", + /* 29*/ "Feindliche Wache wurde kampfunf臧ig gemacht.\n", + /* 30*/ "Finden Sie den Schlssel!\n", + /* 31*/ "Schlssel\n", + /* 32*/ "der Wache\n", + /* 33*/ "Schlssel\n", + /* 34*/ "Schlssel aufgenommen\n", + /* 35*/ "Wenn ich den Windkraft-Generator aktiviere, \nsteht auch die Stromversorgung im Keller wieder.\n", + /* 36*/ "Ich muss schnell sein, oder der Unterh舅dler \nist verloren!\n", + /* 37*/ "Hier mssen sie Daniel gefangenhalten.\n", + /* 38*/ "Bevor ich Daniel rette, mssen diese Hacker \ngestoppt werden.\n", + /* 39*/ "Agent Dark Missions-Logbuch, 18.46 Uhr. Letzte \nNacht erhielten wir einen Anruf von Cassandra de Vries. \nEin dataDyne-Trupp hat Daniel Carrington \nin seiner Villa an der Kste als Geisel genommen. \nSie sagen, dass sie sein Leben im Austausch \nfr die KI schonen werden.\n", + /* 40*/ "Unglcklicherweise haben wir die KI nicht. Daniel und \nDr. Caroll waren in der Villa, um 'Themen von \nbeiderseitigem Interesse' zu besprechen. Es sieht \nso aus, als h舩te Daniel einen Weg gefunden, Dr. Caroll \nin der Villa zu verstecken, bevor die dataDyne-Truppen \neingetroffen sind.\n", + /* 41*/ "Ich hoffe, dass mir unser Unterh舅dler-Trick \nzu einer Chance verhilft, die dataDyne-Truppen zu \nberraschen. Diesmal geht es nicht nur um mein \nLeben...\n", + /* 42*/ "Sir? Sind Sie verletzt?\n", + /* 43*/ "Nein, Joanna, ich bin okay, aber diese dataDyne-\nSchl臠er haben aus mir herausgeprgelt, wo ich \nDr. Caroll versteckt habe. Wenn ich nur noch ein \npaar Minuten l舅ger durchgehalten h舩te...\n", + /* 44*/ "Es ist nicht Ihre Schuld, Sir. Ich h舩te schneller \nsein mssen.\n", + /* 45*/ "Machen Sie sich keine Vorwrfe! Dr. Caroll \nhat mir gesagt, dass er diesen Zug erwartet hat. \nAls sie ihn gefunden haben, sind die dataDyne-Leute \netwas unvorsichtig geworden. Sie dachten, ich w舐e \nbewusstlos und haben darber gesprochen, wohin sie \nihn bringen. Sie erw臧nten ein Meeting im \nG5-Building in Chicago, Illinois, noch heute Nacht.\nIch mchte, dass Sie dorthin gehen, aber das \nbedeutet, dass Sie nicht viel Zeit haben, um sich \nauf die Mission vorzubereiten.\n", + /* 46*/ "Das soll nicht das Problem sein, Sir. Konnte \nIhnen Dr. Caroll wenigstens einige ntzliche \nInformationen weitergeben?\n", + /* 47*/ "Oh ja, das konnte er. Ich werde Sie weiterinformieren, \nwenn Sie sich auf dem Weg nach Chicago befinden. \nWir sind noch immer in der Lage, ihm zu helfen, \nselbst wenn diese Schl臘hter seine Persnlichkeit \nver舅dern. Er glaubt, dass sie eine Sicherungskopie \nseiner Daten haben. Es ist wohl an der Zeit, dass ich \nmich mit ein paar Freunden unterhalte, die mit dataDyne \nabrechnen werden.\n", + /* 48*/ "Unzul舖sige Operation - Windmhle ist aktiv.\n", + /* 49*/ "Mission nicht erfolgreich - Feindliche Wache wurde nicht gefangen.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_i.c b/src/files/lang/pal-final/eld_str_i.c new file mode 100644 index 000000000..2655e5787 --- /dev/null +++ b/src/files/lang/pal-final/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Localizza e blocca gli hacker dataDyne\n\nIn passato gli hacker dataDyne hanno effettuato sporadici tentativi di accedere ai file dell'istituto. Ora avrebbero la vita molto pi facile provando dall'interno della villa, grazie al nostro collegamento diretto con l'istituto. Se agiscono in tal senso dovrai rispondere repentinamente! Evita qualsiasi danno ai terminali poich contengono dati di fondamentale importanza per l'istituto.\n\n|Obiettivo 4: - Cattura la guardia dataDyne\n\nSe riuscissimo a catturare un componente della squadra d'assalto dataDyne, saremmo in grado di farci finalmente un'idea in merito ai loro obiettivi. Ricorda di non ucciderlo: colpiscilo facendo perdere loro i sensi, in modo da impedirne la fuga.\n\n|Obiettivo 5: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 1*/ "VILLA DI CARRINGTON \n", + /* 2*/ "|Situazione:\n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sar sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 3: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 4: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDaniel Carrington tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ci che la dataDyne ancora non sa che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sar sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Salva Carrington\n\nDaniel l'unico che conosce il luogo in cui nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprir e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il il nascondiglio dell'automa la vita di Daniel bell'e perduta!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Salva la mediatrice\n", + /* 6*/ "Elimina i cecchini sul tetto\n", + /* 7*/ "Attiva il generatore eolico\n", + /* 8*/ "Localizza e blocca gli hacker dataDyne\n", + /* 9*/ "Salva Carrington\n", + /* 10*/ "Cattura la guardia dataDyne\n", + /* 11*/ "La mediatrice stata uccisa.\n", + /* 12*/ "I cecchini sono stati eliminati.\n", + /* 13*/ "La mediatrice si messa in salvo.\n", + /* 14*/ "Attivato l'impianto di raffreddamento\n", + /* 15*/ "Disattivato l'impianto di raffreddamento\n", + /* 16*/ "Attivati gli accumulatori energetici\n", + /* 17*/ "Disattivati gli accumulatori energetici\n", + /* 18*/ "Riattivato il generatore eolico\n", + /* 19*/ "Disattivato il generatore eolico\n", + /* 20*/ "Ristabilita l'elettricit nella villa\n", + /* 21*/ "Distrutto strumento essenziale alla missione.\n", + /* 22*/ "Joanna! Sono Grimshaw. Ci sono degli hacker \nnella villa! Devi fermarli prima che \n mettano le mani sui file.\n", + /* 23*/ "Gli hacker hanno scaricato dati essenziali.\n", + /* 24*/ "Gli hacker sono stati eliminati.\n", + /* 25*/ "Carrington stato salvato.\n", + /* 26*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 27*/ "Pistola Laptop\n", + /* 28*/ "Fucile cecchino\n", + /* 29*/ "Sconfitta la guardia nemica\n", + /* 30*/ "Procurati chiave porta\n", + /* 31*/ "Guardia:\n", + /* 32*/ "Chiave porta\n", + /* 33*/ "Chiave porta\n", + /* 34*/ "Presa chiave porta\n", + /* 35*/ "Riattivando il generatore eolico, \npotr portare l'elettricit \nnel sotterraneo inferiore.\n", + /* 36*/ "Devo fare alla svelta o \nuccideranno la mediatrice!\n", + /* 37*/ "Daniel dev'essere imprigionato qui!\n", + /* 38*/ "Devo fermare gli hacker prima \ndi salvare Daniel!\n", + /* 39*/ "Missione dell'Agente Dark, ore 18.46. La notte\nscorsa abbiamo ricevuto una chiamata di Cassandra \nde Vries. Una squadra dataDyne ha preso in ostaggio \nDaniel Carrington nella sua villa sulla costa. \nDicono che lo risparmieranno in cambio \ndell'automa.\n", + /* 40*/ "Sfortunatamente, non ce l'abbiamo noi. \nDaniel e il Dr. Caroll erano alla villa \nper discutere 'questioni di interesse \nreciproco'. Sembra che Daniel abbia trovato \nil modo di nascondere il Dr. Caroll prima \nche arrivasse la squadra dataDyne.\n", + /* 41*/ "Speriamo che il nostro piano della falsa \nmediatrice mi permetta di sorprendere la \nsquadra dataDyne. Stavolta non c' solo \nla mia vita in gioco!\n", + /* 42*/ "ネ ferito, signore?\n", + /* 43*/ "No, Joanna, tutto bene, ma quelle bestie \ndella dataDyne mi hanno costretto a dir loro \ndove ho nascosto il Dr. Caroll. Se solo \navessi resistito qualche minuto in pi...\n", + /* 44*/ "Non colpa sua, signore! Avrei \ndovuto fare pi in fretta io!\n", + /* 45*/ "Non essere troppo dura con te stessa, Jo. \nIl Dr. Caroll si aspettava una cosa del \ngenere. Anzi, dopo averlo catturato la \nsquadra dataDyne ha guadagnato sicurezza \ne, credendomi svenuto, si lasciata \nsfuggire un paio di cosette interessanti. \nHanno parlato di una riunione prevista per\nquesta notte nell'Edificio G5 a Chicago, \nIllinois! Voglio che tu sia l, ma certo\nnon ti resta molto tempo per prepararti! \n", + /* 46*/ "Non c' problema, signore! Allora, \nil Dr. Caroll le ha dato informazioni \nutili?\n", + /* 47*/ "Oh, certo, eccome! Ti racconter ogni \nparticolare durante il tuo viaggio verso \nChicago. Possiamo ancora salvarlo, anche \nse quei macellai riescono a manipolargli \nil cervello. Ritiene che ne conservino una \ncopia in un posto sicuro. ネ proprio ora \ndi contattare alcuni amici perch si \noccupino della dataDyne!\n", + /* 48*/ "OPERAZIONE IMPOSSIBILE - Generatore attivo\n", + /* 49*/ "MISSIONE FALLITA - Guardia nemica non catturata\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_s.c b/src/files/lang/pal-final/eld_str_s.c new file mode 100644 index 000000000..824e87b8b --- /dev/null +++ b/src/files/lang/pal-final/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deber疽 eliminarlos.\n\n|Objetivo Dos: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Tres: - Localizar y Detener a los 'Hackers' de dataDyne\n\nEn el pasado ha habido intentos espor疆icos de los 'hackers' de dataDyne de acceder a los ficheros del Instituto. Su trabajo ser mucho m疽 f當il si lo intentan desde la villa, debido a la conexin directa con el Instituto. Si se hace ese intento, necesitar疽 responder r疳idamente. Asegrate de que los terminales no son daados, ya que contienen datos vitales para el Instituto.\n\n|Objetivo Cuatro: - Capturar a Guarda Enemigo\n\nCapturar a un miembro del equipo de asalto de dataDyne nos dar una idea de sus intenciones reales. Recuerda no matarles: d駛alos inconscientes si puedes, ya que esto nos asegurar que no escapen.\n\n|Objetivo Cinco: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distraccin para ayudarte a entrar. Es casi seguro que esa persona ser abatida por los soldados de dataDyne a menos que acabes con ellos r疳idamente. Tienes que ser muy r疳ida.\n\n|Objetivo Dos: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deber疽 eliminarlos.\n\n|Objetivo Tres: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Cuatro: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como reh駭 en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los t駻minos: la vida de Daniel a cambio de la devolucin de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distraccin para ayudarte a entrar. Es casi seguro que esa persona ser abatida por los soldados de dataDyne a menos que acabes con ellos r疳idamente. Tienes que ser muy r疳ida.\n\n|Objetivo Dos: - Activar Generador Elico\n\nEl generador elico y el almacenador de energa no est疣 activos: creemos que Daniel los apag para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energa, la puerta de la villa que va al stano inferior se abrir para ti.\n\n|Objetivo Tres: - Rescatar a Carrington\n\nSlo Daniel conoce el paradero del Dr. Caroll. M疽 tarde o m疽 temprano, dataDyne se lo imaginar y empezar疣 a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde est la IA, la vida de Daniel est perdida.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Salvar al negociador\n", + /* 6*/ "Eliminar francotiradores del tejado\n", + /* 7*/ "Activar generador elico\n", + /* 8*/ "Localizar y eliminar 'hackers'\n", + /* 9*/ "Rescatar a Carrington\n", + /* 10*/ "Capturar guarda de dataDyne \n", + /* 11*/ "El negociador ha muerto.\n", + /* 12*/ "Los francotiradores han sido eliminados.\n", + /* 13*/ "El negociador ha escapado a lugar seguro.\n", + /* 14*/ "Los sistemas de refrigeracin han sido activados.\n", + /* 15*/ "Los sistemas de refrigeracin han sido desactivados.\n", + /* 16*/ "Los sistemas de energa han sido activados.\n", + /* 17*/ "Los sistemas de energa han sido desactivados.\n", + /* 18*/ "La torre elica ha sido activada.\n", + /* 19*/ "La torre elica ha sido desactivada.\n", + /* 20*/ "La electricidad ha sido restablecida en la Villa.\n", + /* 21*/ "Objeto crtico de la misin destruido.\n", + /* 22*/ "。Joanna! Grimshaw al habla. 。Tenemos 'hackers' en \nla villa! Debes detenerles antes de que accedan\n a nuestros ficheros.\n", + /* 23*/ "Los 'hackers' han descargado datos vitales.\n", + /* 24*/ "Los 'hackers' han sido eliminados.\n", + /* 25*/ "Carrington ha sido rescatado.\n", + /* 26*/ "Objetivos no completados: misin fallada.\n", + /* 27*/ "Arma PC\n", + /* 28*/ "Rifle Fr\n", + /* 29*/ "Guarda enemigo ha sido dominado.\n", + /* 30*/ "Obt駭 la llave de la puerta.\n", + /* 31*/ "Guarda:\n", + /* 32*/ "Llave de la Puerta\n", + /* 33*/ "Llave de la Puerta\n", + /* 34*/ "Llave de la Puerta obtenida.\n", + /* 35*/ "Si conecto de nuevo el generador elico, \ntendremos energa en el stano inferior.\n", + /* 36*/ "。Tengo que ser r疳ida, o matar疣 \nal negociador!\n", + /* 37*/ "Aqu es donde deben tener retenido a Daniel.\n", + /* 38*/ "Esos 'hackers' deben ser detenidos antes \n de que rescate a Daniel.\n", + /* 39*/ "Informe de la Misin de la Agente Dark, 18:46 horas. \nAnoche tuvimos una llamada de Cassandra De Vries. \nUn equipo de dataDyne tiene a Daniel Carrington \nretenido en su villa privada en la costa, \ny dicen que respetar疣 su vida a cambio \nde la IA.\n", + /* 40*/ "Desafortunadamente, no la tenemos. Daniel y el \nDr. Caroll estaban en la villa para discutir \n'materias de mutuo inter駸'. Parece que Daniel \nencontr un modo de esconder al Dr. Caroll en \nla villa cuando el escuadrn de dataDyne \nirrumpi all.\n", + /* 41*/ "Con un poco de suerte nuestro ardid del falso \nnegociador me dar una oportunidad de sorprender \nal escuadrn de dataDyne. Esta vez no slo mi \nvida est en juego.\n", + /* 42*/ "Seor, ソest herido?\n", + /* 43*/ "No, Joanna, estoy bien, pero esos matones \nde dataDyne me han hecho contarles donde \nesconda al Dr. Caroll. Si hubiera aguantado \nunos minutos m疽...\n", + /* 44*/ "No fue su culpa, seor. Deb ser \nm疽 r疳ida.\n", + /* 45*/ "No te culpes, Joanna. El Dr. Caroll \nme dijo que esperaba que esto ocurriera. \nEn realidad, cuando fue recapturado, el \nequipo de dataDyne, en un exceso de confianza, \ndej caer algunas cosas, ya que pensaban que \nestaba inconsciente. Mencionaron una reunin \nen el Edificio G5 en Chicago, Illinois, esta \nnoche. Quiero que est駸 all, pero esto no \nte deja mucho tiempo para prepararte.\n", + /* 46*/ "Eso no ser un problema, seor. As que, \nソel Dr. Caroll le dio alguna informacin \ntil para usted?\n", + /* 47*/ "Oh, claro que s. Ciertamente lo hizo, y \nte har un breve resumen cuando est駸 de \ncamino a Chicago. Todava podemos ser capaces \nde ayudarle, incluso aunque esos carniceros \neliminen su personalidad. ノl cree que ellos \nguardar疣 una copia en un lugar seguro. Es \ncuestin de tiempo que llame a unos \namigos para que se encarguen de dataDyne.\n", + /* 48*/ "Operacin denegada - el molino est activo.\n", + /* 49*/ "Misin no conseguida - guarda enemigo no capturado.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/gunE.c b/src/files/lang/pal-final/gunE.c new file mode 100644 index 000000000..7e8cd94c1 --- /dev/null +++ b/src/files/lang/pal-final/gunE.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", +}; diff --git a/src/files/lang/pal-final/gunJ.c b/src/files/lang/pal-final/gunJ.c new file mode 100644 index 000000000..d5b72fb56 --- /dev/null +++ b/src/files/lang/pal-final/gunJ.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, +}; diff --git a/src/files/lang/pal-final/gunP.c b/src/files/lang/pal-final/gunP.c new file mode 100644 index 000000000..7e8cd94c1 --- /dev/null +++ b/src/files/lang/pal-final/gunP.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", +}; diff --git a/src/files/lang/pal-final/gun_str_f.c b/src/files/lang/pal-final/gun_str_f.c new file mode 100644 index 000000000..bfb4e0300 --- /dev/null +++ b/src/files/lang/pal-final/gun_str_f.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Frags", + /* 2*/ "Mort(e) 1 fois\n", + /* 3*/ "Mort(e)", + /* 4*/ "fois", + /* 5*/ "Suicides", + /* 6*/ "Mains nues\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Fusil pompe\n", + /* 26*/ "Reaper\n", + /* 27*/ "L-roquettes\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Grenade maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Fusil sniper\n", + /* 33*/ "Arbal鑼e\n", + /* 34*/ "Tranquil.\n", + /* 35*/ "Couteau combat\n", + /* 36*/ "Grenade\n", + /* 37*/ "Bombe-N\n", + /* 38*/ "Mine retard.\n", + /* 39*/ "Mine prox.\n", + /* 40*/ "Mine t駘馗om.\n", + /* 41*/ "Mine CME\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Costume\n", + /* 44*/ "Roquette\n", + /* 45*/ "T黎e cherch.\n", + /* 46*/ "Munit. grenade\n", + /* 47*/ "Laser\n", + /* 48*/ "Carreau\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Sp馗ial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Vue nocturne\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "D馗odeur\n", + /* 64*/ "Explosifs\n", + /* 65*/ "Scanner X\n", + /* 66*/ "Medkit\n", + /* 67*/ "Mallette\n", + /* 68*/ "Costume\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Pisteur R\n", + /* 71*/ "Mallette\n", + /* 72*/ "Pilule suicide\n", + /* 73*/ "Occulteur\n", + /* 74*/ "Boost combat\n", + /* 75*/ "R馗epteur\n", + /* 76*/ "Scanner Horizon\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L-roquettes\n", + /* 81*/ "Mine prox.\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Couteau\n", + /* 84*/ "DY357\n", + /* 85*/ "Tir simple\n", + /* 86*/ "Tir rapide\n", + /* 87*/ "Tir explosif\n", + /* 88*/ "Etripage\n", + /* 89*/ "Tir simple\n", + /* 90*/ "Effet Rail-gun\n", + /* 91*/ "Roquette\n", + /* 92*/ "Roquette cibl馥\n", + /* 93*/ "Radioguidage\n", + /* 94*/ "Coup de crosse\n", + /* 95*/ "Balles explosives\n", + /* 96*/ "Tirs guid駸\n", + /* 97*/ "Vider chargeur\n", + /* 98*/ "Lance-grenades\n", + /* 99*/ "Attache-mur\n", + /*100*/ "Coup de poing\n", + /*101*/ "D駸armer\n", + /*102*/ "Verr. cible\n", + /*103*/ "Utiliser Scope\n", + /*104*/ "Moiti chargeur\n", + /*105*/ "Double tir\n", + /*106*/ "Hachoir\n", + /*107*/ "Endormir\n", + /*108*/ "Injection mortelle\n", + /*109*/ "Coup de couteau\n", + /*110*/ "Lancer empoisonn饅n", + /*111*/ "Localisateur cible\n", + /*112*/ "Mort instantan馥\n", + /*113*/ "Boost\n", + /*114*/ "Retour\n", + /*115*/ "Perce-blindage\n", + /*116*/ "Occulter\n", + /*117*/ "D駱loyer sentinelle\n", + /*118*/ "Autodestruct. prox.\n", + /*119*/ "D騁ecteur danger\n", + /*120*/ "Explosif retard.\n", + /*121*/ "Explosif prox.\n", + /*122*/ "Explosif t駘馗om.\n", + /*123*/ "D騁onation\n", + /*124*/ "Fusible 4 secs\n", + /*125*/ "Pinball prox.\n", + /*126*/ "D騁onation retard.\n", + /*127*/ "D騁onation prox.\n", + /*128*/ "Tir 3 balles\n", + /*129*/ "Tir charg饅n", + /*130*/ "S'accroupir\n", + /*131*/ "Infecter\n", + /*132*/ "Impulsion\n", + /*133*/ "Courte port馥\n", + /*134*/ "D騁onation impact\n", + /*135*/ "Ampli lumi鑽e\n", + /*136*/ "Cam駻a mobile\n", + /*137*/ "Vision rayons X\n", + /*138*/ "Image thermique\n", + /*139*/ "Zoom\n", + /*140*/ "App. brouillage\n", + /*141*/ "Connecter\n", + /*142*/ "Identifier cibles\n", + /*143*/ "Porter costume\n", + /*144*/ "Placer explosifs\n", + /*145*/ "Vue t駘escopique\n", + /*146*/ "Silencieux\n", + /*147*/ "Rallonge chargeur\n", + /*148*/ "Vue laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "M麥e sans arme, vous demeurez une menace pour vos ennemis. Vos poings peuvent assommer ou d駸armer un ennemi pour lui voler son arme.\n", + /*156*/ "Pr馗is et fiable, c'est l'arme de base des op駻ations de l'Institut. La vis馥 laser sert localiser les tirs. Utiliser aussi la crosse pour assommer les ennemis.\n", + /*157*/ "Un Falcon 2 am駘ior, b駭馭iciant d'un silencieux tr鑚 utile.\n", + /*158*/ "Un Falcon 2 am駘ior, b駭馭iciant d'un scope d'agrandissement x2 pour profiter d'une grande pr馗ision.\n", + /*159*/ "Un pistolet de l'arm馥 dernier cri utilis par les forces de l'ordre. Il poss鐡e un l馮er zoom et lance trois balles en mode de tir secondaire.\n", + /*160*/ "C'est l'arme de pr馘ilection de tout Skedar qui se respecte. Un grand chargeur et un canon ray font de ce pistolet une arme de poing formidable, surtout gr稍e son tir secondaire: charger le tir pour plus de puissance en utilisant plusieurs munitions.\n", + /*161*/ "Le dataDyne DY357 est la plus puissante des armes de poing. Ses balles poss鐡ent un facteur de p駭騁ration 駘ev et repoussent la cible de leur poids et leur puissance. Des mod鑞es customis駸 sont fabriqu駸 pour des clients importants. On raconte que Trent Easton, le directeur de la NSA en poss鐡e un plaqu or.\n", + /*162*/ "Le DY357-LX a 騁 con輹 la demande du directeur de la NSA, Trent Easton. En plus de poss馘er une crosse en peau de tigre, ce pistolet d'or poss鐡e un canon ray et utilise des balles haute v駘ocit. C'est une arme meurtri鑽e.\n", + /*163*/ "L'arme standard Maian. Elle peut au choix tirer des balles normales ou des balles explosives, sans modifier la consommation de munitions.\n", + /*164*/ "Un classique de la dataDyne tr鑚 r駱andu. Cette arme automatique tire des rafales de calibre 32 et poss鐡e une capacit sp馗iale: verrouiller une cible. Elle fait du profane un tireur d'駘ite. Cadence de tir moyenne: 900 cpm.\n", + /*165*/ "Le fusil d'assaut principal de l'Institut Carrington. Une port馥 et un grand chargeur font de cette arme un excellent choix. Le tir secondaire permet de se d駱lacer tout en ciblant un ennemi. Cadence de tir moyenne: 750 cpm.\n", + /*166*/ "Un fusil d'assaut standard avec un ct vicieux: lorsque le mode secondaire est activ, il devient une mine de proximit aux apparences d'un fusil. Cadence de tir moyenne: 700 cpm.\n", + /*167*/ "Une variante du fusil d'assaut Dragon: plutt qu'un explosif de proximit, il poss鐡e un mini lance-grenades. Une arme excellente. Cadence de tir moyenne: 700 cpm.\n", + /*168*/ "Une autre arme high-tech de la dataDyne. Un fusil d'assaut poss馘ant un chargeur plus petit et un impact puissant, qui peut d騁ecter les explosifs, les armes sentinelles et autres pi鑒es du m麥e ordre. Cadence de tir moyenne: 950 cpm.\n", + /*169*/ "Con輹 pour les gardes du corps, le Cyclone a 騁 choisi par le service de s馗urit du Pr駸ident gr稍e son efficacit en mati鑽e de r駱ression. En cas d'urgence, il peut doubler sa cadence de tir, vidant son chargeur en moins d'une seconde. Cadence de tir moyenne: 900 cpm. Se vide 2000 cpm.\n", + /*170*/ "L'arme secr鑼e de l'Institut Carrington. Elle tire une cadence ph駭om駭ale et contient 駭orm駑ent de munitions. Le mode secondaire est un occulteur qui consomme les munitions. Une arme d騅astatrice. Cadence de tir moyenne: 1100 cpm.\n", + /*171*/ "Un autre exemple du g駭ie maian. Il peut tirer des balles normales aussi vite qu'un autre pistolet-mitrailleur, ou tirer des projectiles rapides p駭騁rant facilement les obstacles vous s駱arant d'une cible. Seul d駸avantage du mode secondaire: la cadence de tir est plus lente et la pr馗ision est diminu馥 par la puissance du coup. Cadence de tir moyenne: 900 cpm (tir sec. 300 cpm).\n", + /*172*/ "Un PC portable qui peut tirer une fois transform en mitrailleuse. Il peut 黎re utilis comme PC mais un contrle minutieux r騅駘era la supercherie. Cadence de tir moyenne: 1000 cpm.\n", + /*173*/ "Une arme de la dataDyne fabriqu馥 par les services de s馗urit. Un chargeur de 9 balles est coupl un mode de tir simple ou double, faisant de cette arme un atout en combat rapproch.\n", + /*174*/ "Con輹 pour 黎re mani par un utilisateur plus fort qu'un humain. Sa cadence de tir ultra rapide en fait une v駻itable machine d馗hiqueter, tr鑚 efficace dans les couloirs. \nCadence de tir maximum: 1800 cpm.\n", + /*175*/ "Une arme encombrante. Elle tire soit une roquette normale soit un missile plus lent mais t黎e chercheuse, pouvant verrouiller un ennemi.\n", + /*176*/ "Un lance-grenades de longue port馥 fabriqu par la dataDyne. Le tir secondaire recouvre les grenades d'une substance collante. Une fois projet馥, la bombe se fixe sur un mur ou un plafond. Apr鑚 quelques secondes, elle se d騁ache et tombe au sol pour exploser.\n", + /*177*/ "Les Skedars aiment inspirer la terreur chez leurs ennemis. Il est donc naturel pour eux de disposer d'une roquette command馥 distance comme tir secondaire de leur lance-roquettes. Ils ont ainsi le plaisir de voir leur proie tenter de s'enfuir devant un projectile mortel.\n", + /*178*/ "Le fusil FarSight est un appareil maian combinant un scanner rayons X et un lance-projectiles traversant les 駘駑ents solides. Le traceur peut rep駻er et verrouiller une forme de vie mais ne peut compenser les d駱lacements rapides d'un ennemi en pleine course.\n", + /*179*/ "B駭馭iciant d'un puissant zoom et de balles haute v駘ocit, cette arme de l'Institut Carrington est l'un des meilleurs fusils de sniper. S'accroupir permet une meilleure pr馗ision.\n", + /*180*/ "Cette arbal鑼e est une arme de courte port馥 mont馥 sur le poignet de l'agent de l'Institut Carrington. Elle se plie pour mieux se dissimuler et peut tirer jusqu' 5 carreaux anesth駸iants ou mortels.\n", + /*181*/ "Un appareil tir rapide utilis en cas d'urgence mais plus souvent en seringue hypodermique pour injecter un s馘atif. Les utilisateurs sont inform駸 qu'une dose trop importante peut entraner la mort.\n", + /*182*/ "Un tr鑚 long couteau de combat. Il contient un r駸ervoir de poison se brisant l'impact et tuant la cible en moins de 6 secondes. Une arme sign馥 dataDyne.\n", + /*183*/ "Une version am駘ior馥 de la grenade. Elle peut 黎re utilis馥 avec un d騁onateur de 4 secondes ou en tant que bombe effet de ricochet.\n", + /*184*/ "Une bombe neutrons faible zone d'effet. Elle peut se d馗lencher l'impact ou 黎re r馮l馥 en mode de proximit.\n", + /*185*/ "Une mine dot馥 d'un d騁onateur de courte dur馥. Elle poss鐡e un d騁ecteur et 騅aluateur activer en mode secondaire.\n", + /*186*/ "Une mine dot馥 d'un d騁onateur de proximit. Elle poss鐡e un d騁ecteur de menace activ en mode secondaire.\n", + /*187*/ "Une mine d馗lencher distance. La commande d'activation est la fonction secondaire.\n", + /*188*/ "Un appareil 駘ectronique de brouillage, capable d'engendrer une panne 駘ectrique sur n'importe quel syst鑪e sur lequel il est fix.\n", + /*189*/ "Un laser de poignet meurtrier et ultra pr馗is. Il peut lancer des impulsions de longue distance ou maintenir un flux continu et concentr courte distance.\n", + /*190*/ "Une drogue de combat chimique. Une fois absorb馥, elle permet des r饌ctions plus rapides.\n", + /*191*/ "Le dernier de la ligne de scopes 'starlight' amplifiant la lumi鑽e ambiante pour une image plus claire des environs. Cet appareil utilise un algorithme de mouvement pour identifier les menaces possibles.\n", + /*192*/ "Cet appareil utilise la meilleure des applications en mati鑽e d'anti-gravit. Il poss鐡e un lien audio/vid駮 avec une fonction d'enregistrement et d'holographie spectroscopique.\n", + /*193*/ "Un scope de courte port馥 pouvant voir travers toute mati鑽e - m麥e le plomb - et produisant une repr駸entation chromatique simplifi馥 des environs.\n", + /*194*/ "Ce scope utilise un scanner infrarouge modul par ultrason pour donner une image claire des environs et la position des irr馮ularit駸 de structure. Il peut aussi localiser les ennemis occult駸 ou utilisant un appareil de brouillage optique.\n", + /*195*/ "Il utilise les capacit駸 d'un cristal extraterrestre pour cr馥r une champs de r馭raction de la lumi鑽e autour de l'utilisateur. Il ne peut fonctionner si une turbulence cin騁ique p駭鑼re dans le champ. Ouvrir le feu annule les effets du champ.\n", + /*196*/ "Un scanner optique binoculaire de longue port馥. Le viseur affiche une image composite de deux sources d'entr馥. Il poss鐡e aussi un zoom.\n", + /*197*/ "Il peut enregistrer n'importe quelles donn馥s et les envoyer au service informatique de l'Institut. Une variante de cet appareil permet aux pirates d'騁ablir un lien direct entre eux et le terminal connect.\n", + /*198*/ "Un pisteur puissant param騁rer sur les humains, les armes, les objets, ou encore les emplacements g駮graphiques.\n", + /*199*/ "Un scanner m馘ical modifi contenant les derni鑽es donn馥s de l'騁at de sant du Pr駸ident ainsi qu'un r駸um de tous les traitements administr駸. Il peut monitorer les fonctions vitales du Pr駸ident distance m麥e s'il se trouve au milieu d'une foule.\n", + /*200*/ "Un passe-partout 駘ectronique. Il ouvre les serrures cod馥s en quelques secondes mais un syst鑪e tr鑚 駘abor lui prendra plus de temps.\n", + /*201*/ "Une merveille m馘icale maian pouvant effectuer un diagnostique automatique et une intervention chirurgicale sans aucune incision. Un seul d馭aut: il ne reconnat et donc ne fonctionne que sur des organismes maians.\n", + /*202*/ "Une petite charge de plastique explosive coupl馥 une horloge scell馥 et impossible d駸amorcer, le tout rev黎u de shrapnel en t馭lon.\n", + /*203*/ "Une bombe fusion directionnelle placer de telle fa輟n que la charge est point馥 vers le bas. Ceci interrompra les recherches des labos de la dataDyne et fera s'effondrer l'immeuble tout entier.\n", + /*204*/ "Un petit mouchard fixer sur tout relais de communication qui permet d'imiter le signal officiel, 騁ablissant ainsi le lien entre l'Institut et l'agent m麥e dans une zone de brouillage. Il fait partie int馮rante du syst鑪e de communication local cibl.\n", + /*205*/ "Le fonctionnement de ce mouchard sp馗ial est tenu secret. Le m馗anisme d'auto-destruction couvre la majeure partie de l'appareil. Il est tr鑚 probable qu'il soit un exemple de communication mol馗ulaire quantique, ceci expliquant son efficacit.\n", + /*206*/ "Il utilise la technologie de communication quantique pour fournir des informations ultra pr馗ises l'armement en orbite, ceci minimisant les risques de dommages collat駻aux. La m麥e technologie est utilis馥 pour les mouchards pisteurs de l'Institut Carrington.\n", + /*207*/ "Ils d騁aillent les points de navigation et les codes de communication ainsi que les codes et fr駲uences de l'Air Force One. Les codes de cryptage y sont aussi donn駸.\n", + /*208*/ "Toutes les donn馥s se rattachant aux recherches oc饌niques conduites par la dataDyne sur le navire d騁ourn Pelagic II y figurent. Il contient le relev sonar, les donn馥s g駮logiques, les donn馥s sur les artefacts extraterrestres, les 馗hantillons de coque, etc.\n", + /*209*/ "Le dernier enregistrement en date de la personnalit de l'IA Dr. Caroll avant conditionnement c駻饕ral. A utiliser pour 騁ude seulement ou projections th駮riques. Mental corrompu et dangereux. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un m駘ange chimique alt駻ant la perception de la cible. Le bien devient le mal, les m馗hants les gentils, les ennemis et les amis s'intervertissent. Un des nombreux projets du Secteur 51 sign Trent Easton.\n", + /*211*/ "Un uniforme diff駻ent du vtre. Portez-le et jouez la com馘ie.\n", + /*212*/ "PROX.\n", + /*213*/ "RETARD.\n", + /*214*/ "TELECOM.\n", + /*215*/ "SENTINELLE\n", + /*216*/ "IMPACT\n", + /*217*/ "M馮a Roquette\n", + /*218*/ "R馗epteur\n", + /*219*/ "Scan Pr駸.\n", + /*220*/ "Autochirur.\n", + /*221*/ "Bombe skedar\n", + /*222*/ "D駻outeComms\n", + /*223*/ "Pisteur\n", + /*224*/ "Ampli cible\n", + /*225*/ "Plans de vol\n", + /*226*/ "Cassette\n", + /*227*/ "Disque sauv.\n", + /*228*/ "Carte\n", + /*229*/ "Mallette\n", + /*230*/ "Collier\n", + /*231*/ "ScanPresident\n", + /*232*/ "Boost\n", + /*233*/ "Scan X\n", + /*234*/ "ScanHorizon\n", + /*235*/ "Ampli cible\n", + /*236*/ "Dans cette variante de la Camspy, le module d'enregistrement a 騁 remplac par du plastic hautement explosif.\n", + /*237*/ "Cette variante de la Camspy utilise une toxine neuro-active qui provoque un coma presque instantan chez la victime.\n", + /*238*/ "Collier de Cassandra De Vries. Pourvu d'une cl-駑etteur ouvrant les portes courte port馥, qui permet l'acc鑚 aux zones non-autoris馥s. Le mod鑞e Mk3 ne fonctionne que si son propri騁aire est en vie. Niveau de s馗urit AA-1 (gamma).", + /*239*/ "Collier de remplacement de Cassandra De Vries'. Nom d'utilisateur: %s Mot de passe: %s\n", + /*240*/ "Bouclier\n", + /*241*/ "Le bouclier prot鑒e son utilisateur en d騁ectant les attaques et en g駭駻ant momentan駑ent un champ de force concentr pour repousser l'attaque. Le bouclier poss鐡e une quantit d'駭ergie limit馥. Il ne prot鑒e pas l'utilisateur ind馭iniment. Les boucliers sont g駭駻alement activ駸 lorsqu'ils sont port駸, bien que celui-ci soit un prototype inachev.\n", + /*242*/ "Boosts combat\n", + /*243*/ "R馗epteur\n", + /*244*/ "Vue nocturne\n", + /*245*/ "D馗odeur\n", + /*246*/ "Pilule\n", + /*247*/ "Tranquil.\n", + /*248*/ "Autochirur.\n", + /*249*/ "Disque sauv.\n", + /*250*/ "Costume\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Mine t駘馗om.\n", + /*253*/ "Fusil pompe\n", + /*254*/ "Fusil sniper\n", + /*255*/ "Mine retard.\n", +}; diff --git a/src/files/lang/pal-final/gun_str_g.c b/src/files/lang/pal-final/gun_str_g.c new file mode 100644 index 000000000..2f6ebf9fe --- /dev/null +++ b/src/files/lang/pal-final/gun_str_g.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Hits", + /* 2*/ "Ein Fehlversuch\n", + /* 3*/ "Versagt", + /* 4*/ "Fehlversuche", + /* 5*/ "Selber schuld!", + /* 6*/ "unbewaffnet\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (Schalld.)\n", + /* 9*/ "Falcon 2 (Zielf.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop-Gewehr\n", + /* 25*/ "Schrotflinte\n", + /* 26*/ "Reaper\n", + /* 27*/ "Raketenwerfer\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Maianische Granate\n", + /* 31*/ "FS XR-20\n", + /* 32*/ "Sniper-Gewehr\n", + /* 33*/ "Armbrust\n", + /* 34*/ "Bet舫bungs-Gewehr\n", + /* 35*/ "Kampfmesser\n", + /* 36*/ "Granate\n", + /* 37*/ "N-Bombe\n", + /* 38*/ "Zeitznder-Mine\n", + /* 39*/ "Ann臧erungs-Mine\n", + /* 40*/ "Fernznder-Mine\n", + /* 41*/ "ECM-Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Verkleidung\n", + /* 44*/ "Rakete\n", + /* 45*/ "Zielsuch-Rakete\n", + /* 46*/ "Granaten\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolzen\n", + /* 49*/ "Psychosis-Gewehr\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KLO1313\n", + /* 53*/ "KF7 Spezial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Nachtsicht-Ger舩\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Tr-Decoder\n", + /* 64*/ "Sprengsatz\n", + /* 65*/ "Rntgen-Scanner\n", + /* 66*/ "extraterrestrisches Medipack\n", + /* 67*/ "Koffer\n", + /* 68*/ "Verkleidung\n", + /* 69*/ "IR-Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Aktenkoffer\n", + /* 72*/ "Suizid-Kapsel\n", + /* 73*/ "Tarnkappe\n", + /* 74*/ "Adrenalin\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizont-Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FS XR-20\n", + /* 80*/ "R-Werfer\n", + /* 81*/ "A-Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Messer\n", + /* 84*/ "DY357\n", + /* 85*/ "Einzelfeuer\n", + /* 86*/ "Schnellfeuer\n", + /* 87*/ "Feuersto゚\n", + /* 88*/ "Streufeuer\n", + /* 89*/ "Schrotflintenfeuer\n", + /* 90*/ "Rail-gun-Effekt\n", + /* 91*/ "Raketenabschuss\n", + /* 92*/ "kalibrierte Rakete\n", + /* 93*/ "Fly-By-Wire-Rakete\n", + /* 94*/ "Schlag \n", + /* 95*/ "Explosiv-Munition\n", + /* 96*/ "gezielte Schsse\n", + /* 97*/ "Magazin-Entleerung\n", + /* 98*/ "Granat-Werfer\n", + /* 99*/ "Wandhaftung\n", + /*100*/ "Schlag\n", + /*101*/ "entwaffnen\n", + /*102*/ "Zielaufschaltung\n", + /*103*/ "Zielfernrohr kompatibel\n", + /*104*/ "halbes Magazin wird entleert\n", + /*105*/ "Doppelschuss\n", + /*106*/ "Schleifer\n", + /*107*/ "Sedativ\n", + /*108*/ "letale Injektion\n", + /*109*/ "Messerstich\n", + /*110*/ "vergiftetes Wurfmesser\n", + /*111*/ "Zielsucher\n", + /*112*/ "sofortige Eliminierung\n", + /*113*/ "Verst舐kung\n", + /*114*/ "Umkehr\n", + /*115*/ "High Impact-Munition\n", + /*116*/ "Tarnung\n", + /*117*/ "Selbstschussanlage\n", + /*118*/ "Ann臧erungsfunktion\n", + /*119*/ "Gefahrenmelder\n", + /*120*/ "verzgerte Explosion\n", + /*121*/ "Expl. bei N臧erung\n", + /*122*/ "ferngez. Explosion\n", + /*123*/ "Detonator\n", + /*124*/ "Vier-Sekunden-Zndung\n", + /*125*/ "Ann臧erungs-Pinball\n", + /*126*/ "Verzgerte Detonation\n", + /*127*/ "Expl. bei N臧erung\n", + /*128*/ "dreifacher Schuss\n", + /*129*/ "aufgeladener Schuss\n", + /*130*/ "Hocken\n", + /*131*/ "infizieren\n", + /*132*/ "Feuerst゚e\n", + /*133*/ "Kurzstrecken-Strahl\n", + /*134*/ "Kontakt-Detonation\n", + /*135*/ "Restlichtverst舐ker\n", + /*136*/ "Mobile Kamera\n", + /*137*/ "Rntgen-Sicht\n", + /*138*/ "Infrarot-Scanning\n", + /*139*/ "Zoom\n", + /*140*/ "Strsender\n", + /*141*/ "Verbindung\n", + /*142*/ "Zielidentifizierung\n", + /*143*/ "Kann angelegt werden\n", + /*144*/ "Sprengs舩ze mssen platziert werden\n", + /*145*/ "Teleskop-Sicht\n", + /*146*/ "Schalld舂pfer\n", + /*147*/ "Magazin-Erweiterung\n", + /*148*/ "Ziel-Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maianisch\n", + /*154*/ "JonesCorp\n", + /*155*/ "Auch ohne Waffen sind Sie ein wrdiger Gegner. Setzen Sie Ihre F舫ste ein, um Gegner niederzuschlagen oder zu entwaffnen. Anschlie゚end knnen Sie deren Waffen aufsammeln.\n", + /*156*/ "Diese zielgenaue und treffsichere Waffe wird von den Mitarbeitern des Instituts bevorzugt eingesetzt. Verwenden Sie die Laser-Zieleinheit, um Schsse punktgenau zu platzieren. Im Gefecht empfiehlt es sich, von der Pistolen-Funktion Gebrauch zu machen.\n", + /*157*/ "Eine verbesserte Falcon 2, die noch zus舩zlich ber einen Schalld舂pfer verfgt.\n", + /*158*/ "Eine verbesserte Falcon 2, die durch ein Pr艘isions-Fernrohr noch zus舩zlich an Genauigkeit gewinnt.\n", + /*159*/ "Eine state-of-the-art Milit舐-Pistole, die haupts臘hlich von Friedenstruppen eingesetzt wird. Die Waffe verfgt ber eine leichte Zoom-Funktion und feuert drei Kugeln gleichzeitig ab (Sekund舐).\n", + /*160*/ "Wenn Sie auf einen Skedar treffen, ist er vermutlich mit dieser Waffe ausgestattet. Ein gro゚es Magazin macht diese Pistole zu einer formidablen Handfeuerwaffe. Aber die Sekund舐-Funktion ist noch bemerkenswerter. Die Feuerkraft kann durch Aufladen verst舐kt werden, kostet aber Munition.\n", + /*161*/ "Die dataDyne DY357 ist die st舐kste Handfeuerwaffe der Welt. Jede Kugel verfgt ber einen hohen Penetrations-Faktor und schleudert das Ziel zurck. Modifizierte Modelle werden nur fr spezielle Kunden angefertigt. NSA-Chef Trent Easton verfgt angeblich ber eine vergoldete Variante.\n", + /*162*/ "Die DY357-LX wurde speziell fr Trent Easton angefertigt. Neben einem mit Tigerleder berzogenen Griff verfgt diese Pistole ber einen integrierten Beschleuniger, der jeder Kugel noch mehr Kraft verleiht.\n", + /*163*/ "Die Maianische Standard-Waffe. Eine flexible Waffe, die in der Lage ist, sowohl normale als auch Explosiv-Geschosse abzufeuern. Bei letzterer Variante wird nicht mehr Munition als sonst verbraucht.\n", + /*164*/ "Ein dataDyne-Klassiker und Bestseller! Dieses Maschinengewehr verfgt ber ein 32er Magazin und eine Sonderfunktion. Jedes sichtbare Ziel kann fixiert werden. Dieses Feature macht jeden durchschnittlichen Schtzen zu einem Profi. Vorausgesetzt natrlich, er oder sie ist intelligent genug, die Waffe zu bedienen. Durchschnittliche Feuerrate: 900 rpm.\n", + /*165*/ "Das Sturmgewehr des Carrington Instituts. Diese Waffe zeichnet sich durch hohe Reichweite und Magazin-Kapazit舩 aus. Die Sekund舐-Funktion ermglicht es dem Schtzen, sich zu bewegen, w臧rend er auf ein Ziel zoomt. Durchschnittliche Feuerrate: 750 rpm.\n", + /*166*/ "Ein Standard-Gewehr mit ワberraschungseffekt. Die Sekund舐-Funktion verwandelt es in eine Mine, die auf Bewegungen reagiert, aber nach wie vor wie ein herumliegendes Gewehr aussieht. Durchschnittliche Feuerrate: 700 rpm.\n", + /*167*/ "Eine Variante des Dragon. Anstatt der Minen-Funktion verfgt die Waffe ber einen kleinen Granat-Werfer. Hervorragend als Untersttzung. Durchschnittliche Feuerrate: 700 rpm.\n", + /*168*/ "High-tech pur von dataDyne. Der Avenger wird als Sturmgewehr eingesetzt. Die wichtigste Funktion ist ein Gefahren-Melder, der auf die Anwesenheit von Sprengkrpern, Selbstschu゚anlagen und トhnlichem reagiert. Durchschnittliche Feuerrate: 950 rpm.\n", + /*169*/ "Speziell fr Bodyguards. Die Cyclone wird auch von der Leibwache des Pr舖identen eingesetzt. In Extremsituationen kann die Feuerrate um mehr als das Doppelte erhht werden. Allerdings wird durch diese Aktion das Magazin in sekundenschnelle geleert. Durchschnittliche Feuerrate: 900 rpm bzw. 2000 rpm.\n", + /*170*/ "Die geheime Waffe des Carrington Instituts. Verfgt ber eine hohe Feuerrate und ein gro゚es Magazin. Die Sekund舐-Funktion aktiviert eine Tarnfunktion, allerdings auf Kosten der Munition. Daher sollte diese Funktion mit gr゚ter Vorsicht gehandhabt werden. Durchschnittliche Feuerrate: 1100 rpm.\n", + /*171*/ "Ein weiteres Beispiel Maianischer Waffentechnik. Diese Waffe feuert normale Munition mit der gleichen Geschwindigkeit ab, wie jedes andere Gewehr. Es sind aber auch Hochgeschwindigkeits-Schsse mglich, die Deckungen durchbrechen knnen. Der Nachteil dabei ist, dass die Feuerrate sinkt und aufgrund des Rcksto゚es die Genauigkeit leidet. Durchschnittliche Feuerrate: 900 rpm bzw. 300 rpm.\n", + /*172*/ "Ein Maschinengewehr, das in der Form eines Laptops designt wurde. In Tarnform kann nicht gefeuert werden. Diese Waffe h舁t auch einer genaueren Untersuchung stand. Sie wird wie jeder PC gebootet, verfgt aber nur ber ein Viertel des Speichers. Durschnittliche Feuerrate: 1000 rpm.\n", + /*173*/ "Eine dataDyne-Waffe fr die hausinterne Security. Ein neunfaches Magazin in Kombination mit Einfach- oder Doppelfeuer macht diese Waffe zu einem gef臧rlichen Nahkampf-Instrument.\n", + /*174*/ "In den H舅den von jemandem, der den starken Rcksto゚ ausgleichen kann, ist dies wohl die schrecklichste aller Waffen. Auf jeden Fall eignet sie sich hervorragend fr Gefechte in engen Korridoren. Maximale Feuerrate: 1800 rpm.\n", + /*175*/ "An und fr sich eine sehr unhandliche Waffe. Sie feuert eine Standard-Rakete oder eine langsamere Zielsuch-Rakete auf das Ziel ab.\n", + /*176*/ "Ein von dataDyne entworfener Granatwerfer. Die Sekund舐funktion umhllt die Granate mit einer klebrigen Substanz, welche die Haftung an W舅den und Decken ermglicht. Einige Sekunden sp舩er f舁lt die Granate zu Boden, wo sie detoniert.\n", + /*177*/ "Die Skedar lieben es, die Angst in den Augen ihrer Gegner zu sehen. Daher ist es beinahe selbstverst舅dlich, dass sie mit der Sekund舐-Funktion ihres Raketenwerfers ein Geschoss fernsteuern knnen. So knnen sie sich an den vergeblichen Fluchtversuchen ihrer Opfer weiden.\n", + /*178*/ "Das Fernsicht-Gewehr ist ein Maianischer Hybrid zwischen einem Rntgen-Scanner und einem Gewehr, das durch feste Objekte schie゚en kann. Das Fernrohr ist in der Lage, langsame lebende Objekte zu erfassen und als festgelegten Zielpunkt zu speichern.\n", + /*179*/ "Ausgestattet mit hervorragender Zoom-F臧igkeit und Hochgeschwindigkeits-Kugeln ist dies wohl eines der besten Sniper-Gewehre aller Zeiten. In geduckter Haltung erzielen Sie die bestmgliche Genauigkeit.\n", + /*180*/ "Die Armbrust ist nicht gr゚er als eine Pistole, und wird am Handgelenk des Agenten befestigt. Die Spannweite der Waffe kann aus Grnden der Geheimhaltung verringert werden. Die Munition umfasst bis zu fnf entweder vergiftete oder regelrecht letale Bolzen.\n", + /*181*/ "Eine Vorrichtung, die im Notfall auch als Waffe benutzt werden kann. Der eigentliche Verwendungszweck dient aber der Verabreichung von Sedativen. Eine volle Entladung des Reservoirs kann durchaus fatale Folgen haben.\n", + /*182*/ "Ein sehr gro゚es Kampfmesser. Es enth舁t eine Giftkapsel, die beim Aufprall nach einem Wurf zerbricht. Das Gift entfaltet im Normalfall nach ca. sechs Sekunden seine Wirkung. Eine typische dataDyne-Waffe.\n", + /*183*/ "Eine verbesserte Version der Granate. Kann sowohl mit verzgerter Detonation als auch mit Ann臧erungs-Sensor eingesetzt werden. \n", + /*184*/ "Eine kleine Neutronenbombe mit reduziertem Wirkungsradius. Die Detonation kann, je nach Wunsch, beim Aufprall oder bei Ann臧erung erfolgen.\n", + /*185*/ "Eine Mine mit verzgerter Detonation. Diese Waffe verfgt ber einen Gefahren-Sensor, der als Sekund舐-Funktion aktiviert werden kann.\n", + /*186*/ "Eine Mine, die auf Bewegung reagiert. Diese Waffe verfgt ber einen Gefahren-Sensor, der als Sekund舐-Funktion aktiviert werden kann.\n", + /*187*/ "Diese Mine kann ferngezndet werden. Die Sekund舐-Funktion stellt quasi die Aktivierung dar.\n", + /*188*/ "Diese Strsender-Vorrichtung ist in der Lage, in jedem System, mit dem sie verbunden ist, eine fokusierte elektrische Strung zu simulieren. Voraussetzung ist ein unmittelbarer Kontakt mit dem System.\n", + /*189*/ "Der Laser wird am Handgelenk getragen und verfgt ber perfekte Pr艘ision. Man kann mit ihm entweder Langstrecken-Energiest゚e oder einen konstanten, hochkonzentrierten Kurstrecken-Energiestrom entladen.\n", + /*190*/ "Genetische Stimulation fr die Anwendung im Kampf. Nach der Anwendung erscheint der zeitliche Ablauf verlangsamt, was eine wesentlich hhere Reaktionsf臧igkeit zur Folge hat.\n", + /*191*/ "Das neueste Produkt in einer Reihe von Ger舩en, das nicht nur Restlicht verst舐kt, um eine klarere Wahrnehmung der Umgebung zu ermglichen, sondern auch mit Hilfe eines Ziel-Algorithmus mgliche Gefahren erkennt und entsprechend hervorhebt.\n", + /*192*/ "Dieses Ger舩 beinhaltet die kleinstmgliche Antigravitations-Technologie. Als ultimative Spionage-Einheit bietet der CamSpy Video- und Audio-Links, Aufzeichnungsfunktion und eine integrierte Vorrichtung fr spektroskopische Holografie.\n", + /*193*/ "Dieser Scanner kann auf kurze Strecken jegliches Material durchleuchten. Blei bildet hier keine Ausnahme! Der Anwender nimmt eine vereinfachte, chromatisierte Darstellung der Umgebung wahr.\n", + /*194*/ "Der IR-Scanner setzt mit Ultraschall modulierte Infrarot-Strahlung ein, um die Umgebung auf strukturelle Irregularit舩en zu untersuchen. Der Anwender erh舁t ein erstaunlich detailliertes Bild der Gegebenheiten. Au゚erdem durchdringt der Scanner auch jegliche Art von Tarnkappen-Technologie und andere optische T舫schungen.\n", + /*195*/ "Diese Maschine nutzt die lichtbrechenden Eigenschaften einer kristallinen extraterrestrischen Substanz, um den Tr臠er unsichtbar erscheinen zu lassen. Solange es zu keinen kybernetischen Strungen kommt, bleibt das Feld intakt. Aber schon der Einsatz einer Waffe unterbricht diese Funktion.\n", + /*196*/ "Ein binokularer Langstrecken-Scanner. Im Sichtfenster erscheint ein Bild, welches aus den beiden optischen Eingaben zusammengestellt wird. Zoom vorhanden.\n", + /*197*/ "Mit Hilfe dieses Ger舩s knnen nahezu alle Arten von gespeicherten Daten abgerufen und direkt an die Hacker des Instituts gesandt werden. Eine Variante dieser Maschine erlaubt den Hackern durch einen direkten Link den Zutritt zum lokalen System.\n", + /*198*/ "Ein ausgezeichnetes Suchger舩, das auf jegliche Parameter konfiguriert werden kann: Personen, Waffen, Gegenst舅de und Orte sind nur ein Bruchteil der Optionen, welche der Tracker anbietet.\n", + /*199*/ "Ein modifizierter medizinischer Scanner, der die aktuellen Vital-Werte des Pr舖identen anzeigt. Es werden auch 舁tere Daten und verschiedene Behandlungen archiviert. Der Scanner ist in der Lage, die entsprechenden Werte auch ber gr゚ere Entfernungen zu erfassen. Dies ist auch mglich, wenn sich das Ziel inmitten einer Menschenmenge befindet.\n", + /*200*/ "Ein einfacher, aber wirkungsvoller Safeknacker, der elektronisch codierte Schlsser normalerweise innerhalb von Sekunden knackt. Selbstverst舅dlich h舅gt dies auch vom jeweiligen Schloss ab.\n", + /*201*/ "Ein Wunder Maianischer Technologie. Dieses Instrument erstellt eine automatische Diagnose und fhrt die entsprechenden chirurgischen Eingriffe OHNE Einschnitte durch. Der Nachteil ist, dass es nur bei Maianern funktioniert.\n", + /*202*/ "Ein kleiner Plastik-Sprengsatz, dessen Timer durch ein Siegel vor Missbrauch geschtzt wird. Die Schrapnelle sind mit Teflon ummantelt. Sehr bse!\n", + /*203*/ "Hierbei handelt es sich um eine direktionale Fusionsbombe, die so platziert wird, dass die Entladung nach unten geht. Dadurch werden die dataDyne-Labors verwstet, und der Rest des Geb舫des strzt in das so entstandene Loch.\n", + /*204*/ "Eine kleine Wanze, die an jedem Kommunikations-Ger舩 angebracht werden kann. Diese Vorrichtung benutzt das Fremdsignal, um eine Verbindung zwischen dem Agenten und dem Institut herzustellen. Das Signal kann auch zurckverfolgt werden, um den Standort des Agenten zu bestimmen. Vor allem in Situationen hchster Bedr舅gnis hat sich der Einsatz hervorragend bew臧rt. Ein unverzichtbares Zubehr fr jeden Agenten.\n", + /*205*/ "Das Innenleben dieser Wanze ist ein gut gehtetes Geheimnis. Fest steht, dass der Selbstzerstrungsmechanismus ein wichtiger Bestandteil ist. Man vermutet, das die Wanze auf quantenmolekularer Kommunikation aufbaut, welche die ph舅omenale Verl舖slichkeit des Ger舩s erkl舐en wrde.\n", + /*206*/ "Quantenmolekulare Technologie ermglicht au゚erordentlich akkurate Zielerfassung fr Orbitalwaffen. Dadurch wird der Schadensradius auf den ntigen Umfang beschr舅kt. \n", + /*207*/ "Detaillierte Flugpl舅e, Kommunikationscodes und Frequenzen fr die Air Force One. Beinhaltet auch Dechiffrier-Codes.\n", + /*208*/ "Betrifft alle Daten der Forschungsarbeit, die durch dataDyne von der gekaperten Pelagic II am Meeresgrund durchgefhrt wurden. Der Inhalt besteht aus Sonar-Karten, geologischen Daten, Gewebeproben etc.\n", + /*209*/ "Die letzte Aufzeichnung der Persnlichkeit der knstlichen Intelligenz, die sich selbst Dr. Caroll nennt. Die Aufzeichnung wurde vor der Lschung und cerebralen Restrukturierung durchgefhrt. Kann zu Studienzwecken herangezogen worden. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Ein chemischer Cocktail, der die Realit舩swahrnehmung der Zielperson umkehrt. Gut wird zu Bse, Bse wird zu gut, Freund und Feind tauschen die Pl舩ze. Ein weiteres Forschungsergebnis, entwickelt von Trent Easton in der Area 51.\n", + /*211*/ "Tragen Sie diese Verkleidung, um unerkannt zu bleiben.\n", + /*212*/ "BEWEG\n", + /*213*/ "ZEIT\n", + /*214*/ "FERN\n", + /*215*/ "AUTO\n", + /*216*/ "SCHLAG\n", + /*217*/ "Big King-Rakete\n", + /*218*/ "Data Uplink\n", + /*219*/ "Pr舖identen-Scanner\n", + /*220*/ "Auto-Chirurg\n", + /*221*/ "Skedar-Bombe\n", + /*222*/ "Komm-Wanze\n", + /*223*/ "Wanze\n", + /*224*/ "Peilger舩\n", + /*225*/ "Flugpl舅e\n", + /*226*/ "Forschungsdaten\n", + /*227*/ "Sicherungsdiskette\n", + /*228*/ "Schlsselkarte\n", + /*229*/ "Aktentasche\n", + /*230*/ "Halskette\n", + /*231*/ "Pr舖identScan\n", + /*232*/ "Adrenalin\n", + /*233*/ "R-Scanner\n", + /*234*/ "H-Scanner\n", + /*235*/ "Ziel-Verst.\n", + /*236*/ "Bei dieser Version des CamSpy wurde die Aufzeichnungs-Funktion durch einen starken Plastik-Sprengsatz ersetzt.\n", + /*237*/ "Diese Version des CamSpy verfgt ber ein paralysierendes Nervengift, das die Zielperson fast augenblicklich in Katatonie versetzt.\n", + /*238*/ "Cassandra De Vries Halskette. Beinhaltet eine Ann臧erungs-Schlsselkarte, um Sperrzonen betreten zu knnen. Das MK3 Modell funktioniert nur, solange der Besitzer am Leben ist. Sicherheitsklasse AA-1 (gamma).", + /*239*/ "Cassandra De Vries Ersatzhalskette. Benuzername: %s Passwort: %s\n", + /*240*/ "Schild\n", + /*241*/ "Der Schild schtzt den Tr臠er, indem er automatisch Gefahren erkennt und ein tempor舐es Kraftfeld errichtet. Dadurch wird die Attacke neutralisiert. Der Schild verfgt ber einen begrenzten Energievorrat. Die Schutzfunktion kann also nur ber eine bestimmte Zeitspanne gew臧rleistet werden. Im Normalfall werden Schilde aktiv, sobald sie von jemandem getragen werden, auch wenn es so aussieht, als w舐e dieser spezielle Schild ein nicht-funktionabler Prototyp.\n", + /*242*/ "Adrenalin\n", + /*243*/ "Data Uplink\n", + /*244*/ "Nachtsicht\n", + /*245*/ "Decoder\n", + /*246*/ "Suizid-Pille\n", + /*247*/ "B-Gewehr\n", + /*248*/ "Medipack\n", + /*249*/ "Backup\n", + /*250*/ "Verkl.\n", + /*251*/ "Laptop\n", + /*252*/ "F-Mine\n", + /*253*/ "Schrotfl.\n", + /*254*/ "Sniper\n", + /*255*/ "Z-Mine\n", +}; diff --git a/src/files/lang/pal-final/gun_str_i.c b/src/files/lang/pal-final/gun_str_i.c new file mode 100644 index 000000000..19c595862 --- /dev/null +++ b/src/files/lang/pal-final/gun_str_i.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Vittime", + /* 2*/ "Morto una volta\n", + /* 3*/ "Morto", + /* 4*/ "volte", + /* 5*/ "Suicidi", + /* 6*/ "A mani nude\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenz.)\n", + /* 9*/ "Falcon 2 (cannoc.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Vendetta\n", + /* 20*/ "Ciclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Pistola Laptop\n", + /* 25*/ "Fucile a pompa\n", + /* 26*/ "Falciatore\n", + /* 27*/ "Lanciamissili\n", + /* 28*/ "Devastatore\n", + /* 29*/ "Killer\n", + /* 30*/ "Granata Maian\n", + /* 31*/ "TeleVista XR-20\n", + /* 32*/ "Fucile cecchino\n", + /* 33*/ "Balestra\n", + /* 34*/ "Sedativo\n", + /* 35*/ "Pugnale da lotta\n", + /* 36*/ "Granata\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina orologeria\n", + /* 39*/ "Mina prossimit濬n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Travestimento\n", + /* 44*/ "Missile\n", + /* 45*/ "Missile ritorno\n", + /* 46*/ "Granata a giro\n", + /* 47*/ "Laser\n", + /* 48*/ "Dardo\n", + /* 49*/ "PsicoArma\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Vista Notturna\n", + /* 60*/ "TeleSpia\n", + /* 61*/ "CapsuSpia\n", + /* 62*/ "BombaSpia\n", + /* 63*/ "Decodificatore\n", + /* 64*/ "Esplosivo\n", + /* 65*/ "Scanner a raggi X\n", + /* 66*/ "AutoChirurgo alieno\n", + /* 67*/ "Valigia\n", + /* 68*/ "Travestimento\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Puntatore-R\n", + /* 71*/ "Cartella\n", + /* 72*/ "Compressa suicidio\n", + /* 73*/ "Dispos. mimetico\n", + /* 74*/ "Booster lotta\n", + /* 75*/ "Connettore Dati\n", + /* 76*/ "TeleScanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "TeleVista\n", + /* 80*/ "Lanciamissili\n", + /* 81*/ "Mina pross\n", + /* 82*/ "PsicoArma\n", + /* 83*/ "Pugnale\n", + /* 84*/ "DY357\n", + /* 85*/ "Colpo singolo\n", + /* 86*/ "Fuoco rapido\n", + /* 87*/ "Fuoco a raffica\n", + /* 88*/ "Falciata\n", + /* 89*/ "Fuoco a scoppio\n", + /* 90*/ "Effetto rail-gun\n", + /* 91*/ "Lancio missili\n", + /* 92*/ "Missile guidato\n", + /* 93*/ "Missile filoguidato\n", + /* 94*/ "Botta col calcio\n", + /* 95*/ "Capsule esplosive\n", + /* 96*/ "Spari guidati\n", + /* 97*/ "Scarica del caricatore\n", + /* 98*/ "Lanciagranate\n", + /* 99*/ "Arpione\n", + /*100*/ "Pugno\n", + /*101*/ "Disarma\n", + /*102*/ "Segui l'obiettivo\n", + /*103*/ "Usa cannocchiale\n", + /*104*/ "Mezza scarica caricatore\n", + /*105*/ "Doppio scoppio\n", + /*106*/ "Macinatore\n", + /*107*/ "Sedativo\n", + /*108*/ "Iniezione letale\n", + /*109*/ "Pugnalata\n", + /*110*/ "Lancia lama avvelenata\n", + /*111*/ "Localizza-Obiettivo\n", + /*112*/ "Morte istantanea\n", + /*113*/ "Booster\n", + /*114*/ "Invertitore\n", + /*115*/ "Capsule a impatto\n", + /*116*/ "Mimesi\n", + /*117*/ "Pistola sentinella\n", + /*118*/ "Autodistr. di pross.\n", + /*119*/ "Rilevatore minaccia\n", + /*120*/ "Esplosivo a orol.\n", + /*121*/ "Esplosivo di pross.\n", + /*122*/ "Esplosivo a distanza\n", + /*123*/ "Detonazione\n", + /*124*/ "Miccia a 4 secondi\n", + /*125*/ "Ping-pong di pross.\n", + /*126*/ "Detonazione a orol.\n", + /*127*/ "Detonazione di pross.\n", + /*128*/ "Triplice esplosione\n", + /*129*/ "Sparo a ricarica\n", + /*130*/ "Accucciarsi\n", + /*131*/ "Infettare\n", + /*132*/ "Fuoco a impulsi\n", + /*133*/ "Laser a breve raggio\n", + /*134*/ "Detonazione a impatto\n", + /*135*/ "Illuminatore\n", + /*136*/ "Telecamera mobile\n", + /*137*/ "Vista a raggi X\n", + /*138*/ "Immagine termica\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo disturbo\n", + /*141*/ "Connetti\n", + /*142*/ "Identifica obiettivi\n", + /*143*/ "Travestiti\n", + /*144*/ "Piazza esplosivo\n", + /*145*/ "Vista telescopica\n", + /*146*/ "Silenziatore\n", + /*147*/ "Estensione caricatore\n", + /*148*/ "Vista Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Anche disarmato sei ancora un temibile avversario. Usa il pugno per mandare KO o per disarmare i tuoi avversari e raccogli le loro armi.\n", + /*156*/ "Precisa e affidabile, questa l'arma comunemente usata nelle operazioni dell'istituto. Usa la vista laser per sparare pallottole letali o colpisci i nemici con il calcio della pistola.\n", + /*157*/ "Una Falcon 2 potenziata, dotata di silenziatore e comunque letale.\n", + /*158*/ "Una Falcon 2 potenziata, dotata di cannocchiale a due ingrandimenti per il massimo della precisione.\n", + /*159*/ "Una pistola militare all'avanguardia comunemente usata dalle forze di pace. ネ dotata di zoom e di modalit secondaria di sparo a triplice esplosione.\n", + /*160*/ "Di solito queste armi sono tipiche degli Skedar. Il capiente caricatore e la canna affilata rendono questa pistola un'arma formidabile, sebbene il colpo letale sia dovuto alla sua funzione secondaria: ricaricala per maggiore potenza a costo di qualche giro di munizioni.\n", + /*161*/ "La DY357 dataDyne la pistola pi potente che esista. Ogni colpo ha un impressionante fattore di penetrazione e colpisce l'obiettivo con tutto il peso e la potenza dello sparo. Se ne producono modelli personalizzati su commissione. Pare che Trent Easton ne abbia una placcata d'oro.\n", + /*162*/ "La DY357-LX stata creata per il direttore della NSA, Trent Easton. Oltre al calcio ricoperto in pelle di tigre, quest'arma dorata vanta anche una canna speciale che conferisce al proiettile incredibile velocit e forza.\n", + /*163*/ "ネ la dotazione Maian standard: una pistola versatile per colpi normali o esplosivi senza ripercussioni sul resto del caricatore.\n", + /*164*/ "Questo classico prodotto dataDyne il fucile mitragliatore pi venduto: vanta un caricatore a 32 colpi e la speciale caratteristica di identificare e mirare sul bersaglio nell'intero campo visivo. Trasforma un tiratore scelto medio in uno eccellente, sempre che sia in grado di manovrare l'arma. Velocit media di fuoco: 900 giri/min.\n", + /*165*/ "Il principale fucile d'assalto del Carrington Institute, dotato di gittata e caricatore ottimi. La modalit secondaria permette a chi lo usa di spostarsi mentre zooma sul bersaglio. Velocit media di fuoco: 750 giri/min.\n", + /*166*/ "Un fucile d'assalto standard con un'innovazione micidiale: nella modalit secondaria diventa una mina di prossimit molto simile ad una pistola. Velocit media di fuoco: 700 giri/min.\n", + /*167*/ "Una variante del fucile d'assalto Dragon: invece dell'esplosivo di prossimit dotato un piccolo lanciagranate. Eccellente arma d'appoggio. Velocit media di fuoco: 700 giri/min.\n", + /*168*/ "Altro esempio di alta tecnologia della dataDyne. Solitamente un fucile d'assalto con un caricatore ridotto e perforazione potente, dotato di rilevatore di minaccia per identificare esplosivi, pistole a muro e altro.Velocit media di fuoco: 950 giri/min.\n", + /*169*/ "Progettata per le guardie del corpo, la Ciclone stata adottata dalle Forze di Sicurezza del Presidente per gli eccezionali risultati in caso di soppressione. In estreme circostanze, la velocit di fuoco pu essere raddoppiata, scaricando il caricatore in un secondo. Velocit media di fuoco: 900 giri/min. Scarica a 2000 giri/min.\n", + /*170*/ "L'arma segreta del Carrington Institute. Velocit di fuoco fenomenale e straordinaria capacit del caricatore. La modalit secondaria una funzione nascosta che esaurisce le munizioni nel caricatore. Un'arma distruttiva. Velocit media di fuoco: 1100 giri/min.\n", + /*171*/ "Un altro eccellente esempio di arma Maian. Pu sparare colpi ordinari alla velocit degli altri fucili mitragliatori, ma anche scariche ad alta velocit in grado di perforare oggetti e trovare obiettivi nascosti. Gli unici svantaggi della modalit secondaria sono la ridotta velocit di fuoco e la mancanza di precisione a causa della potenza dello sparo. Velocit media di fuoco: 900 giri/min. (m/s:300 giri/min.).\n", + /*172*/ "Un fucile mitragliatore dalle sembianze di un computer portatile. Quando chiuso, non pu sparare, ma attivandolo assume la sua forma micidiale. Se ispezionato a fondo pu essere scoperto: il PC si avvia, ma la sua memoria solo un quarto del normale.Velocit media di fuoco: 1000 giri/min.\n", + /*173*/ "Un'arma dataDyne realizzata per le forze di sicurezza. Il caricatore a nove cartucce assieme alla modalit di sparo semplice o doppia ne fanno un'arma pericolosa a distanze ravvicinate.\n", + /*174*/ "Un'arma terrificante se nelle mani di qualcuno abbastanza robusto da resistere al forte contraccolpo; altrimenti molto difficile da controllare ma comunque capace di aprire utili corridoi. Velocit massima di fuoco: 1800 giri/min.\n", + /*175*/ "Un'arma ingombrante capace di sparare un missile standard o uno pi lento che rientra alla base dopo aver seguito lo sfortunato obiettivo.\n", + /*176*/ "Un sistema a lunga gittata per il lancio di granate realizzato dalla dataDyne. La modalit secondaria ricopre gli ordigni di una sostanza collosa: quando viene sparata, la granata si attacca alle pareti e ai soffitti. Dopo pochi secondi si stacca e cade a terra, esplodendo.\n", + /*177*/ "Gli Skedar godono nel vedere i nemici tremare di terrore. ネ dunque ovvio che sul loro lanciamissili standard abbiano un missile telecomandato nella modalit secondaria, in modo che possano divertirsi guardando la preda che cerca inutilmente di scappare al proiettile che si avvicina.\n", + /*178*/ "Il fucile TeleVista un'arma Maian risultante dall'unione di un sistema di scansione a raggi X e un fucile capace di perforare oggetti solidi. Il dispositivo pu puntare e seguire le forme di vita, sebbene non raggiunga la stessa velocit del nemico in corsa.\n", + /*179*/ "Grazie al potente zoom e alla pallottola ad elevata velocit, quest'arma del Carrington Institute uno dei migliori fucili cecchino mai prodotti. Accucciandosi si ottiene la massima precisione.\n", + /*180*/ "Questa balestra un esempio di 'pistola' di piccole dimensioni, portata al polso di un agente del Carrington Institute. Si pu ripiegare per nasconderla e pu sparare fino a cinque colpi dall'effetto narcotico o letale.\n", + /*181*/ "Un dispositivo per attacchi serrati che in casi di emergenza pu essere usato anche come arma bench progettato come spray dermico per la somministrazione di sedativi. ネ bene ricordare che scaricare l'intero serbatoio pu avere conseguenze fatali.\n", + /*182*/ "Un pugnale da combattimento dalle grandi dimensioni contenente una fiala di veleno che si frantuma al lancio, eliminando la vittima in sei secondi al massimo. Una tipica arma dataDyne.\n", + /*183*/ "Una versione aggiornata della tradizionale granata. Pu essere lanciata con una miccia a quattro secondi o usata quale bomba di prossimit.\n", + /*184*/ "Una bomba a mano al neutrone dal raggio d'azione limitato. Pu essere fatta esplodere al momento dell'impatto o con esplosione di prossimit.\n", + /*185*/ "Una mina con miccia a breve tempo. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalit secondaria.\n", + /*186*/ "Una mina con miccia di prossimit. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalit secondaria.\n", + /*187*/ "Una mina da fare esplodere a distanza. Il comando di attivazione la sua modalit secondaria.\n", + /*188*/ "Un dispositivo di disturbo intenzionale di alta precisione, capace di simulare un comune guasto elettrico nel sistema a cui applicato.\n", + /*189*/ "Il laser viene portato al polso ed estremamente preciso. Pu emettere impulsi a lunga gittata o un fascio di energia costante e concentrata per breve gittata.\n", + /*190*/ "Stimolanti genetici realizzati per il combattimento. Quando vengono somministrati, sembrano rallentare lo scorrere del tempo per consentire una finestra di reazione.\n", + /*191*/ "La versione pi recente di una serie di sonde a 'luce lunare' che migliora l'illuminazione per produrre un'immagine pi chiara dell'ambiente circostante. Utilizza un algoritmo basato sullo spostamento dell'obiettivo per rilevare le possibili minacce.\n", + /*192*/ "Pur utilizzando la minima applicazione della tecnologia antigravitazionale, questo il pi avanzato dispositivo di spionaggio. Dotato di collegamento audio/video con funzione di registrazione e strumentazione di bordo per l'olografia spettroscopica.\n", + /*193*/ "Una sonda a breve raggio d'azione capace di vedere attraverso ogni materiale, persino il piombo, che produce una raffigurazione cromatica semplificata dell'ambiente.\n", + /*194*/ "Questa sonda utilizza la tecnica di scansione a raggi rossi modulati con dati ultrasonici per fornire un'immagine pi chiara dell'area circostante e identificare qualsiasi irregolarit strutturale. Inoltre pu localizzare i nemici grazie alla tecnologia di mimetizzazione o altre illusioni ottiche.\n", + /*195*/ "Utilizza le qualit di distorsione della luce di un cristallo alieno per creare un campo di riflesso attorno a chi lo indossa. Funziona solo se i disturbi cinetici entro il campo delimitato sono ridotti: basta sparare con una pistola per ristabilire la piena visibilit.\n", + /*196*/ "Un dispositivo di scansione visiva binoculare a lungo raggio. Viene mostrata un'immagine composita delle due fonti visive. Dotato di zoom.\n", + /*197*/ "Capace di eseguire l'interrogazione a distanza dei dati memorizzati, rispediti direttamente agli hacker dei computer dell'istituto. Una variante di questo dispositivo fornisce agli hacker un collegamento diretto al sistema locale.\n", + /*198*/ "Un potente sistema in grado di puntare qualsiasi cosa sia impostata nei parametri: persone, armi, oggetti e luoghi sono solo alcune delle innumerevoli possibilit.\n", + /*199*/ "Un apparecchio di scansione medica modificato che contiene i record pi aggiornati relativo allo stato di salute del Presidente, l'anamnesi e le terapie precedenti. ネ in grado di rilevare a distanza le funzioni vitali del Presidente, anche quando questi in mezzo alla folla.\n", + /*200*/ "Un puro e semplice scassinatore di casseforti. Apre le chiusure a codice elettronico generalmente in pochi secondi, sebbene la velocit vari da serratura a serratura.\n", + /*201*/ "Meraviglia della medicina Maian, capace di effettuare autodiagnosi e operazioni chirurgiche senza dover incidere. Uno svantaggio che funziona solo sui Maian; l'altro la mancanza di assistenza postoperatoria.\n", + /*202*/ "Una piccola carica di esplosivo al plastico, completa di temporizzatore sigillato a prova di manomissione e schegge rivestite di teflon. Molto pericoloso.\n", + /*203*/ "Come noto, si tratta di una bomba direzionale a fusione da piazzare in modo che la carica sia diretta verso il basso e possa sventrare i laboratori di ricerca della dataDyne. L'intero edificio sar inghiottito dalla voragine. \n", + /*204*/ "Una piccola cimice applicata al sistema di comunicazione. Trasporta il segnale ufficiale, permettendo il mantenimento del collegamento tra l'istituto e l'agente grazie a intense contromisure locali; parte integrante del sistema di comunicazione per la localizzazione dell'obiettivo.\n", + /*205*/ "Il funzionamento interno di questa cimice di estrema segretezza: il meccanismo di autodistruzione costituisce gran parte del dispositivo. Si dice che sia un esempio di comunicazione quantica molecolare, che spiega la fenomenale affidabilit del dispositivo usato sul campo.\n", + /*206*/ "Usa la tecnologia di comunicazione quantica per fornire informazioni accurate sugli obiettivi delle armi orbitanti, minimizzando cos i danni collaterali. La stessa tecnologia usata dalle cimici del Carrington Institute.\n", + /*207*/ "Dettagli della traiettoria di volo e dei codici di comunicazione e frequenze per l'Air Force One: anche la chiave attuale di decodifica.\n", + /*208*/ "Tutti i dati pertinenti alla ricerca sul fondo oceanico condotta da dataDyne sulle operazioni del vascello Pelagic II. I contenuti comprendono mappatura sonar, dati geologici, dati sui prodotti alieni, campioni da scafo, ecc.\n", + /*209*/ "L'ultima registrazione della personalit dell'intelligenza artificiale, autodefinita Dr. Caroll, prima della cancellazione della memoria e della ristrutturazione cerebrale. Uso per studi casistici e teorici. Moralmente incorrotto e dunque pericoloso. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un cocktail chimico che distorce la realt percepita dall'obiettivo. Il bene diventa male e viceversa; i nemici si confondono con gli amici. Un altro oscuro progetto di ricerca dell'Area 51 di Trent Easton.\n", + /*211*/ "Non il tuo normale abbigliamento. Indossalo per camuffarti.\n", + /*212*/ "PROSSIM.\n", + /*213*/ "A OROLOG.\n", + /*214*/ "TELECOM.\n", + /*215*/ "AUTOMATIC\n", + /*216*/ "IMPATTO\n", + /*217*/ "Missile Big King\n", + /*218*/ "Connettore Dati\n", + /*219*/ "Scanner Presidente\n", + /*220*/ "AutoChirurgo\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Ponte Com.\n", + /*223*/ "Microspia\n", + /*224*/ "Bersaglio\n", + /*225*/ "Piani Volo\n", + /*226*/ "Nastro Ricerca\n", + /*227*/ "Disco Backup\n", + /*228*/ "Tessera Magnetica\n", + /*229*/ "Cartella\n", + /*230*/ "Collana\n", + /*231*/ "ScannerPres\n", + /*232*/ "Booster\n", + /*233*/ "Scanner-X\n", + /*234*/ "Telescanner\n", + /*235*/ "AmplObiett\n", + /*236*/ "In questa versione della TeleSpia il dispositivo di registrazione stato sostituito da un potente esplosivo plastico.\n", + /*237*/ "Questa versione della TeleSpia utilizza una tossina paralizzante del sistema nervoso per provocare una catatonia quasi istantanea.\n", + /*238*/ "La collana di Cassandra De Vries. Dotata di una chiave magnetica per accedere ad aree riservate. Il modello Mk3 funziona solo se Cassandra ancora viva. Classe di sicurezza AA-1 (gamma).", + /*239*/ "Collana sostitutiva di Cassandra De Vries. Utente: %s Password: %s\n", + /*240*/ "Scudo\n", + /*241*/ "Lo scudo protegge chi lo usa riconoscendo l'attacco e creando temporaneamente un campo magnetico concentrato per respingerlo. ネ dotato di riserva energetica limitata, quindi pu proteggere solo fino ad un certo punto. Normalmente gli scudi sono sempre attivi, sebbene questo scudo in particolare sembri un prototipo non funzionale semifinito.\n", + /*242*/ "Booster lotta\n", + /*243*/ "C. Dati\n", + /*244*/ "Vista Nott.\n", + /*245*/ "Decodif.\n", + /*246*/ "Compressa suicidio\n", + /*247*/ "Sedativo\n", + /*248*/ "AutoChirurgo\n", + /*249*/ "Disco Backup\n", + /*250*/ "Travest.\n", + /*251*/ "PistLaptop\n", + /*252*/ "Mina distanza\n", + /*253*/ "Fuc.Pompa\n", + /*254*/ "Fuc.Cecch.\n", + /*255*/ "Mina Orol.\n", +}; diff --git a/src/files/lang/pal-final/gun_str_s.c b/src/files/lang/pal-final/gun_str_s.c new file mode 100644 index 000000000..2c51157fa --- /dev/null +++ b/src/files/lang/pal-final/gun_str_s.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Cuenta de muertes", + /* 2*/ "Muerto una vez\n", + /* 3*/ "Muerto", + /* 4*/ "veces", + /* 5*/ "Cuenta de suicidios", + /* 6*/ "Desarmado\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (mirilla)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragn\n", + /* 18*/ "SuperDragn\n", + /* 19*/ "Vengador K7\n", + /* 20*/ "Cicln\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Calisto NTG\n", + /* 24*/ "Arma PC\n", + /* 25*/ "Escopeta\n", + /* 26*/ "Segadora\n", + /* 27*/ "Lanzacohetes\n", + /* 28*/ "Devastador\n", + /* 29*/ "Slayer\n", + /* 30*/ "Granada Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Rifle Fr\n", + /* 33*/ "Ballesta\n", + /* 34*/ "Tranquilizador\n", + /* 35*/ "Cuchillo Combate\n", + /* 36*/ "Granada\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina Tiempo\n", + /* 39*/ "Mina de Proximidad\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disfraz\n", + /* 44*/ "Cohete\n", + /* 45*/ "Cohete Buscador\n", + /* 46*/ "Cinto de Granadas\n", + /* 47*/ "L疽er\n", + /* 48*/ "Rayo\n", + /* 49*/ "Psicosis\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Especial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Testeador\n", + /* 59*/ "Visin Nocturna\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Decodificador\n", + /* 64*/ "Explosivos\n", + /* 65*/ "Esc疣er Rayos-X\n", + /* 66*/ "Paquete M馘ico\n", + /* 67*/ "Maleta\n", + /* 68*/ "Disfraz\n", + /* 69*/ "Esc疣er IR\n", + /* 70*/ "Rastreador-R\n", + /* 71*/ "Maletn\n", + /* 72*/ "Pldora Suicidio\n", + /* 73*/ "Disp. Ocultacin\n", + /* 74*/ "Reforzador\n", + /* 75*/ "Conector de Datos\n", + /* 76*/ "Esc. Horizonte\n", + /* 77*/ "Falcon 2 (+)\n", + /* 78*/ "Falcon 2 (s)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L.Cohetes\n", + /* 81*/ "Mina Prox.\n", + /* 82*/ "Psicosis\n", + /* 83*/ "Cuchillo\n", + /* 84*/ "DY357\n", + /* 85*/ "Disparo nico\n", + /* 86*/ "Fuego r疳ido\n", + /* 87*/ "Fuego en r畴aga\n", + /* 88*/ "Cosechar\n", + /* 89*/ "Fuego de escopeta\n", + /* 90*/ "Efecto carrete\n", + /* 91*/ "Lanzacohetes\n", + /* 92*/ "Cohete Dirigido\n", + /* 93*/ "Cohete Teledirigido\n", + /* 94*/ "Culatazo\n", + /* 95*/ "Cartuchos Explosivos\n", + /* 96*/ "Disparos Guiados\n", + /* 97*/ "Descarga de Cartuchos\n", + /* 98*/ "Lanzagranadas\n", + /* 99*/ "Mina Lapa\n", + /*100*/ "Puetazo\n", + /*101*/ "Desarmar\n", + /*102*/ "Seguir Objetivo\n", + /*103*/ "Usar Mirilla\n", + /*104*/ "Dispara Medio Cargador\n", + /*105*/ "Disparo Doble\n", + /*106*/ "Trituradora\n", + /*107*/ "Sedante\n", + /*108*/ "Inyeccin Letal\n", + /*109*/ "Cuchillada\n", + /*110*/ "Cuchillo Envenenado\n", + /*111*/ "Localizador Objetivos\n", + /*112*/ "Muerte Instant疣ea\n", + /*113*/ "Reforzador\n", + /*114*/ "Revertir\n", + /*115*/ "Cartuchos Alto-Impacto\n", + /*116*/ "Ocultacin\n", + /*117*/ "Dejar como Centinela\n", + /*118*/ "Autodestruccin Prox.\n", + /*119*/ "Detector de Trampas\n", + /*120*/ "Explosivo de Tiempo\n", + /*121*/ "Explosivo de Proximidad\n", + /*122*/ "Explosivo Remoto\n", + /*123*/ "Detonacin\n", + /*124*/ "Fusible 4 segundos\n", + /*125*/ "Pinball Proximidad\n", + /*126*/ "Detonacin temporal\n", + /*127*/ "Detonacin Proximidad\n", + /*128*/ "R畴aga 3 Cartuchos\n", + /*129*/ "Disparo Cargado\n", + /*130*/ "Agacharse\n", + /*131*/ "Infectar\n", + /*132*/ "Disparo con Ritmo\n", + /*133*/ "Rayo Bajo-Alcance\n", + /*134*/ "Detonacin por Impacto\n", + /*135*/ "Amplificador de Luz\n", + /*136*/ "C疥ara Mvil\n", + /*137*/ "Visin de Rayos-X\n", + /*138*/ "Imagen Termal\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo de Bloqueo\n", + /*141*/ "Conectar\n", + /*142*/ "Identificar Objetivos\n", + /*143*/ "Llevar Disfraz\n", + /*144*/ "Colocar Explosivos\n", + /*145*/ "Mira Telescpica\n", + /*146*/ "Silenciador\n", + /*147*/ "Extensin de Cartucho\n", + /*148*/ "Mira L疽er\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Industrias Chesluk\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Incluso desarmado, eres un adversario respetable. Usa tus puos para noquear a tus oponentes o desarmarles para usar sus armas contra ellos.\n", + /*156*/ "Precisa y digna de confianza, esta arma es el caballo de batalla de las operaciones del Instituto. Usa la mira l疽er para situar las balas con un efecto mortal, o golpea a los adversarios para noquearles.\n", + /*157*/ "Una Falcon 2 mejorada, con la ventaja aadida de que es silenciosa, pero mortal.\n", + /*158*/ "Una Falcon 2 mejorada, que cuenta con una mirilla duplicadora que te permite beneficiarte de la superior precisin de la Falcon.\n", + /*159*/ "Una pistola de tecnologa militar punta, usada en gran parte por fuerzas de paz. Cuenta con una ligera capacidad de zoom, y tiene un modo secundario de disparo de r畴aga de tres cartuchos.\n", + /*160*/ "Si ves a un Skedar viniendo hacia ti, es m疽 que posible que lleve una de 駸tas. Un amplio cargador y su can rayado hacen de esta pistola una formidable arma de mano, pero la descarga asesina viene del modo secundario: carga el disparo para fuerza extra al coste de unos cuantos cartuchos.\n", + /*161*/ "La DY357 de dataDyne es la m疽 poderosa arma de mano del mundo. Cada cartucho tiene un factor de penetracin increble y noquea al objetivo con el peso y fuerza del disparo. Se han hecho modelos de encargo para clientes importantes; se rumorea que el director de ANS, Trent Easton, tiene una variante baada en oro.\n", + /*162*/ "La DY357-LX fue diseada especialmente para el director de la ANS, Trent Easton. Adem疽 de tener una atractiva empuadura de genuina piel de tigre, este arma dorada incluye un can optimizado, lo que significa que cada bala siempre encuentra su objetivo con una fuerza mortfera.\n", + /*163*/ "El arma Maian est疣dar. Se trata de un arma flexible, una pistola que dispara proyectiles est疣dar o proyectiles explosivos sin que afecte a la capacidad del cargador.\n", + /*164*/ "Un cl疽ico de dataDyne, y excelentemente vendida, esta metralleta cuenta con un cargador de 32 cartuchos y una caracterstica especial: la habilidad de designar y fijar objetivos en la lnea de fuego. Convierte a un tirador medio en uno excelente, siempre que sea inteligente para manejar el arma. Ratio de disparo normal: 900 dpm.\n", + /*165*/ "El principal rifle de asalto del Instituto Carrington. Su gran alcance y el tamao de su cargador hacen de ella un arma muy til; el modo secundario permite al usuario moverse mientras hace zoom sobre un adversario. Ratio de disparo normal: 750 dpm.\n", + /*166*/ "Un rifle de asalto est疣dar con un giro diablico: cuando se activa el modo secundario, se convierte en una mina activada por proximidad que parece un arma. Ratio de disparo normal: 700 dpm.\n", + /*167*/ "Es una variante del rifle de asalto Dragn: en vez de un explosivo de proximidad, es un pequeo lanzagranadas. Es una excelente arma de apoyo. Ratio de disparo normal: 700 dpm.\n", + /*168*/ "Es otra pieza de alta tecnologa de dataDyne. Ordinariamente es un rifle de asalto con un cargador m疽 bien pequeo y una descarga poderosa, cuenta con un modo detector de trampas que muestra explosivos, armas de pared y peligros similares. Ratio de disparo normal: 950 dpm.\n", + /*169*/ "Diseado para ser usado por guardaespaldas, el Cicln ha sido adoptado por la Seguridad Presidencial debido a su excelente capacidad cuando es usado para 'suprimir'. En circunstancias extremas, puede m疽 que doblar el ritmo de disparo, descargando el cargador completo en un segundo. Ratio de disparo normal: 900 dpm. Descarga a 2000 dpm.\n", + /*170*/ "El arma secreta del Instituto Carrington. Dispara a un ritmo fenomenal y cuenta con una capacidad de cargador gigantesca. El modo secundario es un dispositivo de ocultacin que funciona con la municin del cargador. Es un arma devastadora. Ratio de disparo normal: 1100 dpm.\n", + /*171*/ "Se trata de otro ejemplo del excelente diseo de armas de fuego Maian. Puede disparar tiros est疣dar tan r疳ido como cualquier otro SMG, o puede disparar cartuchos de alta velocidad que pueden penetrar f當ilmente en objetos para encontrar al objetivo al otro lado. La nica desventaja con el modo de disparo secundario es que el ritmo de disparo es lento y la precisin sufre con la potencia del disparo. Ratio de disparo normal: 950 dpm., (f/s: 300 dpm).\n", + /*172*/ "Una ametralladora diseada para parecer un PC port疸il. Disimulada, el arma no puede disparar, pero una vez activada, se despliega. El Arma PC no permite inspecciones detalladas; puede arrancar, pero la memoria es un cuarto de lo que se supone que es. Ratio de disparo normal: 1000 dpm.\n", + /*173*/ "Es un arma de dataDyne fabricada para fuerzas de seguridad. Su cargador de nueve cartuchos combinado con modos de disparo simple o doble hacen que se trate de una peligrosa arma de cerca.\n", + /*174*/ "Es un arma realmente aterradora en manos de alguien lo suficientemente fuerte para controlar su gran retroceso; para el resto, un arma difcil de manejar pero efectiva para despejar pasillos. Ratio de disparo normal: 1800 dpm.\n", + /*175*/ "Es un arma incmoda. Dispara tanto un cohete est疣dar como un cohete m疽 lento dirigido cuando se centra en el desafortunado objetivo.\n", + /*176*/ "Se trata de un sistema lanzador de granadas de largo alcance fabricado por dataDyne. El modo de disparo secundario recubre las granadas con una sustancia pegajosa; cuando se dispara la bomba, 駸ta se pega en las paredes o el techo. Tras unos cuantos segundos, se suelta para caer al suelo, donde detona.\n", + /*177*/ "Los Skedar disfrutan viendo a sus enemigos aterrorizados. Parece natural que cuenten con un cohete a control remoto como modo secundario de fuego en su lanzacohetes b疽ico, as pueden tener el placer de sentir los vanos intentos de escapar de su presa del proyectil que se acerca.\n", + /*178*/ "El rifle FarSight es un hbrido Maian de un dispositivo de esc疣er de Rayos-X emparejado con un rifle que puede disparar a trav駸 de objetos. La mira puede centrarse en formas de vida, aunque el dispositivo no puede centrar tan r疳ido como se mueve el enemigo.\n", + /*179*/ "Con su poderoso zoom y sus balas de alta velocidad, este arma del Instituto Carrington es uno de los mejores rifles de francotirador jam疽 hechos. Ag當hate para una mayor precisin.\n", + /*180*/ "Esta ballesta es un ejemplo de 'pistola' de corto alcance, montada en la mueca de un agente del Instituto Carrington. Se pliega para ocultarla y puede disparar hasta cinco flechas, entre los m疽 usuales tiros sedantes o los dardos mortales.\n", + /*181*/ "Es un dispositivo de fuego r疳ido, que puede ser usado como arma en un caso de emergencia, pero que est diseado en principio como un inyector d駻mico de sedantes. Los usuarios son advertidos que una descarga completa de la reserva de droga puede ser fatal.\n", + /*182*/ "Es una versin ampliada del cuchillo de combate. Contiene una ampolla de veneno que se hace aicos cuando se lanza, dando al enemigo unos seis segundos de vida. Un arma que slo poda haber sido creada por dataDyne.\n", + /*183*/ "Es una versin mejorada de la fiel granada. Puede ser lanzada con un fusible de cuatro segundos, o ser usada como una bomba de proximidad que rebota.\n", + /*184*/ "Es una bomba de neutrones de mano que afecta a un 疵ea muy pequea. Puede detonar por impacto o ser fijada en detonacin por proximidad.\n", + /*185*/ "Es una mina con un corto fusible de tiempo. Tiene un sensor de deteccin/evaluacin que puede ser activado como modo secundario.\n", + /*186*/ "Es una mina con un sensor de proximidad. Tiene un sensor de deteccin/evaluacin que puede ser activado como modo secundario.\n", + /*187*/ "Es una mina que puede ser activada remotamente. El comando de activacin es el modo secundario.\n", + /*188*/ "Se trata de un dispositivo de bloqueo de 'ruido-blanco', capaz de simular alguno de los fallos el馗tricos m疽 comunes en cualquier sistema donde sea directamente colocado.\n", + /*189*/ "El l疽er est montado en la mueca y su precisin es mortal. Puede disparar 'pulsos' de larga distancia, o puede mantener una constante y concentrada corriente de energa en corto alcance.\n", + /*190*/ "Son estimulantes gen騁icos diseados para aplicar en combate. Cuando son administrados, parecen frenar el paso del tiempo para abrir una 'ventana de reaccin'.\n", + /*191*/ "Lo ltimo en la lnea de miras 'starlight' que mejoran la luz visible para producir una imagen clara del ambiente que la rodea. Usa un algoritmo de movimiento de objetivo para mostrar posibles trampas.\n", + /*192*/ "Usando la aplicacin m疽 pequea de la tecnologa anti-gravedad, esto es lo ltimo en dispositivos para fisgar. Tiene una conexin de audio/vdeo con funcin de grabacin y la posibilidad interna de holografiar espectroscpicamente.\n", + /*193*/ "Una mira de corto alcance que puede ver a trav駸 de algunos materiales, incluso el acero, produciendo una representacin crom疸ica simplificada del entorno.\n", + /*194*/ "Esta mira usa escaneo de infrarrojos modulados con datos ultrasnicos para ofrecer no slo una imagen clara del 疵ea colindante, sino tambi駭 la ubicacin de irregularidades estructurales. Tambi駭 puede localizar enemigos que empleen tecnologa de ocultacin u otros desconciertos pticos.\n", + /*195*/ "Usa las cualidades de 'salto de luz' de cristales aliengenas para crear un campo refractivo alrededor del portador. Funciona mientras slo existan pequeas perturbaciones kin騁icas en el campo lmite; el acto de disparar un arma es suficiente para causar que vuelva la visibilidad.\n", + /*196*/ "Es un esc疣er binocular de largo alcance. El visor muestra una imagen compuesta por las dos fuentes recibidas. Tambi駭 cuenta con funcin zoom.\n", + /*197*/ "Es capaz de consultar remotamente casi cualquier tipo de datos guardados, los cuales son directamente enviados a los 'hackers' del Instituto. Una variante de este dispositivo provee a los 'hackers' de conexin directa con los sistemas locales.\n", + /*198*/ "Es un poderoso sistema de rastreo que puede ser preparado para encajar con cualquier tipo de par疥etros: gente, armas, objetos y lugares son algunas de las posibilidades.\n", + /*199*/ "Se trata de un esc疣er m馘ico modificado que contiene la m疽 moderna informacin acerca del estado de salud del Presidente y una biblioteca de pasadas condiciones y tratamientos. Puede detectar las funciones vitales del Presidente a gran distancia, incluso cuando el objetivo est en medio de una multitud.\n", + /*200*/ "Abre cajas fuertes, simple y llanamente. Rompe cierres codificados electrnicamente, habitualmente en cuestin de segundos, aunque esto, por supuesto, depende de cada cerradura.\n", + /*201*/ "Esta maravilla m馘ica Maian puede auto-diagnosticar y realizar operaciones quirrgicas sin necesidad de cortes. Una desventaja es que slo funciona en Maian; la otra desventaja es que no tiene habilidad en el trato a los pacientes.\n", + /*202*/ "Se trata de una pequea carga de explosivo pl疽tico, completada con un temporizador sellado, e incrustada dentro de una capa de tefln con metralla. Muy desagradable.\n", + /*203*/ "Como ya eres consciente, se trata de una bomba de fusin direccional, que se coloca para que la carga se dirija hacia abajo. Esto arrasar los laboratorios de investigacin de dataDyne y causar que el resto del edificio se colapse y caiga al agujero.\n", + /*204*/ "Es un pequeo 'bicho' que se coloca en cualquier parte de un transmisor de comunicaciones. Se oculta en la seal oficial, permitiendo la conexin entre el Instituto y el agente aunque haya importantes contramedidas locales; para todas las posibilidades y propsitos, es parte de la localizacin de las comunicaciones de los objetivos.\n", + /*205*/ "El funcionamiento interno de este 'bicho' es alto secreto: gran parte del dispositivo pertenece al mecanismo de autodestruccin. Se especula que esto es un ejemplo de comunicacin molecular cu疣tica, lo cual explica la fenomenal fiabilidad del dispositivo cuando se usa.\n", + /*206*/ "Usa tecnologa de comunicacin cu疣tica para proveer informacin precisa de los objetivos a las armas orbitales, ayud疣dolas a minimizar los daos colaterales. La misma tecnologa es usada en los rastreadores del Instituto Carrington.\n", + /*207*/ "Son detalles de la trayectoria de vuelo y los cdigos de comunicacin y frecuencias del Air Force One: incluso las claves actuales de encriptacin.\n", + /*208*/ "Todos los datos relacionados con la investigacin en el fondo oce疣ico desarrollada por dataDyne con el navo de operaciones submarinas Pelagic II. El contenido incluye mapeados de snar, datos geolgicos, datos del artefacto aliengena, muestras del casco, etc.\n", + /*209*/ "Es la ltima grabacin del estado de personalidad de la inteligencia artificial, que se llama a s misma Dr. Caroll, antes de su lavado de cerebro y reestructura cerebral. Usada para el estudio del caso, contiene slo proyecciones tericas. Moralmente incorrupta, y por lo tanto peligrosa. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Se trata de un cctel qumico que cambia la realidad que el objetivo percibe. Lo bueno es malo, lo malo es bueno; enemigos y amigos intercambian sus papeles. Se trata de otra de las investigaciones 'oscuras' del チrea 51 de Trent Easton.\n", + /*211*/ "No es tu vestimenta habitual. Ll騅alo para pretender no ser t.\n", + /*212*/ "PROX.\n", + /*213*/ "TIEMPO\n", + /*214*/ "REMOTO\n", + /*215*/ "AUTOARMA\n", + /*216*/ "IMPACTO\n", + /*217*/ "Cohete Big King\n", + /*218*/ "Conector de Datos\n", + /*219*/ "Esc. Presidencial\n", + /*220*/ "AutoCirujano\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Controlador\n", + /*223*/ "'Bicho' R.\n", + /*224*/ "Amplificador\n", + /*225*/ "Planes de Vuelo\n", + /*226*/ "Cinta Investigacin\n", + /*227*/ "Copia de Seguridad\n", + /*228*/ "Llave Magn騁ica\n", + /*229*/ "Maletn\n", + /*230*/ "Collar\n", + /*231*/ "Esc. Pres.\n", + /*232*/ "Reforzador\n", + /*233*/ "Esc. R-X\n", + /*234*/ "Esc. Horiz.\n", + /*235*/ "Amplific.\n", + /*236*/ "En este modelo de la C疥ara Espa el dispositivo de grabacin ha sido reemplazado por un poderoso explosivo pl疽tico.\n", + /*237*/ "Este modelo de la C疥ara Espa usa una toxina nerviosa paralizadora para que los blancos queden en estado catatnico.\n", + /*238*/ "Es el collar de Cassandra De Vries. Est equipado con una llave de proximidad que permite el acceso a 疵eas restringidas. El modelo Mk3 slo funciona si el propietario est vivo. Clase de Seguridad AA-1 (gamma).", + /*239*/ "Collar de repuesto de Cassandra De Vries. Usuario: %s Clave: %s\n", + /*240*/ "Escudo\n", + /*241*/ "El escudo protege al usuario detectando un ataque y generando moment疣eamente un campo de fuerza concentrado para repeler el ataque. El escudo tiene una reserva de energa limitada, as que slo puede proteger al usuario hasta cierto punto. Los escudos suelen permanecer activos cuando el usuario los lleva, aunque este escudo en particular parece no ser funcional, como un prototipo no finalizado.\n", + /*242*/ "Reforzadores\n", + /*243*/ "C. Datos\n", + /*244*/ "V. Nocturna\n", + /*245*/ "Decodif.\n", + /*246*/ "P. Suicidio\n", + /*247*/ "Tranquiliz.\n", + /*248*/ "AutoCirujano\n", + /*249*/ "Disco S.\n", + /*250*/ "Disfraz\n", + /*251*/ "Arma PC\n", + /*252*/ "Mina Remota\n", + /*253*/ "Escopeta\n", + /*254*/ "Rifle Fr\n", + /*255*/ "Mina Tiempo\n", +}; diff --git a/src/files/lang/pal-final/impE.c b/src/files/lang/pal-final/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-final/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/impJ.c b/src/files/lang/pal-final/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/pal-final/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/impP.c b/src/files/lang/pal-final/impP.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-final/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_f.c b/src/files/lang/pal-final/imp_str_f.c new file mode 100644 index 000000000..a8f4a5f67 --- /dev/null +++ b/src/files/lang/pal-final/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - R饌ctiver les d馭enses automatiques\n\nIl y a des fusils automatiques situ駸 des points strat馮iques de l'Institut Carrington. Ils sont en ce moment d駸activ駸 mais si vous acc馘ez au panneau de contrle pour les brancher, ils d駻outeront bon nombre d'ennemis.\n\n|Objectif 2: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 3: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - D騁ruire les informations sensibles\n\nLe coffre du bureau de Daniel contient un algorithme utilis il y a des ann馥s pour briser les codes de communications Maian. Il doit 黎re d騁ruit tout prix avant que la dataDyne ou les Skedars s'en emparent. Utilisez le laser pour percer la porte.\n\n|Objectif 5: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 1*/ "INSTITUT CARRINGTON\n", + /* 2*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - R饌ctiver les d馭enses automatiques\n\nIl y a des fusils automatiques situ駸 des points strat馮iques de l'Institut Carrington. Ils sont en ce moment d駸activ駸 mais si vous acc馘ez au panneau de contrle pour les brancher, ils d駻outeront bon nombre d'ennemis.\n\n|Objectif 2: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 3: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn r駱onse de la mise en 馗hec de leurs plans, les Skedars ont attaqu la source de leurs probl鑪es, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Apr鑚 tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Lib駻er les otages\n\nCertains des soldats ennemis d騁iennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des 騁ages sup駻ieurs.\n\n|Objectif 2: - R馗up駻er l'arme exp駻imentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser l'ennemi. Cette arme est capable de cr馥r une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 3: - D駸activer la bombe\n\nNos relev駸 indiquent la pr駸ence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le r馗epteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il d馗ollera alors et s'駘oignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R饌ctiver les d馭enses automatiques\n", + /* 6*/ "Lib駻er les otages\n", + /* 7*/ "R馗up駻er l'arme exp駻imentale\n", + /* 8*/ "D騁ruire les informations sensibles\n", + /* 9*/ "D駸activer la bombe\n", + /* 10*/ "Obtenir infos sensibles.\n", + /* 11*/ "Garde: \n", + /* 12*/ "Infos sensibles\n", + /* 13*/ "Infos sensibles\n", + /* 14*/ "Infos sensibles obtenues.\n", + /* 15*/ "Fusils automatiques activ駸.\n", + /* 16*/ "Trop d'otages abattus.\n", + /* 17*/ "Otages sauv駸.\n", + /* 18*/ "Informations sensibles d騁ruites.\n", + /* 19*/ "Carrington abattu.\n", + /* 20*/ "Joanna - nous sommes attaqu駸. \n", + /* 21*/ "Branchez les fusils - vite.\n", + /* 22*/ "Les Skedars ont pris des otages. \n", + /* 23*/ "Montez aux bureaux et sauvez-les.\n", + /* 24*/ "Ils utilisent un nouveau syst鑪e de bouclier. \n", + /* 25*/ "Foster travaillait sur une nouvelle arme qui \npeut 黎re utile.\n", + /* 26*/ "Bon sang. Mon bureau... S'ils y ont acc鑚...\n", + /* 27*/ "Allez-y en premier, Joanna, et d騁ruisez les fichiers.\n", + /* 28*/ "Il y a urgence. Ils ont plac une bombe. \n", + /* 29*/ "Trouvez-la et sortez de l'immeuble.\n", + /* 30*/ "Acc鑚 refus - Echec autorisation. \n", + /* 31*/ "Mesures d'urgences lanc馥s.\n", + /* 32*/ "Beau boulot, Joanna. C'est presque fini...\n", + /* 33*/ "La derni鑽e navette vous attend. Faites vite.\n", + /* 34*/ "Objet crucial d騁ruit.\n", + /* 35*/ "Les d馭enses automatiques vont m'aider.\n", + /* 36*/ "Voil sur quoi Foster travaillait.\n", + /* 37*/ "Je dois y aller doucement... Les otages \ncomptent sur moi.\n", + /* 38*/ "Au moins je ne saurai pas s'y je m'y \nprends mal.\n", + /* 39*/ "La bombe a explos...\n", + /* 40*/ "Vous recevez un Devastator.\n", + /* 41*/ "Pr黎e, Joanna? Nous ne pouvons pas faire attendre la d駘馮ation maian. Le Pr駸ident non plus, bien sr.\n", + /* 42*/ "Moi pr黎e? Pardon? Je suis pr黎e depuis une demi-heure! C'est moi qui vous attends!\n", + /* 43*/ "Vous savez ce que c'est, Joanna: il fallait que je me coiffe, que j'arrange mon costume...\n", + /* 44*/ "Vous avez combien de miroirs chez vous? Nerveux?\n", + /* 45*/ "Tr鑚. J'attends ce moment depuis si longtemps. L'Institut a 騁 fond pour faciliter les contacts entre humains et Maians. Et dans quelques minutes nous serons la Maison Blanche... Le r黐e deviendra alors r饌lit...\n", + /* 46*/ "D'o cela venait-il?\n", + /* 47*/ "Du rez-de-chauss馥...\n", + /* 48*/ "Il y en a qui ne savent pas s'arr黎er. Tout le monde doit 騅acuer!\n", + /* 49*/ "Mettez-vous l'abri! Je vais les retenir! Venez me chercher plus tard!\n", + /* 50*/ "J'esp鑽e juste que vous le pourrez.\n", + /* 51*/ "Il vous faut le r馗epteur.\n", + /* 52*/ "Connexion 騁ablie.\n", + /* 53*/ "D駻ivation syst鑪es de s馗urit.\n", + /* 54*/ "Virus t駘馗harg avec succ鑚.\n", + /* 55*/ "Moteurs du vaisseau activ駸.\n", + /* 56*/ "Connexion au vaisseau perdue.\n", + /* 57*/ "Obtenir r馗epteur.\n", + /* 58*/ "\n", + /* 59*/ "R馗epteur\n", + /* 60*/ "Un r馗epteur\n", + /* 61*/ "R馗epteur obtenu.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_g.c b/src/files/lang/pal-final/imp_str_g.c new file mode 100644 index 000000000..6e6667657 --- /dev/null +++ b/src/files/lang/pal-final/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Geb舫de sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgednnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Vernichten Sie die geheimen Informationen!\n\nIn Daniels Bro steht ein Safe, in dem der Algorithmus aufbewahrt wird, mit dem vor Jahren der Maianische Kom-Code geknackt wurde. Diese Information muss vernichtet werden, bevor dataDyne oder die Skedar darauf zugreifen knnen. Setzen Sie den Laser ein, um sich den Weg durch die Tr zu bahnen.\n\n|5. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 1*/ "CARRINGTON INSTITUT\n", + /* 2*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Geb舫de sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgednnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nAus Rache fr die Vereitelung ihres gro゚angelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, n舂lich das Carrington Institut. Aus Grnden der erforderlichen Effektivit舩 steht es au゚er Frage, dass dieser Auftrag von Joanna auszufhren ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben vllig berraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repr舖entieren, nicht das Geb舫de.\n\n|1. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie mglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|2. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen H舅de geraten, da sie in der Lage ist, ein tempor舐es Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|3. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie mssen so nahe wie mglich an das Schiff gelangen, das Data Uplink-Ger舩 einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Aktivieren Sie die Verteidigung!\n", + /* 6*/ "Befreien Sie die Geiseln!\n", + /* 7*/ "Finden Sie die Versuchs-Waffe!\n", + /* 8*/ "Vernichten Sie die Informationen!\n", + /* 9*/ "Reprogrammieren Sie die Bombe!\n", + /* 10*/ "Vernichten Sie die Informationen!\n", + /* 11*/ "Geheime Informationen\n", + /* 12*/ "der Wache\n", + /* 13*/ "Geheime Informationen\n", + /* 14*/ "Geheime Informationen aufgenommen\n", + /* 15*/ "Selbstschussanlage aktiviert\n", + /* 16*/ "Es sind zu viele Opfer zu beklagen.\n", + /* 17*/ "Geiseln wurden gerettet.\n", + /* 18*/ "Die geheimen Informationen wurden zerstrt.\n", + /* 19*/ "Carrington wurde eliminiert.\n", + /* 20*/ "Joanna - Wir werden angegriffen!\n", + /* 21*/ "Aktivieren Sie die Selbstschussanlagen - RASCH!\n", + /* 22*/ "Die Skedar haben Geiseln genommen.\n", + /* 23*/ "Dringen Sie zu den Bros vor und retten Sie sie!\n", + /* 24*/ "Sie verwenden eine neuartige Form der Schildtechnologie.\n", + /* 25*/ "Foster hat an einer Waffe gearbeitet, die sich als \nntzlich erweisen knnte.\n", + /* 26*/ "Verdammt! Mein Bro... Wenn Sie die Daten finden...\n", + /* 27*/ "Gehen Sie zuerst dorthin und vernichten Sie die Daten, Jo.\n", + /* 28*/ "Die Dinge berstrzen sich. Sie haben eine Bombe versteckt.\n", + /* 29*/ "Finden Sie sie und schaffen Sie sie aus dem Geb舫de raus!\n", + /* 30*/ "Zugriff verweigert - Keine Zugriffsberechtigung.\n", + /* 31*/ "Notfallprogramm wurde initiiert.\n", + /* 32*/ "Ausgezeichnet, Joanna. Wir haben es fast geschafft...\n", + /* 33*/ "Das letzte Schiff wartet auf Sie. Beeilung!\n", + /* 34*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 35*/ "Die Selbstschussanlagen werden sehr hilfreich sein.\n", + /* 36*/ "Daran hat Foster also gearbeitet.\n", + /* 37*/ "Ich muss vorsichtig sein... Die Geiseln \nverlassen sich auf mich.\n", + /* 38*/ "Wenigstens werde ich es nie erfahren, \nwenn ich einen Fehler gemacht habe.\n", + /* 39*/ "Die Bombe ist detoniert...\n", + /* 40*/ "Sie haben einen Devastator erhalten.\n", + /* 41*/ "Sind Sie fertig, Joanna? Wir knnen die Maianische Delegation nicht warten lassen. Den Pr舖identen natrlich auch nicht.\n", + /* 42*/ "Ob ich fertig bin? Wovon reden Sie? Ich war schon vor einer halben Stunde fertig. SIE haben uns aufgehalten!\n", + /* 43*/ "Sie wissen ja, Joanna; Ich musste mich noch frisieren, und dann musste ich auch noch den passenden Anzug ausw臧len...\n", + /* 44*/ "Man sollte Sie von Spiegeln fernhalten. Nervs?\n", + /* 45*/ "Sehr sogar. Auf diesen Moment habe ich schon seit Jahren gewartet. Kontakt, friedlicher Kontakt zwischen Menschen und Maianern. Fr diesen Zweck wurde das Institut gegrndet. In wenigen Minuten sind wir im Wei゚en Haus, und die Zusammenkunft wird endlich stattfinden...\n", + /* 46*/ "Woher kam das?\n", + /* 47*/ "Es war im Erdgeschoss...\n", + /* 48*/ "Sieht so aus, als wsste jemand nicht, wann er genug hat. Wir mssen die Leute hier rausschaffen!\n", + /* 49*/ "Bringen Sie sich in Sicherheit! Ich halte sie auf; Sie knnen sp舩er zurckkommen und mich abholen!\n", + /* 50*/ "Zumindest hoffe ich, dass Sie das knnen.\n", + /* 51*/ "Sie bentigen das Data Uplink-Ger舩.\n", + /* 52*/ "Verbindung wurde hergestellt.\n", + /* 53*/ "Sicherheitssystem wird umgangen.\n", + /* 54*/ "Virus wurde erfolgreich kopiert.\n", + /* 55*/ "Der Antrieb des Schiffs wurde aktiviert.\n", + /* 56*/ "Verbindung wurde unterbrochen.\n", + /* 57*/ "Erlangen Sie das Data Uplink-Ger舩!\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink-Ger舩\n", + /* 60*/ "Ein Data Uplink-Ger舩\n", + /* 61*/ "Data Uplink-Ger舩 aufgenommen\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_i.c b/src/files/lang/pal-final/imp_str_i.c new file mode 100644 index 000000000..d31e9e8dd --- /dev/null +++ b/src/files/lang/pal-final/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Distruggi le informazioni riservate\n\nNell'ufficio di Daniel si trova una cassaforte che custodisce l'algoritmo che a suo tempo lui stesso us per decifrare il codice di comunicazione Maian. Devi distruggerlo prima che cada nelle mani della dataDyne o degli Skedar. Usa il laser per aprire un varco attraverso la porta.\n\n|Obiettivo 5: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanandosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanadosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti pi ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 2: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poich in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 3: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si sollever allontanadosi dall'istituto e la bomba esploder senza danneggiare nessuno.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva le difese automatiche\n", + /* 6*/ "Libera gli ostaggi\n", + /* 7*/ "Recupera l'arma sperimentale\n", + /* 8*/ "Distruggi le informazioni riservate\n", + /* 9*/ "Disattiva la bomba\n", + /* 10*/ "Procurati informazioni riservate\n", + /* 11*/ "Guardia:\n", + /* 12*/ "Informazioni riservate \n", + /* 13*/ "Informazioni riservate\n", + /* 14*/ "Prese informazioni riservate\n", + /* 15*/ "Attivate armi automatiche\n", + /* 16*/ "Uccisi troppi ostaggi\n", + /* 17*/ "Salvati gli ostaggi\n", + /* 18*/ "Distrutte informazioni riservate\n", + /* 19*/ "Carrington stato ucciso\n", + /* 20*/ "Joanna! Ci attaccano!\n", + /* 21*/ "Riattiva le armi! Presto!\n", + /* 22*/ "Gli Skedar hanno degli ostaggi!\n", + /* 23*/ "Corri negli uffici e salvali!\n", + /* 24*/ "Usano una nuova forma di tecnologia scudo.\n", + /* 25*/ "Foster lavorava ad una nuova arma \nche potrebbe tornare utile.\n", + /* 26*/ "Dannazione! Il mio ufficio... se entrano...\n", + /* 27*/ "Jo, va sul luogo e distruggi i file!\n", + /* 28*/ "La situazione disperata! Hanno messo una bomba!\n", + /* 29*/ "Trovala e allontanala dall'edificio!\n", + /* 30*/ "ACCESSO NEGATO - Autorizzazione non concessa\n", + /* 31*/ "Sono state adottate misure d'emergenza.\n", + /* 32*/ "Bel lavoro, Joanna. Ce l'abbiamo quasi fatta!\n", + /* 33*/ "L'ultima navetta ti sta aspettando! Presto!\n", + /* 34*/ "Distrutto strumento essenziale alla missione.\n", + /* 35*/ "La difesa automatica mi aiuter a venirne fuori!\n", + /* 36*/ "Ecco a cosa stava lavorando Foster!\n", + /* 37*/ "Devo andarci piano... Gli ostaggi \ncontano su di me.\n", + /* 38*/ "Cos almeno non sapr se sto facendo \nqualcosa che non va.\n", + /* 39*/ "La bomba esplosa...\n", + /* 40*/ "Hai trovato un Devastatore.\n", + /* 41*/ "Sei pronta, Joanna? Non possiamo far aspettare la delegazione Maian o il Presidente, naturalmente!\n", + /* 42*/ "Se sono pronta?! Sta scherzando? Ero gi pronta mezz'ora fa. Ci ha trattenuto lei!\n", + /* 43*/ "Ma lo sai com', Joanna... Dovevo assicurarmi di avere i capelli in ordine e poi... il vestito...\n", + /* 44*/ "Dovrebbero tenerla lontana dallo specchio! Nervoso?\n", + /* 45*/ "S, molto. Sono anni che aspetto questo momento. L'istituto stato fondato proprio per i contatti, i rapporti d'amicizia tra gli umani e i Maian... e tra pochi minuti saremo alla Casa Bianca... e finalmente arriver il grande momento...\n", + /* 46*/ "Da dove viene questo rumore?\n", + /* 47*/ "Dal pianterreno... Sicuro!\n", + /* 48*/ "C' qualcuno che non capisce quando ora di finirla. Dobbiamo tirar fuori tutti di qui!\n", + /* 49*/ "Si metta in salvo! Me ne occupo io! Pu tornare a prendermi pi tardi!\n", + /* 50*/ "O almeno, lo spero!\n", + /* 51*/ "Ti serve il Connettore Dati!\n", + /* 52*/ "Connessione avvenuta\n", + /* 53*/ "Sistemi di sicurezza superati\n", + /* 54*/ "Il virus stato scaricato.\n", + /* 55*/ "I motori della navetta si sono accesi.\n", + /* 56*/ "Connessione alla navetta interrotta.\n", + /* 57*/ "Procurati Connettore Dati.\n", + /* 58*/ "\n", + /* 59*/ "C. Dati\n", + /* 60*/ "Connettore Dati\n", + /* 61*/ "Preso Connettore Dati.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_s.c b/src/files/lang/pal-final/imp_str_s.c new file mode 100644 index 000000000..ec9b06cd2 --- /dev/null +++ b/src/files/lang/pal-final/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Autom疸icas\n\nHay armas autom疸icas situadas en lugares estrat馮icos por todo el Instituto Carrington. En este momento est疣 inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudar疣 a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Cuatro: - Destruir Informacin Sensible\n\nEn la oficina de Daniel hay una caja fuerte donde se guardan los algoritmos que us para descifrar los cdigos de comunicacin Maian hace unos aos. Deben ser destruidos antes de que dataDyne o los Skedar se hagan con ellos. Usa el l疽er para abrir la puerta.\n\n|Objetivo Cinco: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 1*/ "INSTITUTO CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Autom疸icas\n\nHay armas autom疸icas situadas en lugares estrat馮icos por todo el Instituto Carrington. En este momento est疣 inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudar疣 a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Cuatro: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reaccin organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destruccin total.\n\n|Carrington - \n\n。Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal t misma. Despu駸 de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Dos: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultacin. Encu駭trala y lleva a cabo un poco de 'investigacin de campo'.\n\n|Objetivo Tres: - Desactivar Bomba\n\n。Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo nico que puede ayudarte es el Conector de Datos: ac駻cate a la nave, y salo para instalar un virus. La nave volar fuera del Instituto, y la bomba detonar sin daar a nadie.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar defensas autom疸icas\n", + /* 6*/ "Liberar a los rehenes\n", + /* 7*/ "Recuperar arma experimental\n", + /* 8*/ "Destruir informacin sensible\n", + /* 9*/ "Desactivar bomba\n", + /* 10*/ "Obt駭 informacin sensible.\n", + /* 11*/ "Guarda:\n", + /* 12*/ "Informacin sensible\n", + /* 13*/ "Informacin sensible\n", + /* 14*/ "Informacin sensible obtenida.\n", + /* 15*/ "Arma autom疸ica activada.\n", + /* 16*/ "Demasiados rehenes muertos.\n", + /* 17*/ "Los rehenes han sido salvados.\n", + /* 18*/ "La informacin sensible ha sido destruida.\n", + /* 19*/ "Carrington ha muerto.\n", + /* 20*/ "Joanna, nos atacan.\n", + /* 21*/ "Activa las armas, deprisa.\n", + /* 22*/ "Los Skedar han tomado rehenes.\n", + /* 23*/ "Sube a las oficinas y s疝valos.\n", + /* 24*/ "Est疣 usando una nueva forma de tecnologa de escudo.\n", + /* 25*/ "Foster estaba trabajando en una nueva arma que \npodra ser til.\n", + /* 26*/ "Maldicin. Mi oficina... Si logran acceder...\n", + /* 27*/ "Ve all primero, Joanna, y destruye los ficheros.\n", + /* 28*/ "Las cosas van muy mal. Han puesto una bomba.\n", + /* 29*/ "Encu駭trala y s當ala del edificio.\n", + /* 30*/ "Acceso denegado: autorizacin fallida.\n", + /* 31*/ "Las medidas de emergencia se han activado.\n", + /* 32*/ "Bien hecho, Joanna. Estamos casi a salvo...\n", + /* 33*/ "La ltima nave te est esperando. Deprisa.\n", + /* 34*/ "Objeto crtico de la misin destruido.\n", + /* 35*/ "Las autodefensas me ayudar疣 de veras.\n", + /* 36*/ "As que esto es en lo que Foster estaba trabajando.\n", + /* 37*/ "Debo de ir con cuidado... Los prisioneros \ncuentan conmigo.\n", + /* 38*/ "Bien, al menos no sabr si estoy \nhaciendo algo mal.\n", + /* 39*/ "La bomba ha sido detonada...\n", + /* 40*/ "Has obtenido un Devastador.\n", + /* 41*/ "ソPreparada, Joanna? No podemos hacer esperar a la delegacin Maian. Ni al Presidente, por supuesto.\n", + /* 42*/ "ソPreparada? ソQu quieres decir? Llevo preparada desde hace media hora. \n。T nos has entretenido!\n", + /* 43*/ "Pero ya sabes cmo va, Joanna... Tengo que estar seguro de que mi pelo est bien, y tambi駭 estaba el traje...\n", + /* 44*/ "Deberan alejarte de los espejos. ソNervioso?\n", + /* 45*/ "Mucho. Llevo esperando este momento desde hace bastantes aos. El contacto, amigable, entre Humanos y Maian es para lo que se fund el Instituto. Y en unos minutos estaremos en la Casa Blanca, y ocurrir finalmente...\n", + /* 46*/ "ソDe dnde proviene ese ruido?\n", + /* 47*/ "Parece la planta baja...\n", + /* 48*/ "Parece que alguien no sabe cu疣do retirarse. 。Tenemos que sacar a todo el mundo fuera!\n", + /* 49*/ "。Largo! Les mantendr alejados... 。Puedes volver y recogerme luego!\n", + /* 50*/ "Al menos, espero que puedas.\n", + /* 51*/ "Necesitas el Conector de Datos.\n", + /* 52*/ "Se ha realizado la conexin.\n", + /* 53*/ "Saltando sistemas de seguridad.\n", + /* 54*/ "El virus ha sido descargado con 騙ito.\n", + /* 55*/ "Los motores de la nave han sido activados.\n", + /* 56*/ "La conexin con la nave se ha cortado.\n", + /* 57*/ "Obt駭 el Conector de Datos.\n", + /* 58*/ "\n", + /* 59*/ "C. Datos\n", + /* 60*/ "Un Conector de Datos\n", + /* 61*/ "Conector de Datos obtenido.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/junE.c b/src/files/lang/pal-final/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/junJ.c b/src/files/lang/pal-final/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/junP.c b/src/files/lang/pal-final/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_f.c b/src/files/lang/pal-final/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_g.c b/src/files/lang/pal-final/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_i.c b/src/files/lang/pal-final/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_s.c b/src/files/lang/pal-final/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lamE.c b/src/files/lang/pal-final/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lamJ.c b/src/files/lang/pal-final/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lamP.c b/src/files/lang/pal-final/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_f.c b/src/files/lang/pal-final/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_g.c b/src/files/lang/pal-final/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_i.c b/src/files/lang/pal-final/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_s.c b/src/files/lang/pal-final/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/leeE.c b/src/files/lang/pal-final/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-final/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/leeJ.c b/src/files/lang/pal-final/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/pal-final/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/leeP.c b/src/files/lang/pal-final/leeP.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-final/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_f.c b/src/files/lang/pal-final/lee_str_f.c new file mode 100644 index 000000000..4f1edeef8 --- /dev/null +++ b/src/files/lang/pal-final/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Ouvrir les portes du hangar\n\nLe syst鑪e d'accostage est d'habitude contrl en auto: il a d 黎re d騅i depuis le pont. Ouvrez les portes en vous servant des commandes au-dessus du hangar et Elvis pourra accomplir son accostage.\n\n|Objectif 3: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 4: - Saboter les syst鑪es de propulsion\n\nLe plan d'assaut du croiseur risque d'馗houer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arr黎e.\n\n|Objectif 5: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Saboter les syst鑪es de propulsion\n\nLe plan d'assaut du croiseur risque d'馗houer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arr黎e.\n\n|Objectif 4: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nAssomm馥 lors de l'騅acuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonni鑽e d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter bord, nous pourrons t'aider prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le syst鑪e de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Acc馘er aux syst鑪es de navigation\n\nMenez Elvis la carte stellaire et il en d馘uira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut 黎re d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Contrler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Annuler le syst鑪e de bouclier\n", + /* 6*/ "Ouvrir les portes du hangar\n", + /* 7*/ "Acc馘er aux syst鑪es de navigation\n", + /* 8*/ "Saboter les syst鑪es de propulsion\n", + /* 9*/ "Contrler le pont\n", + /* 10*/ "Boucliers du vaisseau baiss駸.\n", + /* 11*/ "Portes du hangar ouvertes.\n", + /* 12*/ "Elvis abattu.\n", + /* 13*/ "Infos de navigation r馗up駻馥s.\n", + /* 14*/ "Ascenseur activ.\n", + /* 15*/ "Skedars du hangar abattus.\n", + /* 16*/ "Joanna! Baisse les boucliers \net nous t'aiderons.\n", + /* 17*/ "Ouvre les portes du hangar pour que l'on puisse accoster.\n", + /* 18*/ "OK. Nous y sommes. Je te retrouve dans le hangar.\n", + /* 19*/ "Ca me fait plaisir de te voir, Joanna. \n", + /* 20*/ "Prends 軋. C'est utile, tu verras...\n", + /* 21*/ "Fusil d'assaut AR34 obtenu.\n", + /* 22*/ "Il faut monter. Je prends cet ascenseur. \nPrends l'autre.\n", + /* 23*/ "Moteurs coup駸.\n", + /* 24*/ "Attention Joanna! Ils sont en col鑽e je crois...\n", + /* 25*/ "Pont captur.\n", + /* 26*/ "Vas-y, Joanna. Je s馗urise le p駻im鑼re. \nOn se retrouve plus tard.\n", + /* 27*/ "Je dois abaisser les boucliers pour faire entrer \nElvis. J'ai besoin d'aide...\n", + /* 28*/ "Seules les portes de hangar sont sur le chemin.\n", + /* 29*/ "Cette machine contient les cartes stellaires skedars.\n", + /* 30*/ "Si nous contrlons le pont, le vaisseau sera notre merci.\n", + /* 31*/ "Il est temps de monter...\n", + /* 32*/ "Oohhh... Dites-moi que ce n'est pas vrai.\n", + /* 33*/ "Et si. Regardez donc qui est avec vous, ma ch鑽e.\n", + /* 34*/ "Vous! Vous ne vous 黎es pas enfuie? Nous avions perdu votre trace...\n", + /* 35*/ "Leurrer les Skedars 騁ait plus difficile. Vous et Mr. Carrington avez pu vous en rendre compte.\n", + /* 36*/ "Attendez ici! Je vais cr馥r une diversion. Cela vous donnera l'occasion de partir. Faites vite ou nous mourrons.\n", + /* 37*/ "Pourquoi faites-vous tout 軋, Cassandra?\n", + /* 38*/ "Les Skedars m'ont utilis馥. Vous 黎es ma seule chance de me venger.\n", + /* 39*/ "Aaaaaahhhhhhh!!!\n", + /* 40*/ "C'est la premi鑽e fois que je vois une plan鑼e depuis l'espace... C'est magnifique.\n", + /* 41*/ "Hein?\n", + /* 42*/ "Je... Je ne le crois pas!\n", + /* 43*/ "Elvis? Qu'est-ce qu'il y a?\n", + /* 44*/ "O vas-tu?\n", + /* 45*/ "Nous devons descendre la surface! Suis-moi!\n", + /* 46*/ "Il faut sortir d'ici!\n", + /* 47*/ "Portes hangar ferm馥s - boucliers actifs.\n", + /* 48*/ "Objet crucial d騁ruit.\n", + /* 49*/ "Munitions 駱uis馥s - panneaux ne peuvent 黎re d騁ruits.\n", + /* 50*/ "Obtenir collier de De Vries.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Collier\n", + /* 53*/ "Collier de De Vries\n", + /* 54*/ "Collier de De Vries obtenu.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_g.c b/src/files/lang/pal-final/lee_str_g.c new file mode 100644 index 000000000..a38c4b6ed --- /dev/null +++ b/src/files/lang/pal-final/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - ヨffnen Sie die Hangartore!\n\nDas Andock-System wird im Normalfall automatisch gesteuert. Es muss von der Brcke aus auf manuelle Bedienung umgestellt worden sein. ヨffnen Sie die Tore mit Hilfe der lokalen Kontrollinstrumente, um Elvis das Andocken zu ermglichen.\n\n|3. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|4. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu bernehmen, knnte schief gehen, wenn der Kommandant den vorgegebenen Kurs 舅dert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|5. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHIFF\n", + /* 2*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|3. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu bernehmen, knnte schief gehen, wenn der Kommandant den vorgegebenen Kurs 舅dert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|4. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nW臧rend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Wei゚en Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, knnen wir gemeinsam versuchen, das Schiff zu bernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild au゚er Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr ntzlich sein.\n\n|3. Ziel: - Bringen Sie die Brcke unter Ihre Kontrolle!\n\nSobald Sie die Brcke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Setzen Sie den Schild au゚er Betrieb!\n", + /* 6*/ "ヨffnen Sie die Hangartore!\n", + /* 7*/ "Nehmen Sie Einblick in die Sternenkarte!\n", + /* 8*/ "Sabotieren Sie die Antriebssysteme!\n", + /* 9*/ "Entern Sie die Brcke!\n", + /* 10*/ "Die Schilde wurden heruntergefahren.\n", + /* 11*/ "Die Hangartore wurden geffnet.\n", + /* 12*/ "Elvis wurde eliminiert.\n", + /* 13*/ "Navigationsinformation wurde erlangt.\n", + /* 14*/ "Aufzug wurde aktiviert.\n", + /* 15*/ "Alle Skedar im Hangarbereich wurden eliminiert.\n", + /* 16*/ "Joanna! Fahr die Schilde runter! Dann \nknnen wir dir helfen.\n", + /* 17*/ "Du musst die Hangartore ffnen, sonst knnen wir nicht andocken!\n", + /* 18*/ "Okay, wir sind drin. Wir treffen uns im Hangar.\n", + /* 19*/ "Es ist schn dich zu sehen, Joanna.\n", + /* 20*/ "Nimm das - das kannst du sicher gut gebrauchen...\n", + /* 21*/ "AR34 erhalten\n", + /* 22*/ "Wir sollten nach oben gehen. Ich nehme diesen Aufzug; \nnimm du den anderen.\n", + /* 23*/ "Die Maschinen wurden unbrauchbar gemacht.\n", + /* 24*/ "Vorsicht Joanna! Ich glaube, sie sind jetzt sauer...\n", + /* 25*/ "Die Brcke wurde eingenommen.\n", + /* 26*/ "Du gehst voraus, Jo. Ich sichere diesen Teil des Schiffes. \nWir treffen uns sp舩er.\n", + /* 27*/ "Ich muss die Schilde runterfahren, damit Elvis \nlanden kann. Ich brauche jede Hilfe, die ich kriegen kann.\n", + /* 28*/ "Jetzt sind nur noch die Hangartore im Weg.\n", + /* 29*/ "In dieser Maschine werden die Sternenkarten gespeichert.\n", + /* 30*/ "Wenn wir die Brcke einnehmen, gehrt das Schiff uns.\n", + /* 31*/ "Wir sollten nach oben gehen...\n", + /* 32*/ "Oohhh... Ich hoffe, ich bin nicht da, wo ich befrchte zu sein.\n", + /* 33*/ "Es ist sogar noch schlimmer als das, Sch舩zchen. Und sieh nur, wer dir Gesellschaft leistet.\n", + /* 34*/ "Sie! Ich dachte, Sie w舐en entkommen. Wir konnten keine Spur von Ihnen finden.\n", + /* 35*/ "Ihr konntet mich zwar nicht finden, die Skedar konnten es sehr wohl. Das drfte dir und Mr. Carrington auch aufgefallen sein.\n", + /* 36*/ "Bleib da stehen! Ich werde sie ablenken. Das verschafft dir eine Chance, um hier rauszukommen. Nimm sie wahr, oder...\n", + /* 37*/ "Warum tun Sie das, Cassandra?\n", + /* 38*/ "Die Skedar haben mich benutzt. Du bietest mir die Mglichkeit, Rache zu nehmen.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. Das ist das erste Mal, dass ich einen anderen Planeten vom Weltall aus sehe. Wunderschn!\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "Ich... Ich glaube das nicht!\n", + /* 43*/ "Elvis? Was ist das?\n", + /* 44*/ "Wohin gehst du?\n", + /* 45*/ "Wir mssen die Oberfl臘he erreichen! Folge mir!\n", + /* 46*/ "Wir mssen hier raus!\n", + /* 47*/ "Hangartore verriegelt - Schilde sind noch aktiv.\n", + /* 48*/ "Wichtiges Objekt zerstrt.\n", + /* 49*/ "Die Konsolen knnen ohne Munition nicht zerstrt werden.\n", + /* 50*/ "Erlangen Sie De Vries Halskette!\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Halskette\n", + /* 53*/ "Cassandra De Vries Halskette\n", + /* 54*/ "De Vries Halskette aufgenommen\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_i.c b/src/files/lang/pal-final/lee_str_i.c new file mode 100644 index 000000000..a1124b6b1 --- /dev/null +++ b/src/files/lang/pal-final/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Apri le porte dell'hangar\n\nIl sistema di attracco normalmente comandato in automatico e deve quindi essere disattivato dal ponte. Apri le porte azionando i comandi collocati sopra all'hangar, in modo che Elvis possa portare a termine la manovra di atterraggio.\n\n|Obiettivo 3: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 4: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave pu fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 5: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 1*/ "ASTRONAVE D'ASSALTO SKEDAR\n", + /* 2*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave pu fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 4: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non pu pi essere comandata dagli Skedar. Rimane l solo il comandante.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il sistema scudo\n", + /* 6*/ "Apri le porte dell'hangar\n", + /* 7*/ "Accedi al sistema di navigazione\n", + /* 8*/ "Sabotaggio al sistema motore\n", + /* 9*/ "Assumi il controllo del ponte\n", + /* 10*/ "Abbassati gli scudi dell'astronave.\n", + /* 11*/ "Aperte le porte dell'hangar.\n", + /* 12*/ "Elvis stato ucciso.\n", + /* 13*/ "Recuperate informazioni di navigazione.\n", + /* 14*/ "Attivato l'ascensore.\n", + /* 15*/ "Uccisi tutti gli Skedar nell'hangar.\n", + /* 16*/ "Avanti, Joanna! Disattiva gli scudi \ncos potremo aiutarti!\n", + /* 17*/ "Devi aprire le porte dell'hangar affinch possiamo attraccare!\n", + /* 18*/ "Bene, ci siamo! Ci vediamo nell'hangar.\n", + /* 19*/ "Vedo che stai bene, Joanna!\n", + /* 20*/ "Ecco, tieni! Ti sar utile!\n", + /* 21*/ "Preso il fucile d'assalto AR34.\n", + /* 22*/ "ネ ora di salire, forza! Io prendo quest'ascensore, \ntu prendi quell'altro.\n", + /* 23*/ "I motori sono stati disattivati.\n", + /* 24*/ "Attenta, Joanna! Mi sembrano leggermente irritati...\n", + /* 25*/ "Assunto controllo del ponte.\n", + /* 26*/ "Va avanti tu, Jo! Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 27*/ "Devo disattivare quegli scudi per far entrare Elvis. \nMi serve aiuto!\n", + /* 28*/ "Ora mi restano solo le porte dell'hangar.\n", + /* 29*/ "Questa macchina contiene la mappa astronomica Skedar.\n", + /* 30*/ "Se riusciamo a prendere il controllo del ponte, \nl'astronave sar nostra.\n", + /* 31*/ "ネ ora di salire...\n", + /* 32*/ "Ops... Sono sicuramente nel posto sbagliato al momento sbagliato.\n", + /* 33*/ "E c' di peggio, immagino! Guarda un po' chi c' qui!!!\n", + /* 34*/ "Lei! Pensavo che fosse riuscita a squagliarsela. ネ sparita senza lasciare traccia!!!\n", + /* 35*/ "Non mi avete trovato VOI! Ma dagli Skedar non si scappa, come avrete sicuramente notato tu e Carrington!\n", + /* 36*/ "Prendi questo e aspetta l! Se riesco a distrarli, avrai la possibilit di uscire di qua! Forza, usalo o moriremo entrambe!\n", + /* 37*/ "Perch lo fa, Cassandra?\n", + /* 38*/ "Gli Skedar mi hanno usata, Joanna e tu sei la mia unica possibilit di vendetta!\n", + /* 39*/ "Aaaaargh!!!\n", + /* 40*/ "Ehi! ネ la prima volta che vedo un altro pianeta dallo spazio! ネ fantastico!\n", + /* 41*/ "Eeeeeh?\n", + /* 42*/ "Non... non ci posso credere!\n", + /* 43*/ "Elvis? Che roba ?\n", + /* 44*/ "Che fai? Dove vai?\n", + /* 45*/ "Dobbiamo raggiungere la superficie! Dai, vieni!\n", + /* 46*/ "Dobbiamo uscire di qua!\n", + /* 47*/ "Porte hangar bloccate - Scudi ancora attivi.\n", + /* 48*/ "Distrutto strumento essenziale alla missione.\n", + /* 49*/ "Finite le munizioni - Impossibile distruggere quadro comandi.\n", + /* 50*/ "Collana di De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collana\n", + /* 53*/ "Collana di De Vries\n", + /* 54*/ "Presa collana di De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_s.c b/src/files/lang/pal-final/lee_str_s.c new file mode 100644 index 000000000..be7bf3c60 --- /dev/null +++ b/src/files/lang/pal-final/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Abrir Puertas del Hangar\n\nNormalmente el sistema de atraque se controla de forma autom疸ica: debe ser anulado desde el puente. Abre las puertas usando los controles locales sin tener en cuenta el hangar, y Elvis podr terminar el ciclo de aterrizaje.\n\n|Objetivo Tres: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Cuatro: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debera salir mal si el Comandante altera el curso establecido. Manipula los motores para que as la nave se pare.\n\n|Objetivo Cinco: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 1*/ "NAVE DE ASALTO SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debera salir mal si el Comandante altera el curso establecido. Manipula los motores para que as la nave se pare.\n\n|Objetivo Cuatro: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuacin del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n。Joanna! 。Estoy siguiendo a la nave de asalto que te retiene! Conmigo est疣 dos protectores Maian de la delegacin que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compaeros puedan iniciar la aproximacin.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegacin\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debera estar tambi駭 la posicin de las fortalezas Skedar: esta informacin puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estar m疽 bajo el control Skedar. Slo quedar dentro el Comandante.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar sistemas de escudo\n", + /* 6*/ "Abrir puertas del hangar\n", + /* 7*/ "Acceder a los sistemas de navegacin\n", + /* 8*/ "Sabotear los motores\n", + /* 9*/ "Ganar el control del puente\n", + /* 10*/ "Los escudos de la nave han sido bajados.\n", + /* 11*/ "Las puertas del hangar han sido abiertas.\n", + /* 12*/ "Elvis ha muerto.\n", + /* 13*/ "La informacin de navegacin ha sido recuperada.\n", + /* 14*/ "El ascensor ha sido activado.\n", + /* 15*/ "Todos los Skedar del hangar han muerto.\n", + /* 16*/ "Espera, Joanna. Baja los escudos y \nte podremos ayudar.\n", + /* 17*/ "Tienes que abrir las puertas del hangar \npara que podamos atracar.\n", + /* 18*/ "Vale, estamos dentro. Te ver en el hangar.\n", + /* 19*/ "Me alegro de verte, Joanna.\n", + /* 20*/ "Toma esto: lo encontrar疽 til...\n", + /* 21*/ "Rifle de asalto AR34 recibido.\n", + /* 22*/ "Es hora de avanzar. Yo tomar este ascensor; \nt toma el otro.\n", + /* 23*/ "Los motores han sido desactivados.\n", + /* 24*/ "。Cuidado, Joanna! Creo que les hemos hecho enfadar...\n", + /* 25*/ "El puente ha sido capturado.\n", + /* 26*/ "Ve delante, Joanna. Asegurar el permetro. \nNos vemos luego.\n", + /* 27*/ "Tengo que conseguir bajar esos escudos para \nmeter a Elvis. Necesito toda la ayuda que pueda obtener.\n", + /* 28*/ "Ahora slo las puertas del hangar nos molestan.\n", + /* 29*/ "Esta m痃uina contiene los mapas estelares Skedar.\n", + /* 30*/ "Si controlamos el puente, entonces la nave ser nuestra.\n", + /* 31*/ "Es hora de avanzar...\n", + /* 32*/ "Oohhh... Preferira no estar donde creo que estoy.\n", + /* 33*/ "Y es peor que eso, querida. Slo mira a qui駭 tienes por compaa.\n", + /* 34*/ "。T! Crea que habas escapado. No encontramos ningn rastro tuyo.\n", + /* 35*/ "No pudisteis encontrarme. Pero no me esconda de los Skedar, como t y el Sr. Carrington descubristeis.\n", + /* 36*/ "Eso es. 。Espera aqu! Crear una distraccin; te dar la oportunidad de escapar. レsala o moriremos ambas.\n", + /* 37*/ "ソPor qu haces esto, Cassandra?\n", + /* 38*/ "Los Skedar me usaron, Joanna. T eres mi mejor baza para vengarme.\n", + /* 39*/ "。。。Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Guau. ノsta es la primera vez que veo otro planeta desde el espacio. Es precioso.\n", + /* 41*/ "ソHmmmm?\n", + /* 42*/ "No... 。No puedo creerlo!\n", + /* 43*/ "ソElvis? ソQu pasa?\n", + /* 44*/ "ソDnde vas?\n", + /* 45*/ "。Tenemos que bajar a la superficie! 。Sgueme!\n", + /* 46*/ "。Tenemos que salir de aqu!\n", + /* 47*/ "Puertas del hangar cerradas - escudos todava activos.\n", + /* 48*/ "Objeto crtico de la misin destruido.\n", + /* 49*/ "Municin agotada - las consolas no pueden ser destruidas.\n", + /* 50*/ "Obt駭 el collar de De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collar\n", + /* 53*/ "Collar de De Vries\n", + /* 54*/ "Recogiste el collar de De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lenE.c b/src/files/lang/pal-final/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lenJ.c b/src/files/lang/pal-final/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lenP.c b/src/files/lang/pal-final/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_f.c b/src/files/lang/pal-final/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_g.c b/src/files/lang/pal-final/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_i.c b/src/files/lang/pal-final/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_s.c b/src/files/lang/pal-final/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lipE.c b/src/files/lang/pal-final/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-final/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lipJ.c b/src/files/lang/pal-final/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/pal-final/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lipP.c b/src/files/lang/pal-final/lipP.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-final/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_f.c b/src/files/lang/pal-final/lip_str_f.c new file mode 100644 index 000000000..433df94df --- /dev/null +++ b/src/files/lang/pal-final/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - D騁ruire les archives informatiques\n\nToute information sur le crash et les 駘駑ents r馗up駻駸 d騁enue par le Secteur 51 doit 黎re effac馥 de leurs fichiers. Le terminal est gard dans une pi鐵e ferm馥 en haut du couloir principal. Installez un virus gr稍e au r馗epteur et d騁ruisez le terminal. Si le virus infecte d'autres terminaux, leur r駸eau sera corrompu.\n\n|Objectif 2: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la pr駸ence de caissons dans lesquels des 馗hantillons organiques sont maintenus de tr鑚 basses temp駻atures. Il pense que ceux-ci servent geler des corps avant de les op駻er ou de les diss駲uer. Trouvez cette zone et confirmez la mort des trois autres passagers de l'appareil.\n\n|Objectif 3: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 4: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 5: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la pr駸ence de caissons dans lesquels des 馗hantillons organiques sont maintenus de tr鑚 basses temp駻atures. Il pense que ceux-ci servent geler des corps avant de les op駻er ou de les diss駲uer. Trouvez cette zone et confirmez la mort d'au moins un des trois passagers de l'appareil.\n\n|Objectif 2: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 3: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 4: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. La mission est de sauver ce rescap.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescap駸 ayant 馗happ notre contact. Agissez rapidement.\n\n|Objectif 1: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la s馗urit. Une fois en votre possession, agissez vite avant que le vol ne soit rep駻.\n\n|Objectif 2: - Acc馘er au labo d'autopsie\n\nUne autopsie pr駑atur馥 sera bientt conduite dans l'un des laboratoires de haute s馗urit. Il sera ferm tous ceux ne poss馘ant pas de carte de niveau appropri. Trouvez-en une et acc馘ez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 3: - Sauver le rescap du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment 黎re un cadavre d鑚 qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtenir et utiliser l'uniforme de labo\n", + /* 10*/ "D騁ruire les archives informatiques\n", + /* 11*/ "Trouver les preuves de la conspiration\n", + /* 12*/ "Acc馘er au labo d'autopsie\n", + /* 13*/ "Sauver le rescap du crash\n", + /* 14*/ "Archives de recherche d騁ruites.\n", + /* 15*/ "Obtenir uniforme de labo.\n", + /* 16*/ "Laborantin: \n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme labo\n", + /* 19*/ "Uniforme labo obtenu.\n", + /* 20*/ "Acc鑚 syst鑪e contrle des portes refus.\n", + /* 21*/ "Acc鑚 syst鑪e contrle 馗lairage refus.\n", + /* 22*/ "Acc鑚 syst鑪e contrle s馗urit refus.\n", + /* 23*/ "Virus t駘馗harg dans la console.\n", + /* 24*/ "Obtenir r馗epteur.\n", + /* 25*/ "Laborantin: \n", + /* 26*/ "R馗epteur\n", + /* 27*/ "R馗epteur\n", + /* 28*/ "R馗epteur obtenu.\n", + /* 29*/ "Acc鑚 laboratoire: succ鑚.\n", + /* 30*/ "R馗epteur connect.\n", + /* 31*/ "Connexion r馗epteur coup馥.\n", + /* 32*/ "Obtenir carte medlab 2.\n", + /* 33*/ "Garde: \n", + /* 34*/ "Carte medlab 2\n", + /* 35*/ "Carte medlab 2\n", + /* 36*/ "Carte medlab 2 obtenue.\n", + /* 37*/ "Qui 黎es-vous?\n", + /* 38*/ "H! Mais c'est mes fringues!\n", + /* 39*/ "Au...au secours!\n", + /* 40*/ "Ne me tuez pas!\n", + /* 41*/ "Oh, mon Dieu! Une arme!\n", + /* 42*/ "Il y a un intrus dans le complexe.\n", + /* 43*/ "Donnez-moi mes v黎ements, sinon...!\n", + /* 44*/ "OK. Tu l'auras voulu, poulette!\n", + /* 45*/ "Donnez-moi mes fringues.\n", + /* 46*/ "Je n'ai pas beaucoup de temps!!!\n", + /* 47*/ "L'ennemi a d騁ect le costume.\n", + /* 48*/ "Virus d駛 t駘馗harg.\n", + /* 49*/ "Lancement t駘馗hargement virus.\n", + /* 50*/ "Enfin vous voil.\n", + /* 51*/ "Mais, vous n'黎es pas... ALEEEERTE!\n", + /* 52*/ "Armes interdites! Rangez votre arme.\n", + /* 53*/ "Je ne le r駱鑼erai pas: l稍hez votre arme!\n", + /* 54*/ "Bon. J'appelle la s馗urit.\n", + /* 55*/ "Tout le monde vous attendait...\n", + /* 56*/ "Personnel crucial abattu.\n", + /* 57*/ "Acc鑚 au labo d'autopsie impossible.\n", + /* 58*/ "H! Ce n'est pas Harry. C'est un intrus!\n", + /* 59*/ "Obtenir carte salle d'op駻ation.\n", + /* 60*/ "Garde: \n", + /* 61*/ "Carte salle d'op駻ation\n", + /* 62*/ "Carte salle d'op駻ation\n", + /* 63*/ "Carte salle d'op駻ation obtenue.\n", + /* 64*/ "Elvis a 騁 abattu.\n", + /* 65*/ "Sortez de l, bon Dieu!!\n", + /* 66*/ "Caisson 駘ev.\n", + /* 67*/ "Caisson abaiss.\n", + /* 68*/ "Equipement crucial d騁ruit.\n", + /* 69*/ "Obtenir scanner rayons X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner rayons X\n", + /* 72*/ "Scanner rayons X\n", + /* 73*/ "Scanner rayons X obtenu.\n", + /* 74*/ "Cible scanner accroch馥.\n", + /* 75*/ "ID cible confirm馥 - origine extraterr.\n", + /* 76*/ "Cible scanner perdue.\n", + /* 77*/ "Costume port.\n", + /* 78*/ "Les douches... Il faut convaincre quelqu'un \nde se s駱arer de son uniforme...\n", + /* 79*/ "La temp駻ature tombe... La salle de \ncryog駭isation est proche.\n", + /* 80*/ "L'air est recycl par ici... Le labo\n d'autopsie est par l.\n", + /* 81*/ "Le voil, Joanna! Faites vite!\n", + /* 82*/ "Quitter cette zone maintenant.\n", + /* 83*/ "Vous avez le droit d'黎re ici, vous?\n", + /* 84*/ "Nom de D...\n", + /* 85*/ "C'est une espionne!\n", + /* 86*/ "Pr騅enez les autres...\n", + /* 87*/ "Imposteur!\n", + /* 88*/ "Surcharge syst鑪es d'馗lairage.\n", + /* 89*/ "Entr馥 suppl駑entaire aux labos cr鳬e.\n", + /* 90*/ "Vous ne pourrez trouver un moyen d'investir \nla zone de recherche, croyez-moi. \nLa seule possibilit reste une cloison \nque j'ai rep駻馥 dans une salle apr鑚 \nl'entrept. Essayez de la faire sauter.\n", + /* 91*/ "Pas de probl鑪e. Et o sont \nles explosifs?\n", + /* 92*/ "Dans cette caisse.\n", + /* 93*/ "H h. Terrible.\n", + /* 94*/ "Au fait, l'entrept est bourr de vigiles. \nBien que ce ne soit pas votre genre, essayez \nde vous faire discr鑼e plutt que de buter \ntout le monde.\n", + /* 95*/ "Entendu. Autre chose, maestro?\n", + /* 96*/ "Cette caisse...\n", + /* 97*/ "Oui?\n", + /* 98*/ "Elle n'aime pas qu'on lui tire dessus.\n", + /* 99*/ "Parfait. Bon... On va dire que \nlui il m'駭erve...\n", + /*100*/ "Levez les mains et 馗artez-vous de \nl'extraterrestre.\n", + /*101*/ "Qu'est-ce que vous foutez ici? \nCette salle doit 黎re scell馥! \nNe connaissez-vous pas les consignes \nd'une autopsie?\n", + /*102*/ "Ne me faites pas r駱騁er, Docteur. Et \n騁eignez-moi ce laser tout de suite.\n", + /*103*/ "Le Directeur Easton en sera inform, \nmademoiselle.\n", + /*104*/ "Mais j'y compte bien, mon cher! \nJe me suis amus馥 dans sa jolie base et \nmaintenant je vole son joujou.\n", + /*105*/ "D馭enses automatiques neutralis馥s.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_g.c b/src/files/lang/pal-final/lip_str_g.c new file mode 100644 index 000000000..8f0b0ef16 --- /dev/null +++ b/src/files/lang/pal-final/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Lschen Sie die Aufzeichnungen!\n\nJegliche Informationen, welche die Area 51-Techniker aus dem Flugzeugwrack extrahieren konnten, muss aus ihren Datenbanken gelscht werden. Das Hauptterminal befindet sich in einem versperrten Raum am Ende eines der Korridore. Installieren Sie mit Hilfe des Data Uplink-Ger舩s einen Virus, zerstren Sie anschlie゚end das Terminal. Wenn der Virus in andere Terminals kopiert wird, ist mit hilfreichen Nebeneffekten zu rechnen.\n\n|2. Ziel: - Finden Sie einen Beweis fr die Verschwrung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Krper cryogenisiert, um sie in weiterer Folge fr Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|3. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|4. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|5. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 1*/ "AREA 51 - MEDI-LABORS\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Finden Sie einen Beweis fr die Verschwrung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Krper cryogenisiert, um sie in weiterer Folge fr Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|2. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|3. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|4. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nSie mssen unseren Freund so schnell wie mglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Lschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere ワberlebende gibt. Die Zeit dr舅gt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, mssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|2. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemn臘hst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Tren werden fr alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Au゚erdem knnten auch noch Wachleute anwesend sein.\n\n|3. Ziel: - Retten Sie den ワberlebenden des Absturzes!\n\nSobald Sie im Labor sind, mssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zust゚t. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Krper besch臈igen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von hchster Notwendigkeit!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Verkleiden Sie sich als Labortechniker!\n", + /* 10*/ "Vernichten Sie die Aufzeichnungen!\n", + /* 11*/ "Finden Sie den Beweis!\n", + /* 12*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 13*/ "Retten Sie den ワberlebenden!\n", + /* 14*/ "Aufzeichnungen zerstrt.\n", + /* 15*/ "Finden Sie die Laborkleidung!\n", + /* 16*/ "eines Technikers\n", + /* 17*/ "Laborkleidung\n", + /* 18*/ "Laborkleidung eines Technikers\n", + /* 19*/ "Laborkleidung aufgenommen\n", + /* 20*/ "Zugriff auf den Trffnungsmechanismus verweigert\n", + /* 21*/ "Zugriff auf die Beleuchtungskontrollen verweigert\n", + /* 22*/ "Zugriff auf das Sicherheitssystem verweigert\n", + /* 23*/ "Virus wurde installiert.\n", + /* 24*/ "Finden Sie das Data Uplink-Ger舩!\n", + /* 25*/ "des Labortechnikers\n", + /* 26*/ "Data Uplink-Ger舩\n", + /* 27*/ "Data Uplink-Ger舩\n", + /* 28*/ "Data Uplink-Ger舩 aufgenommen\n", + /* 29*/ "Zutritt zum Labor erfolgreich durchgefhrt\n", + /* 30*/ "Verbindung hergestellt\n", + /* 31*/ "Verbindung abgebrochen\n", + /* 32*/ "Erlangen Sie die Schlsselkarte fr Medlab 2.\n", + /* 33*/ "der Wache\n", + /* 34*/ "Medlab 2-Schlsselkarte\n", + /* 35*/ "Medlab 2-Schlsselkarte\n", + /* 36*/ "Medlab 2-Schlsselkarte aufgenommen\n", + /* 37*/ "Wer sind Sie?\n", + /* 38*/ "Hey - Sie haben meine Ausrstung.\n", + /* 39*/ "Hilfe! Hilfe!\n", + /* 40*/ "Nicht schie゚en!\n", + /* 41*/ "Oh nein, eine Waffe!\n", + /* 42*/ "Es befindet sich ein Eindringling im Komplex.\n", + /* 43*/ "Geben Sie mir meine Ausrstung zurck, oder...!\n", + /* 44*/ "Na gut, Sie betteln ja frmlich darum!\n", + /* 45*/ "Geben Sie mir meine Ausrstung.\n", + /* 46*/ "Ich habe nicht viel Zeit!!!\n", + /* 47*/ "Der Feind hat die Tarnung durchschaut.\n", + /* 48*/ "Der Virus wurde bereits installiert.\n", + /* 49*/ "Virusinstallation initiiert.\n", + /* 50*/ "Sie haben es bis hierher geschafft.\n", + /* 51*/ "Hey, Sie sind nicht... ALARM! ALARM!\n", + /* 52*/ "Waffen sind hier nicht erlaubt. Legen Sie Ihre Waffe ab.\n", + /* 53*/ "Ich sage es nur einmal: Legen Sie die Waffe ab!\n", + /* 54*/ "Na gut, ich rufe die Security.\n", + /* 55*/ "Alle haben nur auf Sie gewartet...\n", + /* 56*/ "Wichtige Person eliminiert.\n", + /* 57*/ "Zugang zum Autopsie-Labor kann nicht erfolgen.\n", + /* 58*/ "Hey, das ist nicht Harry. Es ist ein Eindringling.\n", + /* 59*/ "Erlangen Sie die Schlsselkarte zum OP!\n", + /* 60*/ "der Wache\n", + /* 61*/ "OP-Schlsselkarte\n", + /* 62*/ "OP-Schlsselkarte\n", + /* 63*/ "OP-Schlsselkarte aufgenommen.\n", + /* 64*/ "Elvis wurde eliminiert.\n", + /* 65*/ "Mach, dass du hier rauskommst!\n", + /* 66*/ "Abwehreinheit wurde hochgefahren.\n", + /* 67*/ "Abwehreinheit wurde heruntergefahren.\n", + /* 68*/ "Wichtige Ausrstung wurde zerstrt.\n", + /* 69*/ "Finden Sie den Rntgen-Scanner.\n", + /* 70*/ "\n", + /* 71*/ "Rntgen-Scanner\n", + /* 72*/ "Rntgen-Scanner\n", + /* 73*/ "Rntgen-Scanner aufgenommen\n", + /* 74*/ "Scanner-Ziel erfasst\n", + /* 75*/ "Ziel-ID best舩igt - extraterrestrischer Ursprung.\n", + /* 76*/ "Scanner-Erfassung unterbrochen\n", + /* 77*/ "Verkleidung wurde getragen.\n", + /* 78*/ "Die Duschen... Wenn ich jemanden berzeugen kann, \nsich von seiner Uniform zu trennen...\n", + /* 79*/ "Die Temperatur f舁lt... Du musst \nin der N臧e des Cryo-Raums sein.\n", + /* 80*/ "Die Luft riecht, als ob sie stark gefiltert worden ist.\n Das Autopsie-Labor muss nahe sein.\n", + /* 81*/ "Da ist er, Jo! Rasch, oder du kommst zu sp舩!\n", + /* 82*/ "Verlassen Sie sofort dieses Gebiet!\n", + /* 83*/ "Drfen Sie sich hier aufhalten?\n", + /* 84*/ "Was zum...\n", + /* 85*/ "Ein Spion!\n", + /* 86*/ "Warnt die anderen!\n", + /* 87*/ "Betrger!\n", + /* 88*/ "Beleuchtungssystem berladen.\n", + /* 89*/ "Alternativer Zugang zu den medizinischen Labors erschaffen\n", + /* 90*/ "Das Problem ist, dass es keine Mglichkeit gibt, \nsich in die Forschungsabteilung zu schleichen. \nAber ich habe im Raum hinter den Lagerr舫men \neine brchige Stelle an der Wand markiert. \nAn dieser Stelle kannst du Sprengkrper anbringen, \num ein Loch in die Wand zu sprengen.\n", + /* 91*/ "Klingt nicht sehr problematisch. Wo \nfinde ich die Sprengkrper?\n", + /* 92*/ "In dieser Kiste.\n", + /* 93*/ "Reizend. Wirklich reizend.\n", + /* 94*/ "Ganz nebenbei: Die Lagerr舫me sind voller \nWachen. Es mag vielleicht nicht deinem Naturell \nentsprechen, aber du solltest dich eher \nanschleichen, als alles in die Luft zu jagen.\n", + /* 95*/ "Aber klar. Hast du noch weitere Perlen der Weisheit?\n", + /* 96*/ "Diese Kiste...\n", + /* 97*/ "Ja?\n", + /* 98*/ "Sie mag es nicht, wenn man auf sie schie゚t.\n", + /* 99*/ "Gro゚artig! Wenn ich jetzt noch mein Verlangen \nunterdrcken knnte, dich zu verpfeifen...\n", + /*100*/ "H舅de hoch und weg von dem Alien!\n", + /*101*/ "Was, zum Henker, glauben Sie hier zu tun? \nDieser Raum sollte versiegelt sein! \nWissen Sie gar nichts ber den Vorgang \nder Autopsie?\n", + /*102*/ "Fordern Sie es nicht heraus, Doktor. Und \nschalten Sie diesen Laser ab!\n", + /*103*/ "Direktor Easton wird ber diesen Vorfall \ninformiert werden, junge Dame.\n", + /*104*/ "Natrlich wird er darber informiert werden, \nSie Trottel. Immerhin bin ich gerade in seine \ngeheime Basis eingedrungen und stehle das Alien.\n", + /*105*/ "Automatische Verteidigung wurde deaktiviert.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_i.c b/src/files/lang/pal-final/lip_str_i.c new file mode 100644 index 000000000..795428fe6 --- /dev/null +++ b/src/files/lang/pal-final/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Distruggi i file di ricerca nel PC\n\nLe informazioni che i tecnici dell'Area 51 sono riusciti ad ottenere dai resti del disastro devono essere eliminate dalla loro banca dati. Il terminale centrale si trova in una stanza chiusa a chiave in fondo al corridoio principale. Installa un virus tramite il Connettore Dati e poi distruggi anche il computer. Se il virus viene propagato anche agli altri terminali potrebbe avere effetti formidabili.\n\n|Obiettivo 2: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unit di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unit possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unit e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 3: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 4: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 5: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 1*/ "AREA 51 - LABORATORI MEDICI\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unit di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unit possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unit e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 2: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 3: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 4: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo pi in fretta che puoi. Un travestimento ti sar utile, ma non durer in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poich il tuo furto non passer inosservato per molto!\n\n|Obiettivo 2: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avr presto luogo un'autopsia. Sar vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 3: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che ancora vivo o cercheranno di danneggiare ci che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocit fondamentale!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Procurati travestimento da tecnico\n", + /* 10*/ "Distruggi i file nel PC\n", + /* 11*/ "Trova le prove della cospirazione\n", + /* 12*/ "Entra nel laboratorio autopsie\n", + /* 13*/ "Salva il sopravvissuto al disastro\n", + /* 14*/ "Distrutti file di ricerca\n", + /* 15*/ "Procurati camice\n", + /* 16*/ "Tecnico di laboratorio:\n", + /* 17*/ "Camice\n", + /* 18*/ "Camice\n", + /* 19*/ "Preso camice\n", + /* 20*/ "Negato accesso al sistema comando porte\n", + /* 21*/ "Negato accesso al sistema comando luci\n", + /* 22*/ "Negato accesso al sistema comando sicurezza\n", + /* 23*/ "Scaricato il virus\n", + /* 24*/ "Procurati Connettore Dati.\n", + /* 25*/ "Tecnico di laboratorio:\n", + /* 26*/ "C. Dati\n", + /* 27*/ "Connettore Dati\n", + /* 28*/ "Preso Connettore Dati.\n", + /* 29*/ "Accesso laboratorio: riuscito.\n", + /* 30*/ "Connettore Dati connesso.\n", + /* 31*/ "Connessione Connettore Dati interrotta.\n", + /* 32*/ "Procurati tessera lab.2\n", + /* 33*/ "Guardia:\n", + /* 34*/ "Tessera lab.2\n", + /* 35*/ "Tessera lab.2 \n", + /* 36*/ "Presa tessera lab.2\n", + /* 37*/ "Chi diavolo sei?\n", + /* 38*/ "Ehi, hai rubato il mio camice!\n", + /* 39*/ "Aiuto, aiuto!!!\n", + /* 40*/ "Non spararmi!\n", + /* 41*/ "Oh, maledizione! Una pistola!\n", + /* 42*/ "C' un intruso nel complesso!\n", + /* 43*/ "Ridammi il camice, altrimenti...\n", + /* 44*/ "Bene, l'hai voluto tu!\n", + /* 45*/ "Ridammi indietro il camice!\n", + /* 46*/ "Non ho molto tempo!!!\n", + /* 47*/ "Il nemico ha scoperto il travestimento.\n", + /* 48*/ "Il virus gi stato scaricato.\n", + /* 49*/ "Scaricamento virus in corso...\n", + /* 50*/ "Bene, finalmente sei qui!\n", + /* 51*/ "Ehi, ma tu non sei... SICUREZZA ALL'ERTA!\n", + /* 52*/ "Non sono ammesse pistole qui: posa quell'arma!\n", + /* 53*/ "Non fartelo ripetere: posa l'arma!\n", + /* 54*/ "Benissimo, chiamer la sicurezza!\n", + /* 55*/ "Ti stavamo giusto aspettando...\n", + /* 56*/ "Ucciso personale essenziale alla missione.\n", + /* 57*/ "Non puoi accedere al laboratorio.\n", + /* 58*/ "Ehi, non Harry! ネ un intruso!!!\n", + /* 59*/ "Procurati chiave sala operatoria.\n", + /* 60*/ "Guardia:\n", + /* 61*/ "Chiave sala operatoria\n", + /* 62*/ "Chiave sala operatoria\n", + /* 63*/ "Presa chiave sala operatoria.\n", + /* 64*/ "Elvis stato ucciso.\n", + /* 65*/ "Porta il tuo muso fuori di qua!\n", + /* 66*/ "Alzata unit di contenimento.\n", + /* 67*/ "Abbassata unit di contenimento.\n", + /* 68*/ "Distrutto strumento essenziale alla missione.\n", + /* 69*/ "Procurati scanner a raggi X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner a raggi X\n", + /* 72*/ "Scanner a raggi X\n", + /* 73*/ "Preso scanner a raggi X.\n", + /* 74*/ "Localizzato obiettivo scanner\n", + /* 75*/ "Obiettivo identificato: extraterrestre\n", + /* 76*/ "Perso obiettivo scanner\n", + /* 77*/ "Indossato il travestimento\n", + /* 78*/ "Le docce... Se riuscissi a convincere \nqualcuno a cedermi il camice...\n", + /* 79*/ "La temperatura sta scendendo: devi essere \nvicino alla sala criogena.\n", + /* 80*/ "Qui c' un forte ricircolo d'aria: devi essere \nvicino al laboratorio autopsie.\n", + /* 81*/ "Eccolo, Jo! Fa presto o sar troppo tardi!\n", + /* 82*/ "Abbandona subito quest'area.\n", + /* 83*/ "Che diavolo ci fai qua?\n", + /* 84*/ "Santo...\n", + /* 85*/ "ネ una spia, dannazione!\n", + /* 86*/ "Avverti gli altri...\n", + /* 87*/ "Impostore!\n", + /* 88*/ "Sistema di illuminazione in sovraccarico\n", + /* 89*/ "Creato ingresso alternativo ai laboratori\n", + /* 90*/ "Il tuo problema che non esiste nessun \nmodo per infiltrarsi nel reparto ricerca. \nL'unica possibilit un sottile tratto \ndi muro che ho contrassegnato nella stanza \ndietro ai magazzini. Lo potrai abbattere \ncon un po' di esplosivo.\n", + /* 91*/ "Non mi pare si tratti di un problema! \nDov' l'esplosivo?\n", + /* 92*/ "In quella cassa!\n", + /* 93*/ "Fantastico... veramente!\n", + /* 94*/ "Ah, a proposito... i magazzini brulicano \ndi guardie. Magari contro la tua natura, \nma cerca di insinuarti in mezzo a loro, \npiuttosto che far saltar per aria tutto!\n", + /* 95*/ "Certamente! Altri consigli illuminanti?\n", + /* 96*/ "Quella cassa...\n", + /* 97*/ "Allora?\n", + /* 98*/ "Meglio non sparargli contro...\n", + /* 99*/ "Bravo ragazzo! Cercher di resistere \nal piacere di denunciarti alle forze \ndi sicurezza della base...\n", + /*100*/ "Mani in alto e sta lontano dall'alieno.\n", + /*101*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /*102*/ "Non se lo faccia ripetere, Dottore! \nSpenga subito quel laser!\n", + /*103*/ "Il direttor Easton lo verr \na sapere, signorina!\n", + /*104*/ "Certo che lo verr a sapere, idiota! \nSono riuscita ad entrare nella sua base \nsegretissima e ora sto anche rubando il \nsuo alieno. E non lo deve venire a \nsapere?! Fammi ridere!!!\n", + /*105*/ "Disattivate difese automatiche\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_s.c b/src/files/lang/pal-final/lip_str_s.c new file mode 100644 index 000000000..8dc2741e8 --- /dev/null +++ b/src/files/lang/pal-final/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Destruir Registros Cientficos del Ordenador\n\nCualquier informacin y objetos que los t馗nicos del チrea 51 hayan sido capaces de sacar de los restos del choque deben ser suprimidos de sus bases de datos. La terminal del banco principal est en una habitacin cerrada en el corredor principal. Instala un virus usando el Conector de Datos, y destruye la propia terminal. Si el virus es instalado en otras terminales, producir efectos beneficiosos.\n\n|Objetivo Dos: - Localizar Evidencias de Conspiracin\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras org疣icas a temperaturas extremadamente bajas. ノl cree que se pueden usar para congelar cuerpos criog駭icamente antes de la ciruga o la diseccin. Encuentra este 疵ea y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Tres: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Cuatro: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Cinco: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 1*/ "チREA 51 - LABORATORIOS MノDICOS\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Localizar Evidencias de Conspiracin\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras org疣icas a temperaturas extremadamente bajas. ノl cree que se pueden usar para congelar cuerpos criog駭icamente antes de la ciruga o la diseccin. Encuentra este 疵ea y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Dos: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Tres: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Cuatro: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan r疳ido como puedas. Un disfraz te ayudar, pero no para siempre, as que salo bien. Borra sus grabaciones, y asegrate de que no haya m疽 supervivientes que los que conocemos. El tiempo apremia, as que date prisa.\n\n|Objetivo Uno: - Obtener y Usar el Disfraz de T馗nico de Laboratorio\n\nEncuentra un traje de t馗nico de laboratorio y salo para pasar el control de seguridad. Una vez hecho esto, mu騅ete r疳ido, ya que el engao no durar mucho.\n\n|Objetivo Dos: - Acceder al Laboratorio de Autopsias\n\nPronto se practicar una autopsia prematura en uno de los laboratorios m馘icos seguros. Ser cerrado para todos aquellos sin autorizacin, as que obt駭 una tarjeta del nivel adecuado. No todas las tarjetas valen, y tambi駭 hay guardas en las puertas.\n\n|Objetivo Tres: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deber疽 entrar en la c疥ara de autopsias antes de que daen al sujeto. Los cientficos intentar疣 matarle si piensan que est vivo o lo daar疣 si piensan que es un cad疱er en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtener y usar el disfraz de t馗nico\n", + /* 10*/ "Destruir registros del ordenador\n", + /* 11*/ "Localizar evidencias de conspiracin\n", + /* 12*/ "Acceder al laboratorio de autopsias\n", + /* 13*/ "Rescatar al Superviviente del impacto\n", + /* 14*/ "Registros cientficos destruidos.\n", + /* 15*/ "Obt駭 ropas de laboratorio.\n", + /* 16*/ "T馗nico:\n", + /* 17*/ "Ropas lab.\n", + /* 18*/ "Ropas de laboratorio\n", + /* 19*/ "Ropas de laboratorio obtenidas.\n", + /* 20*/ "Acceso al sistema de control de puertas denegado.\n", + /* 21*/ "Acceso al sistema de control de luces denegado.\n", + /* 22*/ "Acceso al sistema de control de seguridad denegado.\n", + /* 23*/ "Virus descargado en la consola.\n", + /* 24*/ "Obt駭 el Conector de Datos.\n", + /* 25*/ "T馗nico:\n", + /* 26*/ "C. Datos\n", + /* 27*/ "Conector de Datos\n", + /* 28*/ "Conector de Datos obtenido.\n", + /* 29*/ "Has accedido al laboratorio con 騙ito.\n", + /* 30*/ "Conector de Datos en marcha.\n", + /* 31*/ "Conexin perdida.\n", + /* 32*/ "Obt駭 llave magn騁ica del lab. 2.\n", + /* 33*/ "Guarda:\n", + /* 34*/ "Llave del lab. 2\n", + /* 35*/ "Llave magn騁ica del lab. 2\n", + /* 36*/ "Llave magn騁ica del lab. 2 obtenida.\n", + /* 37*/ "ソY t qui駭 eres?\n", + /* 38*/ "Hey. Tienes mis ropas.\n", + /* 39*/ "。Socorro, socorro!\n", + /* 40*/ "。No me dispares!\n", + /* 41*/ "。Oh, Dios mo, un arma!\n", + /* 42*/ "Hay un intruso en el complejo.\n", + /* 43*/ "Dame mis ropas... 。o ver疽!\n", + /* 44*/ "Vale. 。T lo has querido!\n", + /* 45*/ "Dame mis ropas.\n", + /* 46*/ "。。。No tengo mucho tiempo!!!\n", + /* 47*/ "El enemigo ha descubierto el disfraz.\n", + /* 48*/ "El virus ya ha sido descargado.\n", + /* 49*/ "Iniciando descarga del virus.\n", + /* 50*/ "As que por fin has llegado.\n", + /* 51*/ "Hey, t no eres... 。ALERTA, SEGURIDAD!\n", + /* 52*/ "No se permiten armas aqu. Deja tu arma.\n", + /* 53*/ "No te lo dir de nuevo. Tira tu arma.\n", + /* 54*/ "Vale. Estoy llamando a seguridad.\n", + /* 55*/ "Todos te est疣 esperando...\n", + /* 56*/ "Ha muerto personal crtico de la misin.\n", + /* 57*/ "No puedes acceder al laboratorio de autopsias.\n", + /* 58*/ "Hey, 駸e no es Harry. Es un intruso.\n", + /* 59*/ "Obt駭 llave magn騁ica del quirfano.\n", + /* 60*/ "Guarda:\n", + /* 61*/ "Llave del quirfano\n", + /* 62*/ "Llave magn騁ica del quirfano\n", + /* 63*/ "Llave magn騁ica del quirfano obtenida.\n", + /* 64*/ "Elvis ha muerto.\n", + /* 65*/ "。Salgamos de aqu!\n", + /* 66*/ "Contenedor subido.\n", + /* 67*/ "Contenedor bajado.\n", + /* 68*/ "Equipo crtico de la misin destruido.\n", + /* 69*/ "Obt駭 Esc疣er de Rayos-X.\n", + /* 70*/ "\n", + /* 71*/ "Esc疣er de Rayos-X\n", + /* 72*/ "Esc疣er de Rayos-X\n", + /* 73*/ "Esc疣er de Rayos-X obtenido.\n", + /* 74*/ "Sujeto de escaneo adquirido.\n", + /* 75*/ "ID. del sujeto confirmada - Origen E.T.\n", + /* 76*/ "Conexin del esc疣er perdida.\n", + /* 77*/ "El disfraz ha sido usado.\n", + /* 78*/ "Las duchas... Ahora, si pudiera convencer a alguien \npara irme con su uniforme...\n", + /* 79*/ "La temperatura est bajando... Debes de estar \ncerca de la sala de criogenizacin.\n", + /* 80*/ "El aire est fuertemente reciclado aqu: debo\n estar cerca del laboratorio de autopsias.\n", + /* 81*/ "。Ah est, Joanna! 。Deprisa o ser tarde!\n", + /* 82*/ "Salga de este 疵ea.\n", + /* 83*/ "ソDebe estar dentro?\n", + /* 84*/ "Por t...\n", + /* 85*/ "。Es una espa!\n", + /* 86*/ "Avisa a los otros...\n", + /* 87*/ "。Impostora!\n", + /* 88*/ "Sistemas de luz sobrecargados.\n", + /* 89*/ "Creada entrada alternativa a los laboratorios.\n", + /* 90*/ "El problema que tienes es que no hay ningn \nmodo de entrar en la seccin de desarrollo. \nEl nico camino disponible es una parte \nd饕il del muro que he marcado en la \nhabitacin tras los almacenes. Puede ser \ndestruida con explosivos.\n", + /* 91*/ "No me parece un problema. ソDnde\nest疣 esos explosivos?\n", + /* 92*/ "En esa caja.\n", + /* 93*/ "Bien. Muy bien.\n", + /* 94*/ "Eso s, los almacenes est疣 repletos de \nguardas. Puede ir contra tu naturaleza, \npero intenta evitarlos antes de hacer \nsaltar todo por los aires.\n", + /* 95*/ "Ciertamente. ソAlguna otra perla de sabidura?\n", + /* 96*/ "Esa caja...\n", + /* 97*/ "ソS?\n", + /* 98*/ "No le gusta que le disparen.\n", + /* 99*/ "Genial. Ahora, si slo pudiera luchar contra \nel impulso de informar de 駘 a Seguridad...\n", + /*100*/ "Levantad las manos y alejaos del\naliengena.\n", + /*101*/ "ソQu demonios te crees que est疽 haciendo? \n。Esto se supone que es una sala sellada! \nソNo sabes nada acerca de los procedimientos \nde autopsia?\n", + /*102*/ "No me haga repetrselo, doctor. Y \napague ese l疽er.\n", + /*103*/ "El Director Easton se enterar de esto, \njovencita.\n", + /*104*/ "Por supuesto que va a enterarse, idiota. \nHe logrado entrar en su base ultra-secreta, \ny ahora le estoy robando su aliengena.\n", + /*105*/ "Defensas Autom疸icas Desactivadas.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lueE.c b/src/files/lang/pal-final/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-final/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-final/lueJ.c b/src/files/lang/pal-final/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/pal-final/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/lueP.c b/src/files/lang/pal-final/lueP.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-final/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-final/lue_str_f.c b/src/files/lang/pal-final/lue_str_f.c new file mode 100644 index 000000000..55cdb911a --- /dev/null +++ b/src/files/lang/pal-final/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Installer D駻oute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont prot馮馥s par des mouchards, ce qui neutralisera notre connexion d鑚 que vous entrerez dans la base. Pour y rem馘ier, placez un D駻oute-Comms sur l'antenne satellite pr鑚 de l'entr馥.\n\n|Objectif 3: - D駸activer robots Interceptors\n\nUne fois le radar coup, les robots Interceptors vous poseront un probl鑪e. D騁ruisez un maximum d'unit駸 au sol. Notre derni鑽e photo satellite en r騅鑞e deux mais il risque d'y en avoir plus.\n\n|Objectif 4: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 5: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Installer D駻oute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont prot馮馥s par des mouchards, ce qui neutralisera notre connexion d鑚 que vous entrerez dans la base. Pour y rem馘ier, placez un D駻oute-Comms sur l'antenne satellite pr鑚 de l'entr馥.\n\n|Objectif 3: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 4: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps des conseillers ont 騁 men駸 au Secteur 51. Un de nos contacts infiltr dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescap.\n\n|Carrington - \n\nC'est un d駸astre, Joanna. Il faut faire sortir notre alli avant qu'il ne soit trop tard. Il y avait 馮alement de l'駲uipement sp馗ial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 d馮uis en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu p駭騁rer le bouclier furtif du vaisseau alli afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, d騁ruisez l'unit de contrle du radar l'aide d'explosifs. Elle se trouve probablement en sous-sol entour馥 de mat駻iel informatique.\n\n|Objectif 2: - Acc馘er l'ascenseur du hangar\n\nPasser par l'entr馥 principale serait du pur suicide. Utilisez plutt l'ascenseur du hangar. Notre contact affirme qu'une carte gard馥 par un technicien le fera fonctionner.\n\n|Objectif 3: - Contacter l'agent\n\nNotre agent sera d馮uis en garde, ce qui l'obligera rester son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de d騁ails.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Couper le radar d'interception\n", + /* 10*/ "Installer D駻oute-Comms sur antenne\n", + /* 11*/ "D駸activer robots Interceptors\n", + /* 12*/ "Acc馘er l'ascenseur du hangar\n", + /* 13*/ "Contacter l'espion de l'IC\n", + /* 14*/ "Obtenir grenades.\n", + /* 15*/ "Dr. Caroll: \n", + /* 16*/ "Grenade\n", + /* 17*/ "Une grenade\n", + /* 18*/ "Grenade obtenue.\n", + /* 19*/ "Robot Interceptor d駸activ.\n", + /* 20*/ "Tous robots Interceptors d駸activ駸.\n", + /* 21*/ "Obtenir D駻oute-Comms.\n", + /* 22*/ "Dr. Caroll: \n", + /* 23*/ "D駻oute-Comms\n", + /* 24*/ "D駻oute-Comms\n", + /* 25*/ "D駻oute-Comms obtenu.\n", + /* 26*/ "Mouchard de communication plac correctement.\n", + /* 27*/ "Mouchard de communication mal plac.\n", + /* 28*/ "Antenne d騁ruite.\n", + /* 29*/ "Antenne lev馥.\n", + /* 30*/ "Antenne baiss馥.\n", + /* 31*/ "Obtenir carte d'ascenseur.\n", + /* 32*/ "Dr. Caroll: \n", + /* 33*/ "Carte d'ascenseur\n", + /* 34*/ "Carte d'ascenseur\n", + /* 35*/ "Carte d'ascenseur obtenue.\n", + /* 36*/ "Acc鑚 ascenseur refus - carte requise.\n", + /* 37*/ "Carte accept馥 - ascenseur op駻ationnel.\n", + /* 38*/ "Ascenseur op駻ationnel.\n", + /* 39*/ "Hangar p駭騁r.\n", + /* 40*/ "Agent de l'IC contact.\n", + /* 41*/ "Radar d'interception coup.\n", + /* 42*/ "Objet crucial d騁ruit.\n", + /* 43*/ "Porte principale ouverte.\n", + /* 44*/ "Porte principale ferm馥.\n", + /* 45*/ "Acc鑚 refus.\n", + /* 46*/ "Explosif plac.\n", + /* 47*/ "Intrus d騁ect - syst鑪es s馗urit branch駸.\n", + /* 48*/ "Obtenir explosif.\n", + /* 49*/ "Dr. Caroll: \n", + /* 50*/ "Explosifs\n", + /* 51*/ "Explosifs\n", + /* 52*/ "Explosifs obtenus.\n", + /* 53*/ "Le radar d'interception est contrl depuis \nce bunker.\n", + /* 54*/ "Voil l'antenne, mais... Je ne peux pas lancer \nun mouchard si haut!\n", + /* 55*/ "L'ascenseur du hangar est derri鑽e \ncette grande porte.\n", + /* 56*/ "Attention ne pas descendre n'importe qui, Agent Dark - \nvous vous approchez de ma position.\n", + /* 57*/ "Terminaux d'acc鑚 ascenseur d騁ruits.\n", + /* 58*/ "Regardez Joanna: notre agent infiltr \ndans le Secteur 51 a pu nous faire \nparvenir ceci.\n", + /* 59*/ "C'est votre point d'entr馥: un h駘iport \nabandonn en bordure de la base.\n", + /* 60*/ "L'ascenseur vers les hangars et le \npoint de rendez-vous est derri鑽e ce \nmur. Attention aux gardes.\n", + /* 61*/ "Voici l'antenne de communication. Fixez \nun D駻oute-Comms et nous pourrons vous \nparler dans la base. Encore une fois, \nfaites attention la s馗urit.\n", + /* 62*/ "Oh, mon Dieu!\n", + /* 63*/ "Voici notre ami. Il ne semble pas bless \nbien qu'il n'ait pas encore repris ses \nesprits. De toute 騅idence, les chirurgiens \nont presque achev leurs pr駱arations \net vont bientt entamer la dissection.\n", + /* 64*/ "Mais qui est...?\n", + /* 65*/ "Des questions? Non? Bon. En route \nvers le hangar.\n", + /* 66*/ "Agent Dark, Journal de mission, H: 10:28. \nJe suis sur le point d'acc馘er au \nSecteur 51.\n", + /* 67*/ "Agent Dark! Par ici!\n", + /* 68*/ "Vous voil, vous! Je pensais \nque...\n", + /* 69*/ "Que quoi?\n", + /* 70*/ "Que vous 騁iez mort. Vous devez \navoir une bonne 騁oile pour 黎re \nencore en vie.\n", + /* 71*/ "Je m'occupais de votre boulot mal fait.\n", + /* 72*/ "Mal quoi?\n", + /* 73*/ "Vous vouliez peut-黎re que ce garde vous \ndescende? Tr鑚 bien. Je peux en appeler un \nautre si vous voulez...\n", + /* 74*/ "Bon, bon. Laissez tomber. Je pr騅iens \nl'Institut de notre rencontre.\n", + /* 75*/ "Objet 騁ranger d騁ect - s馗urit alert馥.\n", +}; diff --git a/src/files/lang/pal-final/lue_str_g.c b/src/files/lang/pal-final/lue_str_g.c new file mode 100644 index 000000000..9bf3c166c --- /dev/null +++ b/src/files/lang/pal-final/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhrmechanismen geschtzt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, mssen Sie einen Antennenzugang an der Satellitenschssel installieren.\n\n|3. Ziel: - Setzen Sie die Abfang-Roboter au゚er Kraft!\n\nAuch wenn das Radar deaktiviert ist, stellen die Abfang-Roboter eine ernsthafte Gefahr dar. Besch臈igen Sie so viele Einheiten, wie mglich. Unser letztes Satellitenphoto zeigt zwei Maschinen, aber es knnen sich noch weitere Roboter am Gel舅de befinden.\n\n|4. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|5. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 1*/ "AREA 51 - UMGEBUNG\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhrmechanismen geschtzt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, mssen Sie einen Antennenzugang an der Satellitenschssel installieren.\n\n|3. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|4. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe fr uns. Wir mssen unsere Verbndeten von dort rausschaffen, bevor es zu sp舩 ist. Au゚erdem befand sich an Bord der Maschine spezielle Ausrstung, die nicht in die H舅de von Trent Easton fallen darf. Sie erhalten Untersttzung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschie゚en. Um flchten zu knnen, mssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, w舐e blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlsselkarte brauchen, um den Aufzug betreten zu knnen. Einer der Wartungstechniker tr臠t garantiert eine Karte bei sich.\n\n|3. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das hei゚t, dass sein Aktions- radius ziemlich eingeschr舅kt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher mssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfgung.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Schalten Sie die Radar-Funktion ab!\n", + /* 10*/ "Installieren Sie den Antennen-Zugang!\n", + /* 11*/ "Setzen Sie die Roboter au゚er Kraft!\n", + /* 12*/ "Betreten Sie den Hangar-Aufzug!\n", + /* 13*/ "Kontaktieren Sie unseren Agenten!\n", + /* 14*/ "Erlangen Sie die Granaten!\n", + /* 15*/ "Dr. Carolls\n", + /* 16*/ "Granate\n", + /* 17*/ "Eine Granate\n", + /* 18*/ "Granate aufgenommen\n", + /* 19*/ "Abfang-Roboter au゚er Kraft gesetzt\n", + /* 20*/ "Alle Abfang-Roboter wurden au゚er Kraft gesetzt.\n", + /* 21*/ "Erlangen Sie den Antennenzugang.\n", + /* 22*/ "Dr. Carolls\n", + /* 23*/ "Antennenzugang\n", + /* 24*/ "Antennenzugang\n", + /* 25*/ "Antennenzugang aufgenommen\n", + /* 26*/ "Antennenzugang wurde korrekt platziert.\n", + /* 27*/ "Antennenzugang wurde nicht korrekt platziert.\n", + /* 28*/ "Antenne wurde zerstrt.\n", + /* 29*/ "Antenne wurde hochgefahren.\n", + /* 30*/ "Antenne wurde heruntergefahren.\n", + /* 31*/ "Finden Sie die Schlsselkarte fr den Aufzug!\n", + /* 32*/ "Dr. Carolls\n", + /* 33*/ "Schlsselkarte\n", + /* 34*/ "Schlsselkarte\n", + /* 35*/ "Schlsselkarte aufgenommen\n", + /* 36*/ "Zutritt zum Aufzug verweigert - Schlsselkarte wird bentigt.\n", + /* 37*/ "Schlsselkarte akzeptiert - Aufzug ist einsatzbereit.\n", + /* 38*/ "Der Aufzug ist einsatzbereit.\n", + /* 39*/ "Hangar wurde betreten.\n", + /* 40*/ "Agent wurde kontaktiert.\n", + /* 41*/ "Radar-Funktion wurde abgeschaltet.\n", + /* 42*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 43*/ "Haupttor wurde geffnet.\n", + /* 44*/ "Haupttor wurde geschlossen.\n", + /* 45*/ "Zugriff verweigert\n", + /* 46*/ "Sprengkrper wurde platziert.\n", + /* 47*/ "Eindringling - ワberwachungssystem online\n", + /* 48*/ "Erlangen Sie die Sprengs舩ze!\n", + /* 49*/ "Dr. Carolls\n", + /* 50*/ "Sprengs舩ze\n", + /* 51*/ "Sprengs舩ze\n", + /* 52*/ "Sprengs舩ze aufgenommen\n", + /* 53*/ "Die Radar-Funktion wird von diesem Bunker aus \ngesteuert.\n", + /* 54*/ "Da ist die Antenne, aber... Ich kann den ワberbrcker \nnicht so hoch hinaufwerfen.\n", + /* 55*/ "Der Aufzug ist auf der anderen Seite \ndieses Tores.\n", + /* 56*/ "Hoffe, du hast keinen nervsen Zeigefinger, Agent Dark - \nDu n臧erst dich meiner Position.\n", + /* 57*/ "Zugang zu den Terminals wurde zerstrt.\n", + /* 58*/ "Okay, Joanna, sehen Sie sich das an. Unser \nMann in der Basis konnte uns diese Information \nzuspielen.\n", + /* 59*/ "Hier gelangen Sie ins Innere; ein verlassenes Helipad \nam Rande der Basis.\n", + /* 60*/ "Der Aufzug zu den Hangars und der \nTreffpunkt befinden sich hinter dieser Mauer. \nAchten Sie auf die Wachen!\n", + /* 61*/ "Da ist die Kommunikationsantenne. \nInstallieren Sie den Antennenzugang, damit wir \nmit Ihnen kommunizieren knnen. Nochmals: \nAchten Sie auf Feindbewegungen!\n", + /* 62*/ "Oh nein!\n", + /* 63*/ "Da ist unser Freund. Es scheint, als w舐e er \nunversehrt, obwohl er bis jetzt noch nicht \nwieder bei Bewusstsein ist. Sieht so aus, als \nh舩ten die Chirurgen die ersten Tests bereits \nabgeschlossen. Wahrscheinlich beginnen sie gleich \nmit der Sektion.\n", + /* 64*/ "Aber wer war...?\n", + /* 65*/ "Noch Fragen? Nein? Gut. Machen Sie sich auf \nden Weg zum Hangar.\n", + /* 66*/ "Agent Dark Missions-Logbuch, 10.28 Uhr. Entgegen \nmeiner inneren Stimme betrete ich nun die \nArea 51.\n", + /* 67*/ "Agent Dark! Hier drben!\n", + /* 68*/ "Da bist du ja! Ich habe mich schon gefragt, \nob...\n", + /* 69*/ "Ob was?\n", + /* 70*/ "Ob du entdeckt worden bist. Ehrlich gesagt: \nWenn das deine Art ist zu arbeiten, dann wundert \nes mich, dass du bis jetzt berlebt hast.\n", + /* 71*/ "Ich musste ja die Lcher in deiner Abwehr stopfen.\n", + /* 72*/ "Die Lcher in meiner Abwehr?\n", + /* 73*/ "Verzeihung, ich wusste nicht, dass du es bevorzugen \nwrdest, wenn er auf dich geschossen h舩te. Aber wenn \ndu mchtest, kann ich ein paar Wachen rufen.\n", + /* 74*/ "Okay, okay, vergiss es. Ich lasse das Institut wissen, \ndass wir uns gefunden haben.\n", + /* 75*/ "Fremdkrper erfasst - Security wurde alarmiert.\n", +}; diff --git a/src/files/lang/pal-final/lue_str_i.c b/src/files/lang/pal-final/lue_str_i.c new file mode 100644 index 000000000..f54152979 --- /dev/null +++ b/src/files/lang/pal-final/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Disattiva gli intercettatori di terra\n\nSebbene il radar d'intercettazione aerea sia disattivato, gli intercettatori di terra continueranno ad essere un problema. Eliminane quanti pi possibile: la nostra ultima foto satellitare ne mostrava due a terra, ma potrebbero essercene anche altri.\n\n|Obiettivo 4: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 5: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 1*/ "AREA 51 - ESTERNO\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 4: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unit di comando del radar con l'esplosivo che con tutta probabilit nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servir una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 3: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sar travestito da guardia, il che significa che non ha molta libert di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! ネ posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni pi specifiche a questo riguardo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Disattiva radar d'intercettazione aerea\n", + /* 10*/ "Piazza una cimice sull'antenna\n", + /* 11*/ "Disattiva gli intercettatori di terra\n", + /* 12*/ "Penetra nell'ascensore dell'hangar\n", + /* 13*/ "Mettiti in contatto con l'agente segreto\n", + /* 14*/ "Procurati granate.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granata\n", + /* 17*/ "Granata\n", + /* 18*/ "Presa una granata.\n", + /* 19*/ "Disattivato l'intercettatore\n", + /* 20*/ "Disattivati tutti gli intercettatori\n", + /* 21*/ "Procurati cimice\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Cimice\n", + /* 24*/ "Cimice\n", + /* 25*/ "Presa cimice\n", + /* 26*/ "Cimice piazzata correttamente\n", + /* 27*/ "Cimice in posizione errata\n", + /* 28*/ "L'antenna stata distrutta.\n", + /* 29*/ "Alzata l'antenna\n", + /* 30*/ "Abbassata l'antenna\n", + /* 31*/ "Procurati tessera ascensore\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Tessera ascensore\n", + /* 34*/ "Tessera ascensore\n", + /* 35*/ "Presa tessera ascensore\n", + /* 36*/ "Negato accesso ascensore - Serve tessera\n", + /* 37*/ "Tessera valida - Ascensore in funzione\n", + /* 38*/ "L'ascensore in funzione.\n", + /* 39*/ "Raggiunto l'hangar\n", + /* 40*/ "Incontrato l'agente segreto\n", + /* 41*/ "Disattivato radar d'intercettazione aerea\n", + /* 42*/ "Distrutto strumento essenziale alla missione\n", + /* 43*/ "Aperto cancello principale\n", + /* 44*/ "Chiuso cancello principale\n", + /* 45*/ "Accesso negato\n", + /* 46*/ "Piazzato esplosivo\n", + /* 47*/ "Allarme intrusione - Sistema di sicurezza operativo\n", + /* 48*/ "Procurati esplosivo\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Esplosivo\n", + /* 51*/ "Esplosivo\n", + /* 52*/ "Preso esplosivo\n", + /* 53*/ "Il radar d'intercettazione aerea \ncomandato da quel bunker!\n", + /* 54*/ "Ecco l'antenna, ma... non posso mica lanciare \nuna cimice fin lass!\n", + /* 55*/ "L'ascensore dell'hangar oltre \nquel portone.\n", + /* 56*/ "Vacci piano con quel grilletto, Agente Dark: \nti stai avvicinando alla mia postazione.\n", + /* 57*/ "Distrutti i terminali di accesso all'ascensore\n", + /* 58*/ "Bene, Joanna, guarda qua! Il nostro \nagente nell'Area 51 riuscito a \nprocurarci questo!\n", + /* 59*/ "Questo il tuo punto d'ingresso: un \neliporto deserto ai margini della base.\n", + /* 60*/ "L'ascensore per gli hangar e il punto \nd'incontro sono oltre quel muro: \nattenzione a queste guardie!\n", + /* 61*/ "Qui c' un'antenna di comunicazione: \nattaccaci una cimice in modo che possiamo \nrimanere in contatto mentre sei dentro la \nbase. Ripeto, attenta alle guardie!\n", + /* 62*/ "Oh, maledizione!\n", + /* 63*/ "Ecco il nostro amico: sembra illeso \nfisicamente, sebbene non abbia ancora \nripreso conoscenza. A prima vista \nsembra che i chirurghi abbiano finito \ni loro esami preliminari e che stiano \nper iniziare il sezionamento.\n", + /* 64*/ "Ma chi era...\n", + /* 65*/ "Qualche domanda? No! Benissimo. Forza! \nVa nell'hangar!\n", + /* 66*/ "Missione dell'Agente Dark, ore 10.28. \nAnche se stento a crederci sto per \nentrare nell'Area 51.\n", + /* 67*/ "Agente Dark! Da questa parte!\n", + /* 68*/ "Eccoti, finalmente! Stavo iniziando \na chiedermi se...\n", + /* 69*/ "Se cosa?!\n", + /* 70*/ "Se magari non t'eri gi fatto scoprire! \nE francamente se questo il modo in cui \nlavori, sono sorpresa che tu abbia \nresistito per pi di cinque minuti!\n", + /* 71*/ "Stavo solo cercando di coprirti le spalle!\n", + /* 72*/ "Le MIE spalle?\n", + /* 73*/ "Scusa, non m'ero accorto che volevi \nche ti sparasse. Posso chiamare \nqualche altra guardia se vuoi!\n", + /* 74*/ "Va bene, va bene. Lascia perdere! \nComunicher all'istituto che ci \nsiamo incontrati.\n", + /* 75*/ "Rilevato oggetto strano - Sicurezza allertata\n", +}; diff --git a/src/files/lang/pal-final/lue_str_s.c b/src/files/lang/pal-final/lue_str_s.c new file mode 100644 index 000000000..a9fe8e183 --- /dev/null +++ b/src/files/lang/pal-final/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterr疣eas del チrea 51 est疣 protegidas de dispositivos de escucha, lo que significa que nuestra conexin se romper tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parablica cercana a la entrada.\n\n|Objetivo Tres: - Desactivar Robots Interceptores en tierra\n\nIncluso con el radar interceptor a駻eo apagado, los propios robots interceptores ser疣 un problema. Destruye tantas unidades en tierra como sea posible; nuestra ltima foto de sat駘ite muestra dos en tierra, pero quiz haya m疽.\n\n|Objetivo Cuatro: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 1*/ "チREA 51 - EXTERIOR\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterr疣eas del チrea 51 est疣 protegidas de dispositivos de escucha, lo que significa que nuestra conexin se romper tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parablica cercana a la entrada.\n\n|Objetivo Tres: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Cuatro: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha conseguido llevar informacin al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de all antes de que sea demasiado tarde. Y tambi駭 haba cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendr疽 algo de ayuda en esta misin gracias a nuestro espa en el チrea 51 que est disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor A駻eo\n\nEste dispositivo fue capaz de penetrar la proteccin de la nave de nuestros aliados, as que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga 騙ito, debes destruir la unidad de control de radar con los explosivos, y seguramente estar escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, as que en lugar de eso, dirige tu atencin al ascensor del hangar. Nuestro espa inform que necesitar疽 una llave magn騁ica para hacer funcionar el ascensor y el t馗nico de mantenimiento ser tu mejor apuesta para encontrar una.\n\n|Objetivo Tres: - Contactar con el Agente\n\nNuestro agente estar vestido como un guarda. Ello significa que no podr apartarse demasiado de su puesto dentro de la base sin atraer la atencin, as que depende de ti encontrarle. Est apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy especfico.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Apagar el radar interceptor a駻eo\n", + /* 10*/ "Colocar disp. de com. en antena\n", + /* 11*/ "Desac. todos los robots interceptores\n", + /* 12*/ "Acceder al ascensor del hangar\n", + /* 13*/ "Contactar con el espa del IC\n", + /* 14*/ "Obt駭 granadas.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granada\n", + /* 17*/ "Una granada\n", + /* 18*/ "Granada obtenida.\n", + /* 19*/ "Robot interceptor desactivado.\n", + /* 20*/ "Todos los robots interceptores est疣 desactivados.\n", + /* 21*/ "Obt駭 controlador de comunicaciones.\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Control com.\n", + /* 24*/ "Controlador de comunicaciones\n", + /* 25*/ "Controlador de comunicaciones obtenido.\n", + /* 26*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 27*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 28*/ "La antena ha sido destruida.\n", + /* 29*/ "Antena elevada.\n", + /* 30*/ "Antena bajada.\n", + /* 31*/ "Obt駭 llave magn騁ica del ascensor.\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Llave del ascensor\n", + /* 34*/ "Llave magn騁ica del ascensor\n", + /* 35*/ "Llave magn騁ica del ascensor obtenida\n", + /* 36*/ "Acceso al ascensor denegado - llave magn騁ica requerida.\n", + /* 37*/ "Llave magn騁ica aceptada - ascensor operativo.\n", + /* 38*/ "El ascensor est completamente operativo.\n", + /* 39*/ "Has accedido al hangar.\n", + /* 40*/ "Has encontrado al agente del IC.\n", + /* 41*/ "Radar interceptor a駻eo apagado.\n", + /* 42*/ "Objeto crtico de la misin destruido.\n", + /* 43*/ "La puerta principal ha sido abierta.\n", + /* 44*/ "La puerta principal ha sido cerrada.\n", + /* 45*/ "Acceso denegado.\n", + /* 46*/ "El explosivo ha sido colocado.\n", + /* 47*/ "Intruso detectado - sistema de seguridad activo.\n", + /* 48*/ "Obt駭 explosivos.\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Explosivos\n", + /* 51*/ "Explosivos\n", + /* 52*/ "Explosivos obtenidos.\n", + /* 53*/ "El radar interceptor a駻eo es controlado desde \nese bnker.\n", + /* 54*/ "Ah est la antena, pero... 。no puedo lanzar un \n'bicho' a esa altura!\n", + /* 55*/ "El ascensor del hangar est al otro lado \nde esa gran puerta.\n", + /* 56*/ "Cuidado con el dedo en el gatillo, Agente Dark. Te est疽 acercando a mi posicin.\n", + /* 57*/ "Terminales de acceso del ascensor destruidos.\n", + /* 58*/ "Vale, Joanna, echa un vistazo a esto. \nNuestro agente en el チrea 51 fue capaz \nde sacar esto para nosotros.\n", + /* 59*/ "ノste es tu punto de entrada. Un helipuerto \ndesierto en el borde de la base.\n", + /* 60*/ "El ascensor que baja a los hangares y el \npunto de encuentro est疣 detr疽 de ese \nmuro... Cuidado con esos guardas.\n", + /* 61*/ "Aqu est la antena de comunicaciones. \nColoca un 'bicho' para que podamos contactar \ncuando est駸 dentro de la base. De nuevo, \ncuidado con el personal hostil.\n", + /* 62*/ "。Oh, Dios mo!\n", + /* 63*/ "Aqu est nuestro amigo. Parece que no \nest fsicamente daado, aunque no ha \nrecuperado la consciencia todava. Por lo \nque parece, los cirujanos casi han hecho \nsus pruebas preliminares y comenzar疣 \npronto con la diseccin.\n", + /* 64*/ "ソPero qu es...?\n", + /* 65*/ "ソAlguna pregunta? No. Bien. Despu駸 \nir疽 al hangar.\n", + /* 66*/ "Informe de Misin del Agente Dark, 10:28 horas. \nContra mi mejor juicio, estoy a punto de \nentrar en el チrea 51.\n", + /* 67*/ "。Agente Dark! 。Aqu!\n", + /* 68*/ "。Aqu est疽! Estaba empezando a \npreguntarme si...\n", + /* 69*/ "ソSi qu?\n", + /* 70*/ "Si habas sido descubierto ya. Y francamente, \nsi as es como trabajas, estoy asombrada de \nque hayas sobrevivido m疽 de cinco minutos.\n", + /* 71*/ "Estaba atando uno de tus cabos sueltos.\n", + /* 72*/ "ソMis cabos sueltos?\n", + /* 73*/ "Lo siento, no pensaba que quisieras que 駘 \nte disparara. Puedo llamar a m疽 guardas \nsi t quieres...\n", + /* 74*/ "Vale, vale, olvdalo. Voy a hacer saber al \nInstituto que hemos contactado.\n", + /* 75*/ "Objeto extrao detectado - seguridad alertada.\n", +}; diff --git a/src/files/lang/pal-final/miscE.c b/src/files/lang/pal-final/miscE.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-final/miscE.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/miscJ.c b/src/files/lang/pal-final/miscJ.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-final/miscJ.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/miscP.c b/src/files/lang/pal-final/miscP.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-final/miscP.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_f.c b/src/files/lang/pal-final/misc_str_f.c new file mode 100644 index 000000000..b56f65a20 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_f.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R E U R\n", + /* 1*/ "Pas de briefing pour cette mission\n", + /* 2*/ "\n", + /* 3*/ "Objectif", + /* 4*/ "Succ鑚\n", + /* 5*/ "Incomplet\n", + /* 6*/ "Echec\n", + /* 7*/ "Plus qu'une minute.\n", + /* 8*/ "OBJECTIFS NON ATTEINTS - abandonner mission.\n", + /* 9*/ "Salutations Garde\n", + /* 10*/ "C'est quoi ce flingue?\n", + /* 11*/ "Ne pointe pas 軋 sur moi.\n", + /* 12*/ "Vit/MPS", + /* 13*/ "Hau/M", + /* 14*/ "Dev/D", + /* 15*/ "Ang/D", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELE 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Cool", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Difficile", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "Cool-Sim", + /* 28*/ "Facile-Sim", + /* 29*/ "Normal-Sim", + /* 30*/ "Difficile-Sim", + /* 31*/ "Perfect-Sim", + /* 32*/ "Dark-Sim", + /* 33*/ "Peace-Sim", + /* 34*/ "Armu-Sim", + /* 35*/ "Roket-Sim", + /* 36*/ "Kaze-Sim", + /* 37*/ "Poing-Sim", + /* 38*/ "Proie-Sim", + /* 39*/ "L稍he-Sim", + /* 40*/ "Juge-Sim", + /* 41*/ "Fixe-Sim", + /* 42*/ "Speed-Sim", + /* 43*/ "Tortue-Sim", + /* 44*/ "Venge-Sim", + /* 45*/ "Cool-Sim: c'est le plus facile des simulants. Un excellent choix pour un d饕utant. Il n'est pas tr鑚 malin et vise tr鑚 mal.\n", + /* 46*/ "Facile-Sim: Ce simulant a des capacit駸 de base mais il peut 黎re dangereux.\n", + /* 47*/ "Normal-Sim: Ce simulant a les m麥es capacit駸 que le joueur humain moyen.\n", + /* 48*/ "Difficile-Sim: Ce simulant a les m麥es capacit駸 qu'un bon joueur humain.\n", + /* 49*/ "Perfect-Sim: L'adversaire ultime, le plus intelligent et habile des simulants. Les joueurs choisissent souvent le Perfect-Sim pour am駘iorer leurs capacit駸.\n", + /* 50*/ "Dark-Sim: Prototype de cyborg d騅elopp par la dataDyne pour affronter les agents Carrington. Attention: ce simulant n'est pas humain. Il peut donc faire ce qui est humainement impossible.\n", + /* 51*/ "Peace-Sim: Un scientifique refusant d'utiliser une arme. Il recherche et r馗up鑽e les armes dans le niveau pour que les joueurs ne les utilisent pas. Vous pouvez bien sr lui tirer dessus et il en fera peut-黎re tomber!\n", + /* 52*/ "Armu-Sim: Il cherche toujours la meilleure protection. Si ce simulant perd de l'駭ergie, Il ira chercher un nouveau bouclier. Cela n'a aucun int駻黎 s'il n'y a pas de bouclier dans le niveau!\n", + /* 53*/ "Roket-Sim: Ce simulant adore tout faire sauter. Il pr馭鑽e l'armement explosif plutt que des pistolets ou des automatiques. C'est aussi vrai pour les armes au tir secondaire explosif!\n", + /* 54*/ "Kaze-Sim: Ce simulant ne recule devant rien pour d騁ruire sa cible. Il est tr鑚 aggressif et ne garde jamais ses distances - m麥e s'il tient une grenade! Faites attention quelqu'un qui n'a pas peur de mourir.\n", + /* 55*/ "Poing-Sim: Tout comme le Peace-Sim, ce simulant d騁este les armes mais il est en revanche un adversaire teigneux. Il tentera sans arr黎 d'assommer ou de d駸armer ses adversaires mains nues.\n", + /* 56*/ "Proie-Sim: Ce simulant pr馭鑽e attaquer les faibles pour tuer plus de monde. Il recherche les joueurs neufs et d駸arm駸 ou encore ceux affaiblis par un combat.\n", + /* 57*/ "L稍he-Sim: Ce simulant ne veut pas combattre et pr馭鑽e fuir pour survivre. Il peut attaquer de temps en temps mais seulement si l'adversaire a un armement inf駻ieur au sien. Utilisez une arme puissante ou tirez-lui dessus et il s'enfuira!\n", + /* 58*/ "Juge-Sim: Ce simulant est loyal et il d騁este les m騁hodes du Proie-Sim. Il essaiera de tuer le joueur en t黎e pour arrondir les scores.\n", + /* 59*/ "Fixe-Sim: Si ce simulant choisit une cible, celle-ci doit faire attention! Un Fixe-Sim poursuit un joueur jusqu' la fin de la partie! M麥e tu, il reviendra la charge.\n", + /* 60*/ "Speed-Sim: Ce simulant est un as de la vitesse. Il est plus rapide qu'un joueur humain, il est alors inutile, moins de connatre un raccourci, d'essayer de le semer!\n", + /* 61*/ "Tortue-Sim: Ce simulant porte un g駭駻ateur de bouclier d騅elopp par les scientifiques de la dataDyne. Le g駭駻ateur proj鑼e un bouclier deux fois plus r駸istant qu'un bouclier normal. Malheureusement, il r馘uit les mouvements de l'utilisateur. Le Tortue-Sim porte cet appareil m麥e s'il n'y a aucun bouclier dans le niveau.\n", + /* 62*/ "Venge-Sim: Ce simulant attaquera toujours le dernier joueur l'avoir attaqu ou tu. R馭l馗hissez avant de tirer.", + /* 63*/ "Combat Dark", + /* 64*/ "Myst鑽e skedar", + /* 65*/ "Agent IC", + /* 66*/ "Action dataDyne", + /* 67*/ "Pleurs maians", + /* 68*/ "Conflit extrater.", + /* 69*/ "Institut Carrington", + /* 70*/ "Centre dD", + /* 71*/ "Centre dD X", + /* 72*/ "Recherche dD", + /* 73*/ "Recherche dD X", + /* 74*/ "Extraction dD", + /* 75*/ "Extraction dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Immeuble G5", + /* 81*/ "Immeuble G5 X", + /* 82*/ "Infiltration S-51", + /* 83*/ "Infiltration S-51 X", + /* 84*/ "Sauvetage S-51", + /* 85*/ "Sauvetage S-51 X", + /* 86*/ "Fuite S-51", + /* 87*/ "Fuite S-51 X", + /* 88*/ "Base a駻ienne", + /* 89*/ "Base a駻ienne X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Site du crash", + /* 93*/ "Site du crash X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Sous-marin", + /* 97*/ "Sous-marin X", + /* 98*/ "D馭ense Institut", + /* 99*/ "D馭ense Institut X", + /*100*/ "Croiseur", + /*101*/ "Croiseur X", + /*102*/ "Ruines Skedars", + /*103*/ "Ruines Skedars X", + /*104*/ "G駭駻ique de fin", + /*105*/ "Hasard\n", + /*106*/ "Choisir: tout\n", + /*107*/ "Choisir: rien\n", + /*108*/ "Au hasard\n", + /*109*/ "Armes\n", + /*110*/ "Fonctions\n", + /*111*/ "Ordres\n", + /*112*/ "Pas d'arme\n", + /*113*/ "Choix cible\n", + /*114*/ "Suivre\n", + /*115*/ "Attaquer\n", + /*116*/ "D馭endre\n", + /*117*/ "Tenir\n", + /*118*/ "Normal\n", + /*119*/ "T駘馗harger\n", + /*120*/ "Obtenir mallette\n", + /*121*/ "Marquer PC\n", + /*122*/ "Tu(e) par", + /*123*/ "Tu", + /*124*/ "D饕utant:21\n", + /*125*/ "Stagiaire:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Bleu:18\n", + /*128*/ "Novice:17\n", + /*129*/ "2e classe:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Agent chef:14\n", + /*132*/ "Agent sp.:13\n", + /*133*/ "Expert:12\n", + /*134*/ "V騁駻an:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Dangereux:9\n", + /*137*/ "Mortel:8\n", + /*138*/ "Tueur:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Fatal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "QuasiPerf.:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "MUNI.FLECHETTE", + /*146*/ "MODELE 1.4", + /*147*/ "JM: 201172", + /*148*/ "Sauv. mallette\n", + /*149*/ "D馭. zone\n", + /*150*/ "Tenir zone\n", + /*151*/ "Prendre mallette\n", + /*152*/ "D馗apsuleur\n", + /*153*/ "Prot馮er\n", + /*154*/ "Tous simulants\n", + /*155*/ "MODELE 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Espace insuffisant pour lancer ", + /*158*/ "OBJECTIF:", + /*159*/ "SCORE LIMITE:", + /*160*/ "PRECISION MIN:", + /*161*/ "TIREZ POUR COMMENCER\n", + /*162*/ "PRET!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "CENTRE\n", + /*168*/ "EXPLOS饅n", + /*169*/ "Elvis est mort.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonds", + /*175*/ "Noirs", + /*176*/ "Auburn", + /*177*/ "Rin軋ge bleu", + /*178*/ "Joueur", + /*179*/ "", + /*180*/ "Identifier\n", + /*181*/ "Inutilis", + /*182*/ "Challenges\n", + /*183*/ "Charger jeu pr馘馭ini\n", + /*184*/ "D駑arrage rapide\n", + /*185*/ "R馮lages avanc駸\n", + /*186*/ "Simulateur de combat\n", + /*187*/ "Institut Carrington\n", + /*188*/ "S. 駲uipe\n", + /*189*/ "R馮lages termin駸\n", + /*190*/ "Equipe Joueur 1\n", + /*191*/ "Equipe Joueur 2\n", + /*192*/ "Equipe Joueur 3\n", + /*193*/ "Equipe Joueur 4\n", + /*194*/ "Nombre de Simulants\n", + /*195*/ "Simulants par 駲uipe\n", + /*196*/ "Difficult des Simulants\n", + /*197*/ "Commencer partie\n", + /*198*/ "Quitter\n", + /*199*/ "R馮lages joueur\n", + /*200*/ "R馮lages jeu\n", + /*201*/ "Lancer\n", + /*202*/ "Pr黎!\n", + /*203*/ "Equipe rapide\n", + /*204*/ "Joueurs seulement\n", + /*205*/ "Joueurs et simulants\n", + /*206*/ "Equipes de joueurs\n", + /*207*/ "Joueurs contre simulants\n", + /*208*/ "Equipes joueurs-simulants\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Rejouer mission pr馗馘ente\n", + /*212*/ "Holographe\n", + /*213*/ "Agressif\n", + /*214*/ "Passif\n", + /*215*/ "Perfect Pote\n", + /*216*/ "Furtif\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_g.c b/src/files/lang/pal-final/misc_str_g.c new file mode 100644 index 000000000..d94c82307 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_g.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "Fr diese Mission gibt es kein Briefing.\n", + /* 2*/ "\n", + /* 3*/ "Ziel", + /* 4*/ "erreicht\n", + /* 5*/ "nicht erreicht\n", + /* 6*/ "versagt\n", + /* 7*/ "Noch eine Minute.\n", + /* 8*/ "ZIELERREICHUNG UNGENワGEND - Mission abbrechen.\n", + /* 9*/ "Wachgru゚.\n", + /* 10*/ "Was soll die Waffe?\n", + /* 11*/ "Zielen Sie nicht auf mich!\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Opfer", + /* 22*/ "Leicht", + /* 23*/ "Normal", + /* 24*/ "Schwer", + /* 25*/ "Perfekt", + /* 26*/ "Dark", + /* 27*/ "OpferSim", + /* 28*/ "LeichtSim", + /* 29*/ "NormalSim", + /* 30*/ "SchwerSim", + /* 31*/ "PerfektSim", + /* 32*/ "DarkSim", + /* 33*/ "PazifistSim", + /* 34*/ "SchildSim", + /* 35*/ "RaketenSim", + /* 36*/ "SuizidSim", + /* 37*/ "FaustSim", + /* 38*/ "J臠erSim", + /* 39*/ "FeiglingSim", + /* 40*/ "JustizSim", + /* 41*/ "VendetSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "RacheSim", + /* 45*/ "OpferSim: Der am leichtesten zu besiegende Simulant. Eignet sich daher hervorragend fr Einsteiger. Der Simulant ist nicht sonderlich intelligent und ist zudem ein m葹iger Schtze.\n", + /* 46*/ "LeichtSim: Der Simulant verfgt zwar nur ber Basis-Intelligenz und -F臧igkeiten, ist aber trotzdem nicht ungef臧rlich.\n", + /* 47*/ "NormalSim: Der Simulant verfgt ber das Geschick eines menschlichen Spielers.\n", + /* 48*/ "SchwerSim: Der Simulant verfgt ber das Geschick eines guten menschlichen Spielers.\n", + /* 49*/ "PerfektSim: Der ultimative Gegner. トu゚erst intelligent und unberechenbar. Viele Spieler werden bevorzugt gegen ihn antreten, da sich ihre eigenen F臧igkeiten dadurch st舅dig verbessern.\n", + /* 50*/ "DarkSim: Ein Cyborg-Prototyp, der von dataDyne entwickelt wurde, um gegen das Institut vorzugehen. Beachten Sie, dass dieser Simulant, im Gegensatz zu den anderen, nicht menschlich ist. Daher kann er Dinge tun, die Menschen nicht tun knnen.\n", + /* 51*/ "PazifistSim: Diese Simulanten sind Wissenschaftler, die keine Waffen einsetzen. Sie gehen durch die Level, um herumliegende Waffen einzusammeln, sodass der Spieler sie nicht finden kann. Wenn Sie aber auf sie schie゚en, lassen sie vielleicht die Waffen fallen.\n", + /* 52*/ "SchildSim: Achtet immer auf maximalen Schild-Schutz. Verliert dieser Simulant seinen Schild, zieht er los, um einen neuen zu suchen. Das hat natrlich wenig Sinn, wenn keine Schilde vorhanden sind!\n", + /* 53*/ "RaketenSim: Dieser Simulant liebt es, Dinge in die Luft zu jagen. Er zieht Explosions-Waffen gegenber Pistolen und Automatik-Gewehren vor. Zu ersteren gehren auch Waffen, die eine 'explosive' Sekund舐-Funktion haben.\n", + /* 54*/ "SuizidSim: Dieser Simulant l舖st sich durch nichts aufhalten. Er ist sehr aggressiv und h舁t keine Distanz zum Gegner. Auch nicht, wenn er eine Granate h舁t! Seien Sie 舫゚erst vorsichtig, denn dieser Gegner kennt keine Angst.\n", + /* 55*/ "FaustSim: Dieser Simulant verwendet, 臧nlich wie der PazifistSim, keine Waffen. Kommt es aber zum Kampf, wird er seine F舫ste einsetzen. Er wird st舅dig versuchen, seinen Gegner zu entwaffnen.\n", + /* 56*/ "J臠erSim: Dieser Simulant jagt bevorzugt schw臘here Gegner. Er sucht nach Spielern, die die gerade erst erschienen sind, ber schwache Bewaffnung verfgen oder wenig Energie haben.\n", + /* 57*/ "FeiglingSim: Dieser Simulant wird eher sein Heil in der Flucht suchen, als zu k舂pfen. Er kann zwar hin und wieder attackieren, aber nur, wenn sein Gegner ber eine schwache Waffe verfgt. Ziehen Sie eine st舐kere Waffe, und er wird flchten!\n", + /* 58*/ "JustizSim: Dieser Simulant hat einen starken Gerechtigkeitssinn. Daher verurteilt er die Taktiken des J臠erSim. Er wird immer den st舐ksten Spieler verfolgen, um fr einen gleichm葹igen Score zu sorgen.\n", + /* 59*/ "VendetSim: Hat sich dieser Simulant ein Opfer ausgesucht, sollte der Spieler sehr vorsichtig sein! Ein VendetSim verfolgt diesen Spieler, bis das Spiel vorber ist! Er schreckt eventuell auch nicht vor einem Kamikaze-Angriff zurck.\n", + /* 60*/ "SpeedSim: Diese Simulanten sind unglaublich schnell. In Punkto Geschwindigkeit sind sie jedem Menschen berlegen, daher hat es keinen Sinn, vor ihnen zu flchten. (Es sei denn, Sie kennen eine Abkrzung.)\n", + /* 61*/ "TurtleSim: Dieser Simulant verfgt ber eine von dataDyne entwickelte Schildtechnologie. Der Generator projiziert ein Schutzschild um seinen Tr臠er, der doppelt so stark ist, wie ein normaler Schild. Leider wird dadurch auch die Bewegungsfreiheit eingeschr舅kt, und er kann sich nur langsam bewegen. TurtleSims tragen diesen Schild als Standard-Ausrstung, sogar, wenn es im aktuellen Level keine Schilde gibt.\n", + /* 62*/ "RacheSim: Seien Sie vorsichtig, wenn Sie auf einen RacheSim schie゚en, da er danach nur seinen Bezwinger angreift.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar-Mysterium", + /* 65*/ "CI-Operator", + /* 66*/ "dataDyne Action", + /* 67*/ "Maianische Tr舅en", + /* 68*/ "Alien-Konflikt", + /* 69*/ "Carrington Institut", + /* 70*/ "dD Zentrale", + /* 71*/ "dD Zentrale X", + /* 72*/ "dD Forschung", + /* 73*/ "dD Forschung X", + /* 74*/ "dD Extraktion", + /* 75*/ "dD Extraktion X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5-Building", + /* 81*/ "G5-Building X", + /* 82*/ "A-51 Infiltration", + /* 83*/ "A-51 Infiltration X", + /* 84*/ "A-51 Rettung", + /* 85*/ "A-51 Rettung X", + /* 86*/ "A-51 Flucht", + /* 87*/ "A-51 Flucht X", + /* 88*/ "Sttzpunkt", + /* 89*/ "Sttzpunkt X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Absturzstelle", + /* 93*/ "Absturzstelle X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Tiefsee", + /* 97*/ "Tiefsee X", + /* 98*/ "Verteidigung", + /* 99*/ "Verteidigung X", + /*100*/ "Feindliches Schiff", + /*101*/ "Feindliches Schiff X", + /*102*/ "Skedar Ruinen", + /*103*/ "Skedar Ruinen X", + /*104*/ "End Credits", + /*105*/ "Zuf舁lig\n", + /*106*/ "Alle\n", + /*107*/ "Keine\n", + /*108*/ "Zufallsgenerator\n", + /*109*/ "Waffe\n", + /*110*/ "Funktion\n", + /*111*/ "Befehle\n", + /*112*/ "Keine Waffe\n", + /*113*/ "Zielauswahl\n", + /*114*/ "Folgen\n", + /*115*/ "Attackieren\n", + /*116*/ "Verteidigen\n", + /*117*/ "Halten\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Schnapp den Koffer\n", + /*121*/ "Tag Box\n", + /*122*/ "Besiegt von:", + /*123*/ "Besiegt wurde:", + /*124*/ "Anf舅ger:21\n", + /*125*/ "Azubi:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Normal:18\n", + /*128*/ "Neuling:17\n", + /*129*/ "Soldat:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star-Agent:14\n", + /*132*/ "Spec-Agent:13\n", + /*133*/ "Experte:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Profi:10\n", + /*136*/ "Gef臧rlich:9\n", + /*137*/ "Letal:8\n", + /*138*/ "Tdlich:7\n", + /*139*/ "Verheerend:6\n", + /*140*/ "Zerstrer:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Berserker:3\n", + /*143*/ "Fast Perfekt:2\n", + /*144*/ "Perfekt:1\n", + /*145*/ "DARTMUNI", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Vert. Koffer\n", + /*149*/ "Vert. Hgel\n", + /*150*/ "Halte Hgel\n", + /*151*/ "Erl. Koffer\n", + /*152*/ "Pop Cap\n", + /*153*/ "Beschtze\n", + /*154*/ "Alle Simulanten\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Nicht gengend Platz fr den ", + /*158*/ "ZIELE:", + /*159*/ "SCORE:", + /*160*/ "MIN GENAUIGKEIT:", + /*161*/ "FEUER, UM LOSZULEGEN\n", + /*162*/ "FERTIG!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODIERT\n", + /*169*/ "Elvis wurde eliminiert.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Spieler", + /*179*/ "", + /*180*/ "Identifizieren\n", + /*181*/ "nicht verwendet", + /*182*/ "Challenges\n", + /*183*/ "Laden/Voreinstellung\n", + /*184*/ "Schnellstart\n", + /*185*/ "Erweitertes Setup\n", + /*186*/ "Kampf-Simulator\n", + /*187*/ "Carrington Institut\n", + /*188*/ "Team-Score\n", + /*189*/ "Setup abgeschlossen\n", + /*190*/ "Spieler 1 Team\n", + /*191*/ "Spieler 2 Team\n", + /*192*/ "Spieler 3 Team\n", + /*193*/ "Spieler 4 Team\n", + /*194*/ "Anzahl der Simulanten\n", + /*195*/ "Simulanten pro Team\n", + /*196*/ "Sim-Schwierigkeit\n", + /*197*/ "Start\n", + /*198*/ "Abbrechen\n", + /*199*/ "Spieler-Einstellungen\n", + /*200*/ "Spiel-Einstellungen\n", + /*201*/ "Quick Go\n", + /*202*/ "Fertig!\n", + /*203*/ "Quick-Team\n", + /*204*/ "Nur Spieler\n", + /*205*/ "Spieler und Simulanten\n", + /*206*/ "Spieler-Teams\n", + /*207*/ "Spieler vs. Simulanten\n", + /*208*/ "Spieler-Simulanten-Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Mission wiederholen\n", + /*212*/ "Holografie\n", + /*213*/ "Aggressiv\n", + /*214*/ "Passiv\n", + /*215*/ "Perfekte Kumpels\n", + /*216*/ "Tarnung\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_i.c b/src/files/lang/pal-final/misc_str_i.c new file mode 100644 index 000000000..1de2364e6 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_i.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R E\n", + /* 1*/ "Nessuna informazione per questa missione\n", + /* 2*/ "\n", + /* 3*/ "Obiettivo", + /* 4*/ "Completato\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallito\n", + /* 7*/ "Ancora un minuto.\n", + /* 8*/ "OBIETTIVI FALLITI: interrompi missione!\n", + /* 9*/ "Saluto guardia\n", + /* 10*/ "Cos' quella pistola?\n", + /* 11*/ "Non puntarla a me.\n", + /* 12*/ "v/ms", + /* 13*/ "h/m", + /* 14*/ "i/g", + /* 15*/ "t/g", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "TELESPIA", + /* 19*/ "MODELLO 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Pappa", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Tosto", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "RepPappa", + /* 28*/ "RepFacile", + /* 29*/ "RepNormal", + /* 30*/ "RepTosto", + /* 31*/ "RepPerfect", + /* 32*/ "RepDark", + /* 33*/ "RepPace", + /* 34*/ "RepScudo", + /* 35*/ "RepMissile", + /* 36*/ "RepKaze", + /* 37*/ "RepPugno", + /* 38*/ "RepPreda", + /* 39*/ "RepCodar", + /* 40*/ "RegGiusto", + /* 41*/ "RepLite", + /* 42*/ "RepAgile", + /* 43*/ "RepTarta", + /* 44*/ "RepVendi", + /* 45*/ "RepPappa: ネ il replicante pi facile da battere, un vero pappamolle e quindi il migliore per i principianti. Non molto intelligente e quasi incapace di sparare.\n", + /* 46*/ "RepFacile: ネ dotato di abilit e intelligenza elementari, ma pu rivelarsi pericoloso.\n", + /* 47*/ "RepNormal: Le sue abilit sono come quelle di un giocatore umano medio.\n", + /* 48*/ "RepTosto: Le sue abilit sono come quelle di un giocatore umano bravo.\n", + /* 49*/ "RepPerfect: L'avversario ultimo: il pi intelligente e abile. Da usarsi per un miglioramento continuo delle proprie capacit.\n", + /* 50*/ "RepDark: Prototipo cibernetico sviluppato dalla dataDyne per contrastare gli agenti di Carrington. Ricorda che questo replicante al contrario degli altri non umano, quindi potrebbe avere abilit sovrumane!\n", + /* 51*/ "RepPace: ネ un replicante-scienziato che protesta contro l'uso delle armi. Va in giro per i piani allaricerca di armi per nasconderle in modo che il giocatore non possa usarle. Sparandogli probabile che glienecadano alcune!\n", + /* 52*/ "RepScudo: ネ sempre alla ricerca del massimo scudo protettivo. Se perde energia, andr alla ricerca di unnuovo scudo. Peggio per lui se su quel piano non ci sono scudi!\n", + /* 53*/ "RepMissile: Adora le esplosioni: preferisce le armi che provocano violente deflagrazioni alle pistole convenzionali e alle mitragliatrici. Questo vale anche per le armi con funzioni esplosive secondarie!\n", + /* 54*/ "RepKaze: Il suo scopo distruggere l'avversario ad ogni costo. ネ molto aggressivo e non prende maile distanze... neanche da una granata! Non ha paura di morire e perci molto pericoloso.\n", + /* 55*/ "RepPugno: Come il RepPace anche questo replicante contro l'uso delle armi. Tuttavia non contro la lotta a mani nude:usa i pugni per cercare di stendere o disarmare l'avversario.\n", + /* 56*/ "RepPreda: Preferisce scagliarsi su avversari deboli per vincere facilmente. Cerca avversariprincipianti, muniti di arma meno potente o in cattiva salute.\n", + /* 57*/ "RepCodar: Piuttosto che combattere preferisce cercare scampo nella fuga. Attacca raramente e solo se l'avversario ha un'arma meno potente. Sfoderando un'arma migliore o sparando, scapper!\n", + /* 58*/ "RepGiusto: Ha un forte senso della giustizia e disprezza la strategia del RepPreda. Cerca sempre di colpireil giocatore in vantaggio per pareggiare il risultato.\n", + /* 59*/ "RepLite: Una volta che ha identificato un bersaglio, meglio tenere gli occhi aperti! Un RepLiteinseguir quel giocatore fino alla fine! Serba rancore anche dopo la morte.\n", + /* 60*/ "RepAgile: ネ agilissimo e velocissimo: corre molto pi veloce del giocatore umano, quindi inutile cercare di sfuggirgli a meno che si conosca una scorciatoia!\n", + /* 61*/ "RepTarta: Indossa il prototipo del generatore scudo creato dagli scienziati dataDyne. Il generatore proietta attorno al suo corpo uno scudo protettivo due volte pi potente di uno scudo normale. Questo per lo impedisce nei movimenti, per cui molto lento. Il RepTarta dotato di questo scudo anche se non ci sono scudi su quel piano.\n", + /* 62*/ "RepVendi: Sparando o uccidendo un RepVendi, gli altri attaccheranno l'ultimo giocatore che l'ha attaccato o ucciso.", + /* 63*/ "Lotta Dark", + /* 64*/ "Mistero Skedar", + /* 65*/ "Funzionario CI", + /* 66*/ "Azione dataDyne", + /* 67*/ "Lacrime Maian", + /* 68*/ "Conflitto Alieno", + /* 69*/ "Carrington Institute", + /* 70*/ "QG dataDyne", + /* 71*/ "QG dataDyne X", + /* 72*/ "Ricerca dD", + /* 73*/ "Ricerca dD X", + /* 74*/ "Estrazione dD", + /* 75*/ "Estrazione dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltrazione A51", + /* 83*/ "Infiltrazione A51 X", + /* 84*/ "Salvataggio A51", + /* 85*/ "Salvataggio A51 X", + /* 86*/ "Fuga A51", + /* 87*/ "Fuga A51 X", + /* 88*/ "Base aerea", + /* 89*/ "Base aerea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Luogo del disastro", + /* 93*/ "Luogo del disastro X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Abissi oceanici", + /* 97*/ "Abissi oceanici X", + /* 98*/ "Difesa dell'istituto", + /* 99*/ "Difesa dell'istituto X", + /*100*/ "Astronave Skedar", + /*101*/ "Astronave Skedar X", + /*102*/ "Rovine Skedar", + /*103*/ "Rovine Skedar X", + /*104*/ "Titoli di coda", + /*105*/ "A caso\n", + /*106*/ "Seleziona tutto\n", + /*107*/ "Nessuna selezione\n", + /*108*/ "Non in sequenza\n", + /*109*/ "Inventario\n", + /*110*/ "Funzione\n", + /*111*/ "Ordini\n", + /*112*/ "No armi\n", + /*113*/ "Scegli obiettivo\n", + /*114*/ "Segui\n", + /*115*/ "Attacca\n", + /*116*/ "Difendi\n", + /*117*/ "Fisso\n", + /*118*/ "Normale\n", + /*119*/ "Scarica\n", + /*120*/ "Prendi cassa\n", + /*121*/ "Box\n", + /*122*/ "Eliminato da", + /*123*/ "Eliminato", + /*124*/ "Princip.:21\n", + /*125*/ "Addestr.:20\n", + /*126*/ "Amatore:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novello:17\n", + /*129*/ "Truppa:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Ag.Grado:14\n", + /*132*/ "Ag.Spec:13\n", + /*133*/ "Esperto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Profess.:10\n", + /*136*/ "Pericoloso:9\n", + /*137*/ "Micidiale:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassino:6\n", + /*140*/ "Letale:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invulner.:3\n", + /*143*/ "SemiPerf:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "FRECCE", + /*146*/ "MODELLO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salva cassa\n", + /*149*/ "Difendi colle\n", + /*150*/ "Tieni colle\n", + /*151*/ "Prendi cassa\n", + /*152*/ "Tutti contro 1\n", + /*153*/ "Proteggi\n", + /*154*/ "Tutti replic.\n", + /*155*/ "MODELLO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Spazio insufficiente per il lancio", + /*158*/ "OBIETTIVI:", + /*159*/ "PUNTEGGIO:", + /*160*/ "PRECISIONE IN MIN:", + /*161*/ "SPARA PER INIZIARE\n", + /*162*/ "PRONTI!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "CENTRO\n", + /*168*/ "ESPLOSO\n", + /*169*/ "Elvis morto.\n", + /*170*/ "Modalit 1", + /*171*/ "Modalit 2", + /*172*/ "Modalit 3", + /*173*/ "Modalit 4", + /*174*/ "Biondo", + /*175*/ "Nero", + /*176*/ "Castano", + /*177*/ "Cachet blu", + /*178*/ "Giocat.", + /*179*/ "", + /*180*/ "Identifica\n", + /*181*/ "non in uso", + /*182*/ "Sfide\n", + /*183*/ "Carica/Imposta giochi\n", + /*184*/ "Avvio rapido\n", + /*185*/ "Impostaz. avanzate\n", + /*186*/ "Simulatore lotta\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Punti squadra\n", + /*189*/ "Fine impostazioni\n", + /*190*/ "Squadra 1 giocatore\n", + /*191*/ "Squadra 2 giocatori\n", + /*192*/ "Squadra 3 giocatori\n", + /*193*/ "Squadra 4 giocatori\n", + /*194*/ "Numero di replicanti\n", + /*195*/ "Replicanti per squadra\n", + /*196*/ "Difficolt replicanti\n", + /*197*/ "Avvia gioco\n", + /*198*/ "Esci\n", + /*199*/ "Impostaz. giocatori\n", + /*200*/ "Impostazioni gioco\n", + /*201*/ "Scelta rapida\n", + /*202*/ "Pronti!\n", + /*203*/ "Avvio rapido\n", + /*204*/ "Solo giocatori\n", + /*205*/ "Giocatori e replicanti\n", + /*206*/ "Squadre di giocatori\n", + /*207*/ "Giocatori contro replicanti\n", + /*208*/ "Squadre giocatori-replicanti\n", + /*209*/ "CAPSUSPIA", + /*210*/ "BOMBASPIA", + /*211*/ "Ripeti missione precedente\n", + /*212*/ "Olografia\n", + /*213*/ "Aggressivo\n", + /*214*/ "Passivo\n", + /*215*/ "Amici Perfect\n", + /*216*/ "In incognito\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_s.c b/src/files/lang/pal-final/misc_str_s.c new file mode 100644 index 000000000..8d7328bc3 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_s.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No hay informacin para esta misin\n", + /* 2*/ "\n", + /* 3*/ "Objetivo", + /* 4*/ "Completado\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallado\n", + /* 7*/ "Queda un minuto.\n", + /* 8*/ "OBJETIVOS FALLADOS - abortar misin.\n", + /* 9*/ "Saludos del Guarda\n", + /* 10*/ "ソQu arma es 駸a?\n", + /* 11*/ "No me apuntes con ese arma.\n", + /* 12*/ "v/mps", + /* 13*/ "a/m", + /* 14*/ "x/ー", + /* 15*/ "y/ー", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELO 1.2", + /* 20*/ "GIROSTATO", + /* 21*/ "Muy F當il", + /* 22*/ "F當il", + /* 23*/ "Normal", + /* 24*/ "Difcil", + /* 25*/ "Perfecto", + /* 26*/ "Oscuro", + /* 27*/ "SimMF當il", + /* 28*/ "SimF當il", + /* 29*/ "SimNormal", + /* 30*/ "SimDifci", + /* 31*/ "SimPerfec", + /* 32*/ "SimOscuro", + /* 33*/ "SimPaz", + /* 34*/ "SimEscudo", + /* 35*/ "SimCohete", + /* 36*/ "SimKamika", + /* 37*/ "SimLucha", + /* 38*/ "SimPresa", + /* 39*/ "SimCobard", + /* 40*/ "SimJuez", + /* 41*/ "SimPelea", + /* 42*/ "SimVeloz", + /* 43*/ "SimTortug", + /* 44*/ "SimVengan", + /* 45*/ "SimMF當il: ノste es el simulante m疽 f當il de derrotar, y por lo tanto, la mejor eleccin para los principiantes. No es muy inteligente, y su tiro es bastante pobre.\n", + /* 46*/ "SimF當il: Este simulante tiene inteligencia y habilidades b疽icas; an as puede ser peligroso.\n", + /* 47*/ "SimNormal: Este simulante es tan habilidoso como un jugador humano normal y corriente.\n", + /* 48*/ "SimDifci: Este simulante es tan habilidoso como un buen jugador humano.\n", + /* 49*/ "SimPerfec: El adversario definitivo. El simulante m疽 inteligente y habilidoso. La mayora de jugadores querr疣 usar a SimPerfecto todo el tiempo para mejorar sus habilidades.\n", + /* 50*/ "SimOscuro: Prototipo cibern騁ico desarrollado por dataDyne para contrarrestar las acciones de Carrington. Recuerda que este simulante no es humano. Esto significa que es capaz de hacer cosas que un humano no puede.\n", + /* 51*/ "SimPaz: Estos simulantes son cientficos que protestan contra el uso de armas. Recorren el nivel buscando armas y las recogen para que el jugador no pueda usarlas. Por supuesto, si les disparas un poco... 。no les importar soltarlas!\n", + /* 52*/ "SimEscudo: Siempre busca la m痊ima proteccin de escudo. Si este simulante pierde algo de energa de su escudo, ir en busca de uno nuevo. 。No tiene mucha utilidad si no hay escudos en el nivel!\n", + /* 53*/ "SimCohete: A este simulante le encanta ver cosas explotar. Prefiere armas explosivas antes que las convencionales pistolas o autom疸icas. 。Esto tambi駭 se extiende a las armas que tienen funciones secundarias explosivas!\n", + /* 54*/ "SimKamika: Este simulante no se detendr ante nada para destruir a su blanco. Es muy agresivo y nunca cuida las distancias: 。Incluso cuando lleva una granada! S muy cuidadoso de este adversario que no tiene miedo a morir.\n", + /* 55*/ "SimLucha: Este simulante protesta por el uso de armas al igual que hacen los SimPaz. An as, no tiene reservas a la hora de combatir desarmado. Siempre intentar usar sus puos para atacar o desarmar a su oponente.\n", + /* 56*/ "SimPresa: Este simulante prefiere cebarse en los d饕iles para conseguir muertes f當iles. Buscar jugadores que acaben de salir, tengan un arma inferior, o tengan poca salud.\n", + /* 57*/ "SimCobard: Este simulante no quiere luchar, as que huir para intentar sobrevivir. A veces atacar, pero slo si el oponente tiene un arma inferior. 。Saca un arma mayor o disp疵ale, y saldr corriendo!\n", + /* 58*/ "SimJuez: Este simulante tiene un gran sentido de la justicia y desprecia las t當ticas del SimPresa. Siempre intentar matar al jugador que vaya ganando para as igualar los marcadores.\n", + /* 59*/ "SimPelea: 。Cuando este simulante escoge objetivo, el jugador debe tener mucho cuidado! 。Un SimPelea perseguir al jugador hasta que se acabe el juego! Aunque muera, seguir guard疣dote rencor.\n", + /* 60*/ "SimVeloz: Estos simulantes han sido entrenados para ser muy veloces. 。Pueden atrapar f當ilmente a un humano, as que no huyas de un SimVeloz a menos que conozcas algn buen atajo!\n", + /* 61*/ "SimTortug: Este simulante lleva un prototipo de generador de escudo creado por cientficos de dataDyne. El generador crea un escudo protector que posee el doble de fuerza que un escudo normal. Desgraciadamente, restringe el movimiento del portador, as que se mover muy despacio. Los SimTortug llevan este escudo siempre, incluso si no hay escudos en el nivel.\n", + /* 62*/ "SimVengan: Ten cuidado de no disparar o matar a un SimVengan, ya que siempre atacar al ltimo jugador que le haya matado.", + /* 63*/ "Combate Oscuro", + /* 64*/ "Misterio Skedar", + /* 65*/ "Operativo IC", + /* 66*/ "Accin dataDyne", + /* 67*/ "L疊rimas Maian", + /* 68*/ "Conflicto Alien", + /* 69*/ "Instituto Carrington", + /* 70*/ "Central dD", + /* 71*/ "Central dD X", + /* 72*/ "Investigacin dD", + /* 73*/ "Investigacin dD X", + /* 74*/ "Extraccin dD", + /* 75*/ "Extraccin dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltracin A51", + /* 83*/ "Infiltracin A51 X", + /* 84*/ "Rescate A51", + /* 85*/ "Rescate A51 X", + /* 86*/ "Escape A51", + /* 87*/ "Escape A51 X", + /* 88*/ "Base A駻ea", + /* 89*/ "Base A駻ea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Impacto", + /* 93*/ "Impacto X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Mar Profundo", + /* 97*/ "Mar Profundo X", + /* 98*/ "Defensa Instituto", + /* 99*/ "Defensa Instituto X", + /*100*/ "Acorazado", + /*101*/ "Acorazado X", + /*102*/ "Ruinas Skedar", + /*103*/ "Ruinas Skedar X", + /*104*/ "Cr馘itos ", + /*105*/ "Aleatorio\n", + /*106*/ "Seleccionar Todo\n", + /*107*/ "Deseleccionar Todo\n", + /*108*/ "Al azar\n", + /*109*/ "Inventario\n", + /*110*/ "Funcin\n", + /*111*/ "モrdenes\n", + /*112*/ "Sin Arma\n", + /*113*/ "Elige Objetivo\n", + /*114*/ "Seguir\n", + /*115*/ "Atacar\n", + /*116*/ "Defender\n", + /*117*/ "Mantener\n", + /*118*/ "Normal\n", + /*119*/ "Bajar\n", + /*120*/ "Obtener\n", + /*121*/ "Marcar\n", + /*122*/ "Te mat", + /*123*/ "Mataste a", + /*124*/ "Iniciado:21\n", + /*125*/ "Aprendiz:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novato:17\n", + /*129*/ "Soldado:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Estrella:14\n", + /*132*/ "Especial:13\n", + /*133*/ "Experto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Peligroso:9\n", + /*137*/ "Mortal:8\n", + /*138*/ "Ejecutor:7\n", + /*139*/ "Asesino:6\n", + /*140*/ "Letal:5\n", + /*141*/ "ノlite:4\n", + /*142*/ "Invencible:3\n", + /*143*/ "Completo:2\n", + /*144*/ "Perfecto:1\n", + /*145*/ "DARDOS", + /*146*/ "MODELO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salvar Caja\n", + /*149*/ "Defender Colina\n", + /*150*/ "Mantener Colina\n", + /*151*/ "Coger Maletn\n", + /*152*/ "Llevarla\n", + /*153*/ "Proteger\n", + /*154*/ "Todo Simulante\n", + /*155*/ "MODELO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Sin suficiente espacio para activar ", + /*158*/ "ACIERTOS NEC.:", + /*159*/ "PUNTUACIモN NEC.:", + /*160*/ "PRECISIモN MIN.:", + /*161*/ "DISPARA PARA EMPEZAR\n", + /*162*/ "。PREPARADO!\n", + /*163*/ "LヘMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "DIANA\n", + /*168*/ "EXPLOTADOS\n", + /*169*/ "Elvis ha muerto.\n", + /*170*/ "Estilo 1", + /*171*/ "Estilo 2", + /*172*/ "Estilo 3", + /*173*/ "Estilo 4", + /*174*/ "Rubio", + /*175*/ "Moreno", + /*176*/ "Castao", + /*177*/ "Azulado", + /*178*/ "Jugador", + /*179*/ "", + /*180*/ "Identificado\n", + /*181*/ "unused", + /*182*/ "Desafos\n", + /*183*/ "Cargar Juegos\n", + /*184*/ "Comienzo R疳ido\n", + /*185*/ "Conf. Avanzada\n", + /*186*/ "Simulador de Combate\n", + /*187*/ "Instituto Carrington\n", + /*188*/ "P. Equipo\n", + /*189*/ "Conf. Finalizada\n", + /*190*/ "Equipo Jugador 1\n", + /*191*/ "Equipo Jugador 2\n", + /*192*/ "Equipo Jugador 3\n", + /*193*/ "Equipo Jugador 4\n", + /*194*/ "Nmero de Simulantes\n", + /*195*/ "Simulantes por Equipo\n", + /*196*/ "Nivel de Simulantes\n", + /*197*/ "Empezar Juego\n", + /*198*/ "Abandonar\n", + /*199*/ "Opciones de Jugador\n", + /*200*/ "Opciones de Juego\n", + /*201*/ "Salida R疳ida\n", + /*202*/ "。Preparado!\n", + /*203*/ "Equipo R疳ido\n", + /*204*/ "Slo Jugadores\n", + /*205*/ "Jugadores y Simulantes\n", + /*206*/ "Equipos de Jugadores\n", + /*207*/ "Jugadores contra Simulantes\n", + /*208*/ "Equipos de Jugador-Simulante\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Repetir Misin Previa\n", + /*212*/ "Holografa\n", + /*213*/ "Agresivos\n", + /*214*/ "Pasivos\n", + /*215*/ "Camaradas\n", + /*216*/ "Sigilosos\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/mp10E.c b/src/files/lang/pal-final/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10J.c b/src/files/lang/pal-final/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10P.c b/src/files/lang/pal-final/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_f.c b/src/files/lang/pal-final/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_g.c b/src/files/lang/pal-final/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_i.c b/src/files/lang/pal-final/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_s.c b/src/files/lang/pal-final/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11E.c b/src/files/lang/pal-final/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11J.c b/src/files/lang/pal-final/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11P.c b/src/files/lang/pal-final/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_f.c b/src/files/lang/pal-final/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_g.c b/src/files/lang/pal-final/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_i.c b/src/files/lang/pal-final/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_s.c b/src/files/lang/pal-final/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12E.c b/src/files/lang/pal-final/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12J.c b/src/files/lang/pal-final/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12P.c b/src/files/lang/pal-final/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_f.c b/src/files/lang/pal-final/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_g.c b/src/files/lang/pal-final/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_i.c b/src/files/lang/pal-final/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_s.c b/src/files/lang/pal-final/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13E.c b/src/files/lang/pal-final/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13J.c b/src/files/lang/pal-final/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13P.c b/src/files/lang/pal-final/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_f.c b/src/files/lang/pal-final/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_g.c b/src/files/lang/pal-final/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_i.c b/src/files/lang/pal-final/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_s.c b/src/files/lang/pal-final/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14E.c b/src/files/lang/pal-final/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14J.c b/src/files/lang/pal-final/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14P.c b/src/files/lang/pal-final/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_f.c b/src/files/lang/pal-final/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_g.c b/src/files/lang/pal-final/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_i.c b/src/files/lang/pal-final/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_s.c b/src/files/lang/pal-final/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15E.c b/src/files/lang/pal-final/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15J.c b/src/files/lang/pal-final/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15P.c b/src/files/lang/pal-final/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_f.c b/src/files/lang/pal-final/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_g.c b/src/files/lang/pal-final/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_i.c b/src/files/lang/pal-final/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_s.c b/src/files/lang/pal-final/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16E.c b/src/files/lang/pal-final/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16J.c b/src/files/lang/pal-final/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16P.c b/src/files/lang/pal-final/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_f.c b/src/files/lang/pal-final/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_g.c b/src/files/lang/pal-final/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_i.c b/src/files/lang/pal-final/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_s.c b/src/files/lang/pal-final/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17E.c b/src/files/lang/pal-final/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17J.c b/src/files/lang/pal-final/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17P.c b/src/files/lang/pal-final/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_f.c b/src/files/lang/pal-final/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_g.c b/src/files/lang/pal-final/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_i.c b/src/files/lang/pal-final/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_s.c b/src/files/lang/pal-final/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18E.c b/src/files/lang/pal-final/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18J.c b/src/files/lang/pal-final/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18P.c b/src/files/lang/pal-final/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_f.c b/src/files/lang/pal-final/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_g.c b/src/files/lang/pal-final/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_i.c b/src/files/lang/pal-final/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_s.c b/src/files/lang/pal-final/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19E.c b/src/files/lang/pal-final/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19J.c b/src/files/lang/pal-final/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19P.c b/src/files/lang/pal-final/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_f.c b/src/files/lang/pal-final/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_g.c b/src/files/lang/pal-final/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_i.c b/src/files/lang/pal-final/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_s.c b/src/files/lang/pal-final/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1E.c b/src/files/lang/pal-final/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1J.c b/src/files/lang/pal-final/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1P.c b/src/files/lang/pal-final/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_f.c b/src/files/lang/pal-final/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_g.c b/src/files/lang/pal-final/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_i.c b/src/files/lang/pal-final/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_s.c b/src/files/lang/pal-final/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20E.c b/src/files/lang/pal-final/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20J.c b/src/files/lang/pal-final/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20P.c b/src/files/lang/pal-final/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_f.c b/src/files/lang/pal-final/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_g.c b/src/files/lang/pal-final/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_i.c b/src/files/lang/pal-final/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_s.c b/src/files/lang/pal-final/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2E.c b/src/files/lang/pal-final/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2J.c b/src/files/lang/pal-final/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2P.c b/src/files/lang/pal-final/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_f.c b/src/files/lang/pal-final/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_g.c b/src/files/lang/pal-final/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_i.c b/src/files/lang/pal-final/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_s.c b/src/files/lang/pal-final/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3E.c b/src/files/lang/pal-final/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3J.c b/src/files/lang/pal-final/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3P.c b/src/files/lang/pal-final/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_f.c b/src/files/lang/pal-final/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_g.c b/src/files/lang/pal-final/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_i.c b/src/files/lang/pal-final/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_s.c b/src/files/lang/pal-final/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4E.c b/src/files/lang/pal-final/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4J.c b/src/files/lang/pal-final/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4P.c b/src/files/lang/pal-final/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_f.c b/src/files/lang/pal-final/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_g.c b/src/files/lang/pal-final/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_i.c b/src/files/lang/pal-final/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_s.c b/src/files/lang/pal-final/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5E.c b/src/files/lang/pal-final/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5J.c b/src/files/lang/pal-final/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5P.c b/src/files/lang/pal-final/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_f.c b/src/files/lang/pal-final/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_g.c b/src/files/lang/pal-final/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_i.c b/src/files/lang/pal-final/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_s.c b/src/files/lang/pal-final/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6E.c b/src/files/lang/pal-final/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6J.c b/src/files/lang/pal-final/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6P.c b/src/files/lang/pal-final/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_f.c b/src/files/lang/pal-final/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_g.c b/src/files/lang/pal-final/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_i.c b/src/files/lang/pal-final/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_s.c b/src/files/lang/pal-final/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7E.c b/src/files/lang/pal-final/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7J.c b/src/files/lang/pal-final/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7P.c b/src/files/lang/pal-final/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_f.c b/src/files/lang/pal-final/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_g.c b/src/files/lang/pal-final/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_i.c b/src/files/lang/pal-final/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_s.c b/src/files/lang/pal-final/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8E.c b/src/files/lang/pal-final/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8J.c b/src/files/lang/pal-final/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8P.c b/src/files/lang/pal-final/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_f.c b/src/files/lang/pal-final/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_g.c b/src/files/lang/pal-final/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_i.c b/src/files/lang/pal-final/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_s.c b/src/files/lang/pal-final/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9E.c b/src/files/lang/pal-final/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9J.c b/src/files/lang/pal-final/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9P.c b/src/files/lang/pal-final/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_f.c b/src/files/lang/pal-final/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_g.c b/src/files/lang/pal-final/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_i.c b/src/files/lang/pal-final/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_s.c b/src/files/lang/pal-final/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mpmenuE.c b/src/files/lang/pal-final/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/pal-final/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-final/mpmenuJ.c b/src/files/lang/pal-final/mpmenuJ.c new file mode 100644 index 000000000..0329540db --- /dev/null +++ b/src/files/lang/pal-final/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpmenuP.c b/src/files/lang/pal-final/mpmenuP.c new file mode 100644 index 000000000..9cffad023 --- /dev/null +++ b/src/files/lang/pal-final/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Colour\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_f.c b/src/files/lang/pal-final/mpmenu_str_f.c new file mode 100644 index 000000000..a654639cf --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Super suicidaire\n", + /* 1*/ "Munitions? O?\n", + /* 2*/ "Le moins prot馮饅n", + /* 3*/ "Le mieux prot馮饅n", + /* 4*/ "Tireur d'駘ite\n", + /* 5*/ "Le plus pro\n", + /* 6*/ "Le plus meurtrier\n", + /* 7*/ "Le plus inoffensif\n", + /* 8*/ "Le plus p騁ochard\n", + /* 9*/ "Le plus dingue\n", + /* 10*/ "Le plus loyal\n", + /* 11*/ "Le plus fourbe\n", + /* 12*/ "Dur馥 de vie Mini\n", + /* 13*/ "Dur馥de vie Maxi\n", + /* 14*/ "Double frag\n", + /* 15*/ "Triple frag\n", + /* 16*/ "Quadruple frag\n", + /* 17*/ "Param鑼res jeu\n", + /* 18*/ "Charger param.\n", + /* 19*/ "Sc駭ario\n", + /* 20*/ "Ar鈩es\n", + /* 21*/ "Options\n", + /* 22*/ "Equipes\n", + /* 23*/ "Armes\n", + /* 24*/ "Limites\n", + /* 25*/ "Simulants\n", + /* 26*/ "Sauver param.\n", + /* 27*/ "Abandonner\n", + /* 28*/ "Param. joueur\n", + /* 29*/ "Charger joueur\n", + /* 30*/ "Nom\n", + /* 31*/ "Personnages\n", + /* 32*/ "Handicap\n", + /* 33*/ "Manipulations\n", + /* 34*/ "Options joueur\n", + /* 35*/ "Statistiques\n", + /* 36*/ "Commencer jeu\n", + /* 37*/ "Arr黎er\n", + /* 38*/ "Sauver joueur\n", + /* 39*/ "Sauv. copie joueur\n", + /* 40*/ "Trucs\n", + /* 41*/ "Musique\n", + /* 42*/ "Noms 駲uipes\n", + /* 43*/ "Ratio\n", + /* 44*/ "Verrou\n", + /* 45*/ "Aucun\n", + /* 46*/ "Vainq.\n", + /* 47*/ "Perd.\n", + /* 48*/ "Hasard\n", + /* 49*/ "Challenge\n", + /* 50*/ "Challenges combat\n", + /* 51*/ "Abandonner Challenge\n", + /* 52*/ "Abandonner\n", + /* 53*/ "Voulez-vous vraiment\nabandonner la partie?\n", + /* 54*/ "Abandonner\n", + /* 55*/ "Retour\n", + /* 56*/ "%s\n", + /* 57*/ "Accepter\n", + /* 58*/ "Retour\n", + /* 59*/ "Noms 駲uipes\n", + /* 60*/ "Retour\n", + /* 61*/ "Changer nom 駲uipe\n", + /* 62*/ "Musique\n", + /* 63*/ "Actuelle:\n", + /* 64*/ "Musiques multiples\n", + /* 65*/ "Retour\n", + /* 66*/ "Musiques multiples\n", + /* 67*/ "Hasard\n", + /* 68*/ "Choix musiques\n", + /* 69*/ "Choix musique\n", + /* 70*/ "Manip. 駲uipe\n", + /* 71*/ "Equipes activ馥s\n", + /* 72*/ "Equipes:\n", + /* 73*/ "Equipe auto...\n", + /* 74*/ "Retour\n", + /* 75*/ "Equipe auto\n", + /* 76*/ "Deux 駲uipes\n", + /* 77*/ "Trois 駲uipes\n", + /* 78*/ "Quatre 駲uipes\n", + /* 79*/ "Maximum 駲uipes\n", + /* 80*/ "Humains vs Simulants\n", + /* 81*/ "Duos Humain-Simulant\n", + /* 82*/ "Retour\n", + /* 83*/ "Simulants\n", + /* 84*/ "Ajouter Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Effacer tout\n", + /* 94*/ "Retour\n", + /* 95*/ "Difficult:\n", + /* 96*/ "Changer type...\n", + /* 97*/ "Personnage...\n", + /* 98*/ "Effacer Simulant\n", + /* 99*/ "Retour\n", + /*100*/ "Personnage Simulant\n", + /*101*/ "Ajouter Simulant\n", + /*102*/ "Changer Simulant\n", + /*103*/ "Simulants normaux\n", + /*104*/ "Simulants sp馗iaux\n", + /*105*/ "Pr黎!\n", + /*106*/ "...en attente\n", + /*107*/ "Limites\n", + /*108*/ "Temps\n", + /*109*/ "Score\n", + /*110*/ "R騁ablir par d馭aut\n", + /*111*/ "Retour\n", + /*112*/ "Pas de limite\n", + /*113*/ "%d\n", + /*114*/ "%d Min.\n", + /*115*/ "Ar鈩es\n", + /*116*/ "Dark\n", + /*117*/ "Classique\n", + /*118*/ "Hasard\n", + /*119*/ "Skedar", + /*120*/ "Conduits", + /*121*/ "Ravin", + /*122*/ "Immeuble G5", + /*123*/ "Egouts", + /*124*/ "Entrept", + /*125*/ "Grid", + /*126*/ "Ruines", + /*127*/ "Secteur 52", + /*128*/ "Base", + /*129*/ "Toit", + /*130*/ "Forteresse", + /*131*/ "Villa", + /*132*/ "Parking", + /*133*/ "Temple", + /*134*/ "Complexe", + /*135*/ "F駘icit", + /*136*/ "Hasard", + /*137*/ "Charger joueur\n", + /*138*/ "Bouton B pour annuler\n", + /*139*/ "Charger param.\n", + /*140*/ "%s: Sc駭ario: %s Ar鈩e: %s Simulants: %d", + /*141*/ "Pr駸駘ections\n", + /*142*/ "Nom joueur\n", + /*143*/ "Personnage\n", + /*144*/ "Charger t黎e...\n", + /*145*/ "Stats pour %s\n", + /*146*/ "Tu駸:\n", + /*147*/ "Morts:\n", + /*148*/ "Pr馗ision:\n", + /*149*/ "Tirs t黎e:\n", + /*150*/ "Mun. util.:\n", + /*151*/ "D馮. inflig駸:\n", + /*152*/ "D馮. re輹s:\n", + /*153*/ "Parties:\n", + /*154*/ "Gagn馥s:\n", + /*155*/ "Perdues:\n", + /*156*/ "Temps:\n", + /*157*/ "Distance:\n", + /*158*/ "M馘ailles gagn馥s:\n", + /*159*/ " Pr馗ision:\n", + /*160*/ " Tirs t黎e:\n", + /*161*/ " Tueur:\n", + /*162*/ " Survivant:\n", + /*163*/ "Votre titre:\n", + /*164*/ "Retour\n", + /*165*/ "Challenges compl騁駸\n", + /*166*/ "Retour\n", + /*167*/ "Options\n", + /*168*/ "Voir r馗up.\n", + /*169*/ "Voir joueurs\n", + /*170*/ "Voir 駲uipes\n", + /*171*/ "Radar\n", + /*172*/ "Retour\n", + /*173*/ "Armes\n", + /*174*/ "Choix:\n", + /*175*/ "Param. armes actuels:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Retour\n", + /*183*/ "Sauver param. jeu\n", + /*184*/ "Ecraser votre\nfichier original?\n", + /*185*/ "Ecraser fichier\n", + /*186*/ "Sauver copie\n", + /*187*/ "Ne pas sauver\n", + /*188*/ "Nom fichier\n", + /*189*/ "Entrer nom pour\nfichier de param鑼res:\n", + /*190*/ "Confirmer\n", + /*191*/ "Fichier joueur\nest sauv饅nen auto.\n", + /*192*/ "Sauver une copie?\n", + /*193*/ "Non\n", + /*194*/ "Oui\n", + /*195*/ "Arr黎er\n", + /*196*/ "Voulez-vous vraiment\narr黎er?\n", + /*197*/ "Arr黎er\n", + /*198*/ "Retour\n", + /*199*/ "Manipulations\n", + /*200*/ "Style manip.\n", + /*201*/ "Inverser axe\n", + /*202*/ "Voir devant\n", + /*203*/ "Mouv. t黎e\n", + /*204*/ "Vis馥 auto\n", + /*205*/ "Contrle vis馥\n", + /*206*/ "Cible l'馗ran\n", + /*207*/ "Voir cible\n", + /*208*/ "Port馥 zoom\n", + /*209*/ "Munit. l'馗ran\n", + /*210*/ "Fonction arme\n", + /*211*/ "Paintball\n", + /*212*/ "Retour\n", + /*213*/ "Fixe\n", + /*214*/ "Alt.\n", + /*215*/ "Options combat\n", + /*216*/ "Options mallette\n", + /*217*/ "Options hacker\n", + /*218*/ "Options d馗apsuleur\n", + /*219*/ "Options zone\n", + /*220*/ "Options capture\n", + /*221*/ "Options PC\n", + /*222*/ "Pan! T'es mort!\n", + /*223*/ "Ralenti\n", + /*224*/ "Mouvement rapide\n", + /*225*/ "Afficher 駲uipe\n", + /*226*/ "Sans radar\n", + /*227*/ "Sans vis馥 auto\n", + /*228*/ "Sans voir joueur\n", + /*229*/ "Sans voir r馗up.\n", + /*230*/ "Voir cible\n", + /*231*/ "Voir Terminal\n", + /*232*/ "PC sur radar\n", + /*233*/ "Zone sur radar\n", + /*234*/ "Zone mobile\n", + /*235*/ "Temps\n", + /*236*/ "Visible sur radar\n", + /*237*/ "Voir mallette\n", + /*238*/ "Voir sur radar\n", + /*239*/ "Retour\n", + /*240*/ "Non\n", + /*241*/ "Oui\n", + /*242*/ "Custom\n", + /*243*/ "Sc駭ario\n", + /*244*/ "Chacun pour soi!\n", + /*245*/ "-Equipes-\n", + /*246*/ "Combat", + /*247*/ "Tenir la mallette", + /*248*/ "Centre hacker", + /*249*/ "D馗apsuleur", + /*250*/ "Roi de la zone", + /*251*/ "Capturer la mallette", + /*252*/ "Contrle de PC", + /*253*/ "Combat", + /*254*/ "Mallette", + /*255*/ "Hacker", + /*256*/ "D馗aps.", + /*257*/ "Zone", + /*258*/ "Capture", + /*259*/ "PC", + /*260*/ "Game Over\n", + /*261*/ "Titre:\n", + /*262*/ "Arme de pr馘ilection:\n", + /*263*/ "Prix:\n", + /*264*/ "1er\n", + /*265*/ "2鑪e\n", + /*266*/ "3鑪e\n", + /*267*/ "4鑪e\n", + /*268*/ "5鑪e\n", + /*269*/ "6鑪e\n", + /*270*/ "7鑪e\n", + /*271*/ "8鑪e\n", + /*272*/ "9鑪e\n", + /*273*/ "10鑪e\n", + /*274*/ "11鑪e\n", + /*275*/ "12鑪e\n", + /*276*/ "Classement joueur\n", + /*277*/ "Morts\n", + /*278*/ "Score\n", + /*279*/ "Classement 駲uipe\n", + /*280*/ "Stats de %s", + /*281*/ "Suicides\n", + /*282*/ "Morts\n", + /*283*/ "Tu駸\n", + /*284*/ "Inventaire\n", + /*285*/ "Manipulation\n", + /*286*/ "Temps de jeu:\n", + /*287*/ "Fin de jeu\n", + /*288*/ "Pause\n", + /*289*/ "Reprendre\n", + /*290*/ "Fin jeu\n", + /*291*/ "Etes-vous sr?\n", + /*292*/ "Annuler\n", + /*293*/ "Fin jeu\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Bouton B pour Retour.\n", + /*415*/ "Hangar d'information\n", + /*416*/ "Holo-entranement\n", + /*417*/ "Liste appareils\n", + /*418*/ "Informations\n", + /*419*/ "Emplacements\n", + /*420*/ "V馼icules\n", + /*421*/ "Profils personnages\n", + /*422*/ "Autres informations\n", + /*423*/ "Stats entranement\n", + /*424*/ "Temps 馗oul:\n", + /*425*/ "Succ鑚!\n", + /*426*/ "Echec!\n", + /*427*/ "Ok\n", + /*428*/ "Reprendre\n", + /*429*/ "Annuler\n", + /*430*/ "Abandonner\n", + /*431*/ "Profil personnage\n", + /*432*/ "Nom:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Bouton B pour Retour.\n", + /*436*/ "Triche\n", + /*437*/ "Vous pouvez 騁eindre votre ordinateur en toute s馗urit.\n", + /*438*/ "Annuler\n", + /*439*/ "Bronze\n", + /*440*/ "Argent\n", + /*441*/ "Or\n", + /*442*/ "Difficult饅n", + /*443*/ "Difficult:\n", + /*444*/ "Choix difficult:\n", + /*445*/ " \n", + /*446*/ "Arme\n", + /*447*/ "Info entranement\n", + /*448*/ "Stats entranement\n", + /*449*/ "Succ鑚!\n", + /*450*/ "Score:\n", + /*451*/ "Cibles d騁ruites:\n", + /*452*/ "Difficult:\n", + /*453*/ "Temps 馗oul:\n", + /*454*/ "Arme:\n", + /*455*/ "Pr馗ision:\n", + /*456*/ "Pas 馗hou饅n", + /*457*/ "Plus de munit.\n", + /*458*/ "Fin chrono\n", + /*459*/ "Score non atteint\n", + /*460*/ "Trop impr馗is\n", + /*461*/ "Centre\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Score\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munit.:\n", + /*472*/ "Limite temps:\n", + /*473*/ "Pr馗ision Mini:\n", + /*474*/ "Cibles d騁ruire:\n", + /*475*/ "Score atteindre:\n", + /*476*/ "Triche\n", + /*477*/ "Termin饅n", + /*478*/ "Attention\n", + /*479*/ "En utilsant les codes de triche\nvous ne pourrez pas progresser dans le jeu \ntant que ceux-ci seront activ駸.\n", + /*480*/ "OK\n", + /*481*/ "Annuler\n", + /*482*/ "Joueur %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "V駻if. Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Attendre...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_g.c b/src/files/lang/pal-final/mpmenu_str_g.c new file mode 100644 index 000000000..d0f7ba5b1 --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Suizidal\n", + /* 1*/ "Muni?\n", + /* 2*/ "Schilde?\n", + /* 3*/ "Bestgeschtzt\n", + /* 4*/ "Treffsicher\n", + /* 5*/ "Professionell\n", + /* 6*/ "Gef臧rlich\n", + /* 7*/ "Harmlos\n", + /* 8*/ "Feig\n", + /* 9*/ "Verzweifelt\n", + /* 10*/ "Ehrenhaft\n", + /* 11*/ "Unehrenhaft\n", + /* 12*/ "Eintagsfliege\n", + /* 13*/ "Methusalem\n", + /* 14*/ "Doppel-Treffer\n", + /* 15*/ "Trippel-Treffer\n", + /* 16*/ "Quadro-Treffer\n", + /* 17*/ "Spiel-Einstellungen\n", + /* 18*/ "Laden\n", + /* 19*/ "Szenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Optionen\n", + /* 22*/ "Teams\n", + /* 23*/ "Waffen\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulanten\n", + /* 26*/ "Speichern\n", + /* 27*/ "Spiel abbrechen\n", + /* 28*/ "Spieler-Einstellungen\n", + /* 29*/ "Spieler laden\n", + /* 30*/ "Name\n", + /* 31*/ "Charakter\n", + /* 32*/ "Handicap\n", + /* 33*/ "Steuerung\n", + /* 34*/ "Spieler-Optionen\n", + /* 35*/ "Statistik\n", + /* 36*/ "Spielstart\n", + /* 37*/ "Abbruch\n", + /* 38*/ "Spieler speichern\n", + /* 39*/ "Kopie speichern\n", + /* 40*/ "Zeugs\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team-Namen\n", + /* 43*/ "Rate\n", + /* 44*/ "Sperre\n", + /* 45*/ "keine\n", + /* 46*/ "Letzt. Gewinner\n", + /* 47*/ "Letzt. Verlierer\n", + /* 48*/ "zuf舁lig\n", + /* 49*/ "Challenge\n", + /* 50*/ "Kampf-Challenge\n", + /* 51*/ "Challenge abbrechen\n", + /* 52*/ "Abbruch\n", + /* 53*/ "Mchten Sie wirklich\nabbrechen?\n", + /* 54*/ "Abbruch\n", + /* 55*/ "Zurck\n", + /* 56*/ "%s\n", + /* 57*/ "Annehmen\n", + /* 58*/ "Zurck\n", + /* 59*/ "Team-Namen\n", + /* 60*/ "Zurck\n", + /* 61*/ "Team-Name 舅dern\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Derzeit:\n", + /* 64*/ "Multiple Sound\n", + /* 65*/ "Zurck\n", + /* 66*/ "Multiple Sounds\n", + /* 67*/ "zuf舁lig\n", + /* 68*/ "W臧le Sounds\n", + /* 69*/ "W臧le Sound\n", + /* 70*/ "Team-Steuerung\n", + /* 71*/ "Teams erm臘htigt\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto-Team...\n", + /* 74*/ "Zurck\n", + /* 75*/ "Auto-Team\n", + /* 76*/ "Zwei Teams\n", + /* 77*/ "Drei Teams\n", + /* 78*/ "Vier Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Menschen vs. Sim.\n", + /* 81*/ "Menschen-Sim.-Paare\n", + /* 82*/ "Zurck\n", + /* 83*/ "Simulanten\n", + /* 84*/ "Simulant hinzufgen...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Alle lschen\n", + /* 94*/ "Zurck\n", + /* 95*/ "Schwierigkeit:\n", + /* 96*/ "Typ wechseln...\n", + /* 97*/ "Charakter...\n", + /* 98*/ "Simulant lschen\n", + /* 99*/ "Zurck\n", + /*100*/ "Simulanten-Charakter\n", + /*101*/ "Simulant hinzufgen\n", + /*102*/ "Simulant wechseln\n", + /*103*/ "Normale Simulanten\n", + /*104*/ "Spezielle Simulanten\n", + /*105*/ "Fertig!\n", + /*106*/ "...und bereit\n", + /*107*/ "Limits\n", + /*108*/ "Zeit\n", + /*109*/ "Score\n", + /*110*/ "Grundeinstellung\n", + /*111*/ "Zurck\n", + /*112*/ "Unbegr.\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "zuf舁lig\n", + /*119*/ "Skedar", + /*120*/ "Rohre", + /*121*/ "Graben", + /*122*/ "G5-Building", + /*123*/ "Kan舁e", + /*124*/ "Lagerhaus", + /*125*/ "Netz", + /*126*/ "Ruinen", + /*127*/ "Area 52", + /*128*/ "Basis", + /*129*/ "D臘her", + /*130*/ "Festung", + /*131*/ "Villa", + /*132*/ "Parkdeck", + /*133*/ "Tempel", + /*134*/ "Komplex", + /*135*/ "Glckseligkeit", + /*136*/ "Zuf舁lig", + /*137*/ "Spieler laden\n", + /*138*/ "Abbruch\n", + /*139*/ "Laden\n", + /*140*/ "%s: Szenario: %s Arena: %s Simulanten: %d", + /*141*/ "Voreinstellungen\n", + /*142*/ "Spieler-Name\n", + /*143*/ "Charakter\n", + /*144*/ "Kopf laden...\n", + /*145*/ "Statistik fr %s\n", + /*146*/ "Treff.:\n", + /*147*/ "Versuche:\n", + /*148*/ "Genauigkeit:\n", + /*149*/ "Kopftreffer:\n", + /*150*/ "Munition:\n", + /*151*/ "Schaden:\n", + /*152*/ "Schmerzen:\n", + /*153*/ "Spiele gesamt:\n", + /*154*/ "Gewinne:\n", + /*155*/ "Verluste:\n", + /*156*/ "Zeit:\n", + /*157*/ "Distanz:\n", + /*158*/ "Medaillen:\n", + /*159*/ " Genauigkeit:\n", + /*160*/ " Kopftreffer:\n", + /*161*/ " Meisterschtze:\n", + /*162*/ " ワberlebender:\n", + /*163*/ "Ihr Titel:\n", + /*164*/ "Zurck\n", + /*165*/ "Challenges OK\n", + /*166*/ "Zurck\n", + /*167*/ "Optionen\n", + /*168*/ "Items anzeigen\n", + /*169*/ "Spieler anzeigen\n", + /*170*/ "Teams anzeigen\n", + /*171*/ "Radar\n", + /*172*/ "Zurck\n", + /*173*/ "Bewaffnung\n", + /*174*/ "Einstellung:\n", + /*175*/ "Aktuelle Einstellung:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Zurck\n", + /*183*/ "Speichern\n", + /*184*/ "Mchten Sie das \nbestehende File\nberschreiben?\n", + /*185*/ "ワberschreiben\n", + /*186*/ "Kopieren\n", + /*187*/ "Nicht speichern\n", + /*188*/ "File-Name\n", + /*189*/ "Bitte benennen Sie\nIhr File:\n", + /*190*/ "Best舩igen\n", + /*191*/ "Ihr Spieler-File wird\nimmer automatisch\ngespeichert.\n", + /*192*/ "Kopie speichern?\n", + /*193*/ "Nein\n", + /*194*/ "Ja\n", + /*195*/ "Abbruch\n", + /*196*/ "Mchten Sie wirklich\nabbrechen?\n", + /*197*/ "Abbrechen\n", + /*198*/ "Zurck\n", + /*199*/ "Steuerung\n", + /*200*/ "Steuerungsart\n", + /*201*/ "Blick vertauschen\n", + /*202*/ "Vorausschauen\n", + /*203*/ "Kopfneigung\n", + /*204*/ "Auto-Ziel\n", + /*205*/ "Ziel-Steuerung\n", + /*206*/ "Screen-Anzeigen\n", + /*207*/ "Ziel zeigen\n", + /*208*/ "Zoom-Bereich\n", + /*209*/ "Munition anzeigen\n", + /*210*/ "Funktion anzeigen\n", + /*211*/ "Paintball\n", + /*212*/ "Zurck\n", + /*213*/ "Halten\n", + /*214*/ "Umschalten\n", + /*215*/ "Kampf-Optionen\n", + /*216*/ "Aktenkoffer-Optionen\n", + /*217*/ "Hacker-Optionen\n", + /*218*/ "Pop a Cap-Optionen\n", + /*219*/ "Hgel-Optionen\n", + /*220*/ "Fang-Optionen\n", + /*221*/ "Boxen-Optionen\n", + /*222*/ "Ein Treffer\n", + /*223*/ "Zeitlupe\n", + /*224*/ "Zeitraffer\n", + /*225*/ "Team anzeigen\n", + /*226*/ "Kein Radar\n", + /*227*/ "Kein Auto-Ziel\n", + /*228*/ "Spieler nicht zeigen\n", + /*229*/ "Items nicht zeigen\n", + /*230*/ "Ziel anzeigen\n", + /*231*/ "Terminal anzeigen\n", + /*232*/ "Boxen am Radar zeigen\n", + /*233*/ "Hgel zeigen\n", + /*234*/ "Mobiler Hgel\n", + /*235*/ "Zeit\n", + /*236*/ "Am Radar zeigen\n", + /*237*/ "Koffer zeigen\n", + /*238*/ "Am Radar zeigen\n", + /*239*/ "Zurck\n", + /*240*/ "Aus\n", + /*241*/ "Ein\n", + /*242*/ "Smart\n", + /*243*/ "Szenario\n", + /*244*/ "Frei fr alle!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Kampf", + /*247*/ "Der Koffer 1", + /*248*/ "Hacker-Zentrale", + /*249*/ "Pop a Cap", + /*250*/ "Herr des Hgels", + /*251*/ "Der Koffer 2", + /*252*/ "Berhr die Box", + /*253*/ "Kampf", + /*254*/ "Aktenkoffer", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hgel", + /*258*/ "Fang", + /*259*/ "Boxen", + /*260*/ "Game Over\n", + /*261*/ "Titel:\n", + /*262*/ "Bevorzugte Waffe:\n", + /*263*/ "Preise:\n", + /*264*/ "1.\n", + /*265*/ "2.\n", + /*266*/ "3.\n", + /*267*/ "4.\n", + /*268*/ "5.\n", + /*269*/ "6.\n", + /*270*/ "7.\n", + /*271*/ "8.\n", + /*272*/ "9.\n", + /*273*/ "10.\n", + /*274*/ "11.\n", + /*275*/ "12.\n", + /*276*/ "Spieler-Bewertung\n", + /*277*/ "Versuche\n", + /*278*/ "Score\n", + /*279*/ "Team-Bewertung\n", + /*280*/ "Statistik fr %s", + /*281*/ "Suizide\n", + /*282*/ "Versuche\n", + /*283*/ "Hits\n", + /*284*/ "Inventar\n", + /*285*/ "Steuerung\n", + /*286*/ "Spielzeit:\n", + /*287*/ "Spiel beenden\n", + /*288*/ "Pause\n", + /*289*/ "Pause beenden\n", + /*290*/ "Spiel beenden\n", + /*291*/ "Sind Sie sicher?\n", + /*292*/ "Zurck\n", + /*293*/ "Spiel beenden\n", + /*294*/ "PerfectHead\n", + /*295*/ "Gespeicherten Kopf laden\n", + /*296*/ "Neuen Kopf erstellen\n", + /*297*/ "Kopf editieren\n", + /*298*/ "PerfectHead editieren\n", + /*299*/ "W臧le den Kopf:\n", + /*300*/ "Abbruch\n", + /*301*/ "Neuen Kopf erstellen\n", + /*302*/ "Gespeicherten Kopf laden\n", + /*303*/ "Wo mchtest du diesen\n", + /*304*/ "Kopf einsetzen?\n", + /*305*/ "Kampfsimulator\n", + /*306*/ "Alle Missionen\n", + /*307*/ "Beide\n", + /*308*/ "Abbruch\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "PerfectHead laden\n", + /*339*/ "Legen Sie das Controller Pak\n", + /*340*/ "mit dem Kopf, den Sie laden\n", + /*341*/ "mchten in einen beliebigen\n", + /*342*/ "Controller ein.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Abbruch\n", + /*345*/ "Quelle:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "PerfectHead speichern\n", + /*393*/ "Sie knnen jetzt den Kopf auf\n", + /*394*/ "ein Controller Pak speichern.\n", + /*395*/ "In diesem Fall stellen Sie bitte\n", + /*396*/ "sicher, dass ein Controller Pak\n", + /*397*/ "eingelegt ist. W臧len Sie \"Speichern\".\n", + /*398*/ "Speichern\n", + /*399*/ "Nicht speichern\n", + /*400*/ "Kopf wurde erstellt!\n", + /*401*/ "Um diesen Kopf im Kampsimulator einzusetzen,\n", + /*402*/ "w臧len Sie ihn aus dem Charakter-Men vom\n", + /*403*/ "Spieler/Simulanten-Einstellungs-Men.\n", + /*404*/ "Die gewnschten Kpfe erscheinen nun\n", + /*405*/ "in allen Missionen, die Sie spielen.\n", + /*406*/ "Sie knnen den Kopf nun noch weiter editieren.\n", + /*407*/ "Beenden\n", + /*408*/ "Kopf editieren\n", + /*409*/ "Farbe des Kopfes:\n", + /*410*/ "Gesicht:\n", + /*411*/ "Frisur:\n", + /*412*/ "OK\n", + /*413*/ "Abbruch\n", + /*414*/ "Abbruch\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Ger舩e-Liste\n", + /*418*/ "Information\n", + /*419*/ "ヨrtlichkeiten\n", + /*420*/ "Fahrzeuge\n", + /*421*/ "Character-Profile\n", + /*422*/ "Weitere Informationen\n", + /*423*/ "Trainings-Statistik\n", + /*424*/ "bentigte Zeit:\n", + /*425*/ "Abgeschlossen!\n", + /*426*/ "Durchgefallen!\n", + /*427*/ "OK\n", + /*428*/ "Weiter\n", + /*429*/ "Zurck\n", + /*430*/ "Abbruch\n", + /*431*/ "Character-Profile\n", + /*432*/ "Name:\n", + /*433*/ "Alter:\n", + /*434*/ "Rasse:\n", + /*435*/ "Abbruch\n", + /*436*/ "Cheats\n", + /*437*/ "Sie knnen das Ger舩 jetzt abschalten.\n", + /*438*/ "Abbruch\n", + /*439*/ "Bronze\n", + /*440*/ "Silber\n", + /*441*/ "Gold\n", + /*442*/ "Schwierigkeit\n", + /*443*/ "Schwierigkeit:\n", + /*444*/ "W臧len Sie die Schwierigkeit:\n", + /*445*/ " \n", + /*446*/ "Waffe\n", + /*447*/ "Trainings-Info\n", + /*448*/ "Trainings-Statistik\n", + /*449*/ "Abgeschlossen!\n", + /*450*/ "Score:\n", + /*451*/ "Zerstrte Ziele:\n", + /*452*/ "Schwierigkeit:\n", + /*453*/ "bentigte Zeit:\n", + /*454*/ "Waffe:\n", + /*455*/ "Genauigkeit:\n", + /*456*/ "Nicht durchgefallen\n", + /*457*/ "Keine Munition\n", + /*458*/ "Zeit abgelaufen\n", + /*459*/ "Score nicht erreicht\n", + /*460*/ "Zu ungenau\n", + /*461*/ "Bingo\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Munitions-Limit:\n", + /*472*/ "Zeit-Limit:\n", + /*473*/ "Min. Genauigkeit:\n", + /*474*/ "Ziele:\n", + /*475*/ "Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Fertig\n", + /*478*/ "Warnung!\n", + /*479*/ "Sollten Sie Cheats aktivieren, knnen Sie nicht\nweiter ins Spiel vordringen, solange\ndiese Cheats aktiv sind.\n", + /*480*/ "OK\n", + /*481*/ "Zurck\n", + /*482*/ "Spieler %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Controller Pak \nwird geprft\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Bitte warten...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_i.c b/src/files/lang/pal-final/mpmenu_str_i.c new file mode 100644 index 000000000..f3bfe22df --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Che schifo!\n", + /* 1*/ "Servono munizioni?\n", + /* 2*/ "Protezione minima\n", + /* 3*/ "Protezione massima\n", + /* 4*/ "Precisione di tiro\n", + /* 5*/ "Professionale\n", + /* 6*/ "Micidiale\n", + /* 7*/ "Innocuo\n", + /* 8*/ "Codardo\n", + /* 9*/ "Disperato\n", + /* 10*/ "Lodevole\n", + /* 11*/ "Disonorevole\n", + /* 12*/ "Vita pi breve\n", + /* 13*/ "Vita pi lunga\n", + /* 14*/ "Doppio colpo\n", + /* 15*/ "Triplo colpo\n", + /* 16*/ "Colpo quadruplo\n", + /* 17*/ "Impostazioni gioco\n", + /* 18*/ "Carica impostazioni\n", + /* 19*/ "Ambientaz.\n", + /* 20*/ "Scena\n", + /* 21*/ "Opzioni\n", + /* 22*/ "Squadre\n", + /* 23*/ "Armi\n", + /* 24*/ "Limiti\n", + /* 25*/ "Replicanti\n", + /* 26*/ "Salva impostazioni\n", + /* 27*/ "Interrompi gioco\n", + /* 28*/ "Impostaz. giocatore\n", + /* 29*/ "Carica giocatore\n", + /* 30*/ "Nome\n", + /* 31*/ "Personaggio\n", + /* 32*/ "Svantaggi\n", + /* 33*/ "Comandi\n", + /* 34*/ "Opzioni giocatore\n", + /* 35*/ "Statistiche\n", + /* 36*/ "Avvio gioco\n", + /* 37*/ "Esci\n", + /* 38*/ "Salva Giocatore\n", + /* 39*/ "Salva Copia Giocat.\n", + /* 40*/ "Varie\n", + /* 41*/ "Colonna sonora\n", + /* 42*/ "Nomi squadre\n", + /* 43*/ "Rapporto\n", + /* 44*/ "Blocco\n", + /* 45*/ "Nessuno\n", + /* 46*/ "Ultimo vincit.\n", + /* 47*/ "Ultimo perden.\n", + /* 48*/ "A caso\n", + /* 49*/ "Sfida\n", + /* 50*/ "Sfide di lotta\n", + /* 51*/ "Interrompi la sfida\n", + /* 52*/ "Interrompi\n", + /* 53*/ "Desideri veramente\ninterrompere il gioco?\n", + /* 54*/ "Interrompi\n", + /* 55*/ "Annulla\n", + /* 56*/ "%s\n", + /* 57*/ "Accetta\n", + /* 58*/ "Annulla\n", + /* 59*/ "Nomi squadre\n", + /* 60*/ "Esci\n", + /* 61*/ "Cambia nomi squadre\n", + /* 62*/ "Colonna sonora\n", + /* 63*/ "Attuale:\n", + /* 64*/ "Pi brani\n", + /* 65*/ "Esci\n", + /* 66*/ "Brani multipli\n", + /* 67*/ "A caso\n", + /* 68*/ "Seleziona brani\n", + /* 69*/ "Seleziona brano\n", + /* 70*/ "Comandi squadra\n", + /* 71*/ "Squadre attivate\n", + /* 72*/ "Squadre:\n", + /* 73*/ "Squadra automatica...\n", + /* 74*/ "Esci\n", + /* 75*/ "Squadra automatica\n", + /* 76*/ "Due squadre\n", + /* 77*/ "Tre squadre\n", + /* 78*/ "Quattro squadre\n", + /* 79*/ "Squadre al massimo\n", + /* 80*/ "Umani contro replic.\n", + /* 81*/ "Coppie umani-replic.\n", + /* 82*/ "Annulla\n", + /* 83*/ "Replicanti\n", + /* 84*/ "Aggiungi replicanti...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Cancella tutto\n", + /* 94*/ "Esci\n", + /* 95*/ "Difficolt:\n", + /* 96*/ "Cambia tipo...\n", + /* 97*/ "Personaggio...\n", + /* 98*/ "Cancella replicante\n", + /* 99*/ "Esci\n", + /*100*/ "Personaggio replicante\n", + /*101*/ "Aggiungi replicante\n", + /*102*/ "Cambia replicante\n", + /*103*/ "Replicanti normali\n", + /*104*/ "Replicanti speciali\n", + /*105*/ "Pronti!\n", + /*106*/ "...attendere\n", + /*107*/ "Limiti\n", + /*108*/ "Tempo\n", + /*109*/ "Punteggio\n", + /*110*/ "Ripristina impostaz.\n", + /*111*/ "Esci\n", + /*112*/ "No limite\n", + /*113*/ "%d\n", + /*114*/ "%d min\n", + /*115*/ "Scena\n", + /*116*/ "Dark\n", + /*117*/ "Classica\n", + /*118*/ "A caso\n", + /*119*/ "Skedar", + /*120*/ "Condotte", + /*121*/ "Burrone", + /*122*/ "Edificio G5", + /*123*/ "Fognature", + /*124*/ "Magazzino", + /*125*/ "Griglia", + /*126*/ "Rovine", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Tetto", + /*130*/ "Fortezza", + /*131*/ "Villa", + /*132*/ "Parcheggio", + /*133*/ "Tempio", + /*134*/ "Complesso", + /*135*/ "Felicit", + /*136*/ "A caso", + /*137*/ "Carica giocatore\n", + /*138*/ "Premi B per annullare\n", + /*139*/ "Carica impostaz. gioco\n", + /*140*/ "%s: Ambientazione: %s Scena: %s Replicanti: %d", + /*141*/ "Impostazioni\n", + /*142*/ "Nome giocatore\n", + /*143*/ "Personaggio\n", + /*144*/ "Carica testa...\n", + /*145*/ "Statistiche %s\n", + /*146*/ "Vittime:\n", + /*147*/ "Decessi:\n", + /*148*/ "Precisione:\n", + /*149*/ "Colpi al capo:\n", + /*150*/ "Munizioni usate:\n", + /*151*/ "Danno arrecato:\n", + /*152*/ "Danno subito:\n", + /*153*/ "Partite giocate:\n", + /*154*/ "Partite vinte:\n", + /*155*/ "Partite perse:\n", + /*156*/ "Tempo:\n", + /*157*/ "Distanza:\n", + /*158*/ "Medaglie vinte:\n", + /*159*/ " Precisione:\n", + /*160*/ " Colpi al capo:\n", + /*161*/ " Campione:\n", + /*162*/ " Superstite:\n", + /*163*/ "Tuo titolo:\n", + /*164*/ "Esci\n", + /*165*/ "Sfide completate\n", + /*166*/ "Esci\n", + /*167*/ "Opzioni\n", + /*168*/ "Mostra strumenti\n", + /*169*/ "Mostra giocatori\n", + /*170*/ "Mostra squadre\n", + /*171*/ "Radar\n", + /*172*/ "Esci\n", + /*173*/ "Armi\n", + /*174*/ "Imposta:\n", + /*175*/ "Impostaz. attuali armi:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Esci\n", + /*183*/ "Salva impostaz. gioco\n", + /*184*/ "Vuoi salvare sul file\ndi gioco originale?\n", + /*185*/ "Salva su originale\n", + /*186*/ "Salva copia\n", + /*187*/ "Non salvare\n", + /*188*/ "Nome del file partita\n", + /*189*/ "Digita nome per il file\nimpostazioni gioco:\n", + /*190*/ "Conferma\n", + /*191*/ "Il file giocatore 鐔nsempre salvato\nautomaticamente.\n", + /*192*/ "Salvarne una copia?\n", + /*193*/ "No\n", + /*194*/ "S\n", + /*195*/ "Esci\n", + /*196*/ "Desideri veramente\nuscire?\n", + /*197*/ "Esci\n", + /*198*/ "Annulla\n", + /*199*/ "Comandi\n", + /*200*/ "Modalit comandi\n", + /*201*/ "Inv. punto vista\n", + /*202*/ "Vista in avanti\n", + /*203*/ "Rotazione testa\n", + /*204*/ "Mira automatica\n", + /*205*/ "Mirino\n", + /*206*/ "Vista su schermo\n", + /*207*/ "Mostra obiettivo\n", + /*208*/ "Area zoom\n", + /*209*/ "Munizioni\n", + /*210*/ "Funzioni arma\n", + /*211*/ "Macchia colorata\n", + /*212*/ "Esci\n", + /*213*/ "Tieni premuto\n", + /*214*/ "Attiva/disattiva\n", + /*215*/ "Opzioni lotta\n", + /*216*/ "Opzioni cartella\n", + /*217*/ "Opzioni hacker\n", + /*218*/ "Opzioni tutti contro 1\n", + /*219*/ "Opzioni colle\n", + /*220*/ "Opzioni cassa\n", + /*221*/ "Opzioni box\n", + /*222*/ "Vittime in un colpo\n", + /*223*/ "Al rallentatore\n", + /*224*/ "Accelerato\n", + /*225*/ "Mostra squadra\n", + /*226*/ "Nessun Radar\n", + /*227*/ "No mira autom.\n", + /*228*/ "Nascondi giocatori\n", + /*229*/ "Nascondi strumenti\n", + /*230*/ "Mostra obiettivo\n", + /*231*/ "Mostra terminale\n", + /*232*/ "Box su radar\n", + /*233*/ "Colle su radar\n", + /*234*/ "Colle mobile\n", + /*235*/ "Tempo\n", + /*236*/ "Mostra su radar\n", + /*237*/ "Mostra cartella\n", + /*238*/ "Mostra su radar\n", + /*239*/ "Esci\n", + /*240*/ "No\n", + /*241*/ "S\n", + /*242*/ "Furbo\n", + /*243*/ "Ambientazione\n", + /*244*/ "Per tutti!\n", + /*245*/ "-Collaborazione-\n", + /*246*/ "Lotta", + /*247*/ "Tieni cartella", + /*248*/ "Centrale Hacker", + /*249*/ "Tutti contro 1", + /*250*/ "Re del colle", + /*251*/ "Prendi la cassa", + /*252*/ "Tocca quel box", + /*253*/ "Lotta", + /*254*/ "Cartella", + /*255*/ "Hacker", + /*256*/ "Contro 1", + /*257*/ "Colle", + /*258*/ "Cassa", + /*259*/ "Box", + /*260*/ "Fine partita\n", + /*261*/ "Titolo:\n", + /*262*/ "Arma pi usata:\n", + /*263*/ "Premi:\n", + /*264*/ "1ー\n", + /*265*/ "2ー\n", + /*266*/ "3ー\n", + /*267*/ "4ー\n", + /*268*/ "5ー\n", + /*269*/ "6ー\n", + /*270*/ "7ー\n", + /*271*/ "8ー\n", + /*272*/ "9ー\n", + /*273*/ "10ー\n", + /*274*/ "11ー\n", + /*275*/ "12ー\n", + /*276*/ "Classifica giocatori\n", + /*277*/ "Decessi\n", + /*278*/ "Punti\n", + /*279*/ "Classifica squadre\n", + /*280*/ "Statistiche %s", + /*281*/ "Suicidi\n", + /*282*/ "Decessi\n", + /*283*/ "Vitt.\n", + /*284*/ "Inventario\n", + /*285*/ "Comandi\n", + /*286*/ "Tempo:\n", + /*287*/ "Fine gioco\n", + /*288*/ "Pausa\n", + /*289*/ "Fine pausa\n", + /*290*/ "Esci dal gioco\n", + /*291*/ "Sicuro?\n", + /*292*/ "Annulla\n", + /*293*/ "Fine gioco\n", + /*294*/ "TestaPerfect\n", + /*295*/ "Carica testa salvata\n", + /*296*/ "Crea nuova testa\n", + /*297*/ "Modifica testa caricata\n", + /*298*/ "Modifica testaPerfect\n", + /*299*/ "Scegli casella per modifica:\n", + /*300*/ "Annulla\n", + /*301*/ "Crea nuova testa\n", + /*302*/ "Carica testa salvata\n", + /*303*/ "Dove desideri usare\n", + /*304*/ "questa testa?\n", + /*305*/ "Simulatore lotta\n", + /*306*/ "Tutte le missioni\n", + /*307*/ "Entrambi\n", + /*308*/ "Annulla\n", + /*309*/ "Impostaz. macch. fotografica\n", + /*310*/ "Inserisci la macch. fotografica\n", + /*311*/ "nella cassetta Game Boy.\n", + /*312*/ "Poi inserisci la cassetta Game Boy\n", + /*313*/ "in un Controller.\n", + /*314*/ "OK\n", + /*315*/ "Annulla\n", + /*316*/ "Errore\n", + /*317*/ "Macch. fotografica Game Boy non rilevata!\n", + /*318*/ "Controlla i collegamenti\n", + /*319*/ "e riprova.\n", + /*320*/ "Annulla\n", + /*321*/ "Scegli la macchina\n", + /*322*/ "Rilevate pi macchine\n", + /*323*/ "Seleziona la macchina che\nvuoi usare\n", + /*324*/ "OK\n", + /*325*/ "Annulla\n", + /*326*/ "TestaPerfect\n", + /*327*/ "Scatta foto ora\n", + /*328*/ "Carica foto da macchina\n", + /*329*/ "Annulla\n", + /*330*/ "Carica da macchina\n", + /*331*/ "Scegli foto:\n", + /*332*/ "Annulla\n", + /*333*/ "Scatta foto\n", + /*334*/ "Scatta!\n", + /*335*/ "Annulla\n", + /*336*/ "Tieni foto\n", + /*337*/ "Riprova\n", + /*338*/ "Carica testaPerfect\n", + /*339*/ "Inserisci il Controller Pak\n", + /*340*/ "contenete la testa che\n", + /*341*/ "vuoi caricare in uno\n", + /*342*/ "dei Controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Annulla\n", + /*345*/ "Fonte:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "TestaPerfect Editor\n", + /*352*/ "Scatta altra foto\n", + /*353*/ "Cambia testa\n", + /*354*/ "Posiziona foto\n", + /*355*/ "Colora viso e capelli\n", + /*356*/ "Dai forma a testa\n", + /*357*/ "Rimuovi testa\n", + /*358*/ "Cancella modifiche\n", + /*359*/ "Tieni modifiche\n", + /*360*/ "Dai forma a testa\n", + /*361*/ "Profondit濬n", + /*362*/ "OK\n", + /*363*/ "Annulla\n", + /*364*/ "Posiziona immagine\n", + /*365*/ "Lumninosit濬n", + /*366*/ "OK\n", + /*367*/ "Annulla\n", + /*368*/ "Scegli testa\n", + /*369*/ "OK\n", + /*370*/ "Annulla\n", + /*371*/ "Elimina testaPerfect\n", + /*372*/ "Desideri veramente eliminare\n", + /*373*/ "questa testa dalla memoria?\n", + /*374*/ "Elimina\n", + /*375*/ "Annulla\n", + /*376*/ "Annulla modifiche\n", + /*377*/ "Eliminare veramente\n", + /*378*/ "le modifiche?\n", + /*379*/ "Elimina\n", + /*380*/ "Esci\n", + /*381*/ "Salva testaPerfect\n", + /*382*/ "Hai modificato questa testa.\n", + /*383*/ "Vuoi tenere le modifiche?\n", + /*384*/ "Tieni\n", + /*385*/ "Annulla\n", + /*386*/ "Salva testaPerfect\n", + /*387*/ "Le modifiche saranno memorizzate.\n", + /*388*/ "Vuoi salvare le modifiche\n", + /*389*/ "nel Controller Pak?\n", + /*390*/ "Salva\n", + /*391*/ "Non salvare\n", + /*392*/ "Salva testaPerfect\n", + /*393*/ "Ora puoi salvare la testa\n", + /*394*/ "su un Controller Pak se vuoi.\n", + /*395*/ "Prima per accertati che\n", + /*396*/ "sia inserito un Controller Pak\n", + /*397*/ "e scegli \"Salva\".\n", + /*398*/ "Salva\n", + /*399*/ "Non salvare\n", + /*400*/ "Testa completa!\n", + /*401*/ "Per usare la testa nel simulatore lotta,\n", + /*402*/ "selezionala dal menu personaggi delle\n", + /*403*/ "impostazioni giocatore/replicante.\n", + /*404*/ "Appariranno le teste missione\n", + /*405*/ "per ogni missione giocata.\n", + /*406*/ "Puoi ancora modificare la testa.\n", + /*407*/ "Esci\n", + /*408*/ "Modifica testa\n", + /*409*/ "Colore testa\n", + /*410*/ "Viso:\n", + /*411*/ "Capelli:\n", + /*412*/ "OK\n", + /*413*/ "Annulla\n", + /*414*/ "Premi B per uscire.\n", + /*415*/ "Informazioni hangar\n", + /*416*/ "Esercitazione olografica\n", + /*417*/ "Lista strumenti\n", + /*418*/ "Informazioni\n", + /*419*/ "Luoghi\n", + /*420*/ "Veicoli\n", + /*421*/ "Profili personaggi\n", + /*422*/ "Altre informazioni\n", + /*423*/ "Statistiche esercitazione\n", + /*424*/ "Tempo impiegato:\n", + /*425*/ "Compiuto!\n", + /*426*/ "Fallito!\n", + /*427*/ "Ok\n", + /*428*/ "Riprendi\n", + /*429*/ "Annulla\n", + /*430*/ "Interrompi\n", + /*431*/ "Profilo personaggio\n", + /*432*/ "Nome:\n", + /*433*/ "Et:\n", + /*434*/ "Razza:\n", + /*435*/ "Premi B per uscire.\n", + /*436*/ "Trucchi\n", + /*437*/ "Ora puoi spegnere il computer.\n", + /*438*/ "Annulla\n", + /*439*/ "Bronzo\n", + /*440*/ "Argento\n", + /*441*/ "Oro\n", + /*442*/ "Difficolt濬n", + /*443*/ "Difficolt:\n", + /*444*/ "Seleziona difficolt:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informazioni esercitazione\n", + /*448*/ "Statistiche esercitazione\n", + /*449*/ "Compiuto!\n", + /*450*/ "Punti:\n", + /*451*/ "Obiettivi distrutti:\n", + /*452*/ "Difficolt:\n", + /*453*/ "Tempo impiegato:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisione:\n", + /*456*/ "Non fallito\n", + /*457*/ "Finite munizioni\n", + /*458*/ "Tempo scaduto\n", + /*459*/ "Punteggio impossibile \n", + /*460*/ "Troppo impreciso\n", + /*461*/ "Centro\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Colpi\n", + /*466*/ "Punti\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munizioni:\n", + /*472*/ "Limite tempo:\n", + /*473*/ "Precisione min.:\n", + /*474*/ "Obiettivi:\n", + /*475*/ "Punteggio obiettivi:\n", + /*476*/ "Trucchi\n", + /*477*/ "Fatto\n", + /*478*/ "Avvertenza\n", + /*479*/ "Finch i trucchi sono attivi,\nnon potrai progredire nel gioco\n.", + /*480*/ "OK\n", + /*481*/ "Annulla\n", + /*482*/ "Giocat. %d: ", + /*483*/ "Premi START!\n", + /*484*/ "Ricerca macch. fotografica!\n", + /*485*/ "Regolazione macchina\n", + /*486*/ "Scaricamento immagine\n", + /*487*/ "Caricamento immagine\n", + /*488*/ "Salva immagine\n", + /*489*/ "Tasferimento immagine\n", + /*490*/ "Caricamento segmento\n", + /*491*/ "Esame Controller Pak\n", + /*492*/ "Prelevam. testaPerfect\n", + /*493*/ "Salvatag. testaPerfect\n", + /*494*/ "Regolazione autom. macchina\n", + /*495*/ "Attendere prego...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_s.c b/src/files/lang/pal-final/mpmenu_str_s.c new file mode 100644 index 000000000..1a89f6635 --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "El m疽 Suicida\n", + /* 1*/ "ソY la municin?\n", + /* 2*/ "Menor Escudo\n", + /* 3*/ "Mejor Protegido\n", + /* 4*/ "Mejor Puntera\n", + /* 5*/ "El m疽 Profesional\n", + /* 6*/ "El m疽 Mortfero\n", + /* 7*/ "El m疽 Inofensivo\n", + /* 8*/ "El m疽 Cobarde\n", + /* 9*/ "El m疽 Fren騁ico\n", + /* 10*/ "El m疽 Honorable\n", + /* 11*/ "El menos Honorable\n", + /* 12*/ "La Vida m疽 Corta\n", + /* 13*/ "La Vida m疽 Larga\n", + /* 14*/ "Doble Muerte\n", + /* 15*/ "Triple Muerte\n", + /* 16*/ "Cu疆ruple Muerte\n", + /* 17*/ "Conf. de Juego\n", + /* 18*/ "Cargar Par疥.\n", + /* 19*/ "Escenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Opciones\n", + /* 22*/ "Equipos\n", + /* 23*/ "Armas\n", + /* 24*/ "Lmites\n", + /* 25*/ "Simulantes\n", + /* 26*/ "Guardar Par疥.\n", + /* 27*/ "Abortar Juego\n", + /* 28*/ "Conf. de Jugador\n", + /* 29*/ "Cargar Jugador\n", + /* 30*/ "Nombre\n", + /* 31*/ "Personaje\n", + /* 32*/ "H疣dicap\n", + /* 33*/ "Controles\n", + /* 34*/ "Opciones Jug.\n", + /* 35*/ "Estadsticas\n", + /* 36*/ "Comenzar Juego\n", + /* 37*/ "Abandonar\n", + /* 38*/ "Guardar Jugador\n", + /* 39*/ "Guardar Copia\n", + /* 40*/ "Objetos\n", + /* 41*/ "Banda Sonora\n", + /* 42*/ "Nombres de Equipo\n", + /* 43*/ "Ratio\n", + /* 44*/ "Bloquear\n", + /* 45*/ "Ninguno\n", + /* 46*/ "レl. Ganador\n", + /* 47*/ "レl. Perdedor\n", + /* 48*/ "Aleatorio\n", + /* 49*/ "Desafo\n", + /* 50*/ "Desafos de Combate\n", + /* 51*/ "Abortar Desafo\n", + /* 52*/ "Abortar\n", + /* 53*/ "ソEst疽 seguro de que\nquieres abortar el juego?\n", + /* 54*/ "Abortar\n", + /* 55*/ "Cancelar\n", + /* 56*/ "%s\n", + /* 57*/ "Aceptar\n", + /* 58*/ "Cancelar\n", + /* 59*/ "Nombres de Equipo\n", + /* 60*/ "Volver\n", + /* 61*/ "Cambiar Nombre Eq.\n", + /* 62*/ "Banda Sonora\n", + /* 63*/ "Actual:\n", + /* 64*/ "Mltiples Melodas\n", + /* 65*/ "Volver\n", + /* 66*/ "Mltiples Melodas\n", + /* 67*/ "Aleatorio\n", + /* 68*/ "Elegir Melodas\n", + /* 69*/ "Elegir Meloda\n", + /* 70*/ "Controles de Equipo\n", + /* 71*/ "Equipos Activados\n", + /* 72*/ "Equipos:\n", + /* 73*/ "Auto Equipo...\n", + /* 74*/ "Volver\n", + /* 75*/ "Auto Equipo\n", + /* 76*/ "Dos Equipos\n", + /* 77*/ "Tres Equipos\n", + /* 78*/ "Cuatro Equipos\n", + /* 79*/ "M痊imo de Equipos\n", + /* 80*/ "Humanos contra Sim.\n", + /* 81*/ "Parejas Humano-Sim.\n", + /* 82*/ "Cancelar\n", + /* 83*/ "Simulantes\n", + /* 84*/ "Aadir Simulante...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Despejar Todo\n", + /* 94*/ "Volver\n", + /* 95*/ "Dificultad:\n", + /* 96*/ "Cambiar Tipo...\n", + /* 97*/ "Personaje...\n", + /* 98*/ "Borrar Simulante\n", + /* 99*/ "Volver\n", + /*100*/ "Personaje Simulante\n", + /*101*/ "Aadir Simulante\n", + /*102*/ "Cambiar Simulante\n", + /*103*/ "Simulantes Normales\n", + /*104*/ "Simulantes Especiales\n", + /*105*/ "。Preparado!\n", + /*106*/ "...y esperando\n", + /*107*/ "Lmites\n", + /*108*/ "Tiempo\n", + /*109*/ "Puntos\n", + /*110*/ "Par疥etros Iniciales\n", + /*111*/ "Volver\n", + /*112*/ "Sin lmite\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Cl疽ico\n", + /*118*/ "Aleatorio\n", + /*119*/ "Skedar", + /*120*/ "Tuberas", + /*121*/ "Barranco", + /*122*/ "Edificio G5", + /*123*/ "Cloacas", + /*124*/ "Almac駭", + /*125*/ "Rejilla", + /*126*/ "Ruinas", + /*127*/ "チrea 52", + /*128*/ "Base", + /*129*/ "Tejado", + /*130*/ "Fortaleza", + /*131*/ "Villa", + /*132*/ "Aparcamiento", + /*133*/ "Templo", + /*134*/ "Complejo", + /*135*/ "Felicity", + /*136*/ "Aleatorio", + /*137*/ "Cargar Jugador\n", + /*138*/ "Botn B para cancelar\n", + /*139*/ "Cargar Par疥etros\n", + /*140*/ "%s: Escenario: %s Arena: %s Simulantes: %d", + /*141*/ "Predefinidos\n", + /*142*/ "Nombre del Jugador\n", + /*143*/ "Personaje\n", + /*144*/ "Cargar Cabeza...\n", + /*145*/ "Estad. de %s\n", + /*146*/ "Muertes:\n", + /*147*/ "Bajas:\n", + /*148*/ "Precisin:\n", + /*149*/ "Tiros Cabeza:\n", + /*150*/ "Mun. Util.:\n", + /*151*/ "Dao Caus.:\n", + /*152*/ "Dolor Rec.:\n", + /*153*/ "Nー Juegos:\n", + /*154*/ "J. Ganados:\n", + /*155*/ "J. Perdidos:\n", + /*156*/ "Tiempo:\n", + /*157*/ "Distancia:\n", + /*158*/ "Medallas Ganadas:\n", + /*159*/ " Precisin:\n", + /*160*/ " Tiros Cabeza:\n", + /*161*/ " Mr. Muerte:\n", + /*162*/ " Superviviente:\n", + /*163*/ "Tu Ttulo:\n", + /*164*/ "Volver\n", + /*165*/ "Desafos Completados\n", + /*166*/ "Volver\n", + /*167*/ "Opciones\n", + /*168*/ "Destacar Objetos\n", + /*169*/ "Destacar Jugadores\n", + /*170*/ "Destacar Equipos\n", + /*171*/ "Radar\n", + /*172*/ "Volver\n", + /*173*/ "Armas\n", + /*174*/ "Fijar:\n", + /*175*/ "Conf. Arma Actual:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Volver\n", + /*183*/ "Guardar Configuracin\n", + /*184*/ "ソQuieres guardar sobre\ntu fichero original?\n", + /*185*/ "Guardar Sobre Orig.\n", + /*186*/ "Guardar Copia\n", + /*187*/ "No Guardar\n", + /*188*/ "Nombre de Fichero\n", + /*189*/ "Introduce el nombre\nde fichero de conf.:\n", + /*190*/ "Confirmar\n", + /*191*/ "Tu fichero de jugador\nsiempre se guarda\nautom疸icamente.\n", + /*192*/ "ソGuardar una copia?\n", + /*193*/ "No\n", + /*194*/ "S\n", + /*195*/ "Abandonar\n", + /*196*/ "ソSeguro que quieres\nabandonar?\n", + /*197*/ "Abandonar\n", + /*198*/ "Cancelar\n", + /*199*/ "Controles\n", + /*200*/ "Estilo de Control\n", + /*201*/ "Cabeceo Cambiado\n", + /*202*/ "Mirar al Frente\n", + /*203*/ "Giro de Cabeza\n", + /*204*/ "Auto-Apuntar\n", + /*205*/ "C. Apuntar\n", + /*206*/ "Mirilla en Pantalla\n", + /*207*/ "Mostrar Objetivo\n", + /*208*/ "Alcance de Zoom\n", + /*209*/ "Municin en Pantalla\n", + /*210*/ "Funcin del Arma\n", + /*211*/ "Bolas de Pintura\n", + /*212*/ "Volver\n", + /*213*/ "Mantener\n", + /*214*/ "Cambiar\n", + /*215*/ "Opciones de Combate\n", + /*216*/ "Opciones de Maletn\n", + /*217*/ "Opciones de Hacker\n", + /*218*/ "Opciones de Llevar\n", + /*219*/ "Opciones de Colina\n", + /*220*/ "Opciones de Captura\n", + /*221*/ "Opciones de Cajas\n", + /*222*/ "Muertes de 1 Tiro\n", + /*223*/ "C疥. Lenta\n", + /*224*/ "Movimiento R疳ido\n", + /*225*/ "Mostrar Equipo\n", + /*226*/ "Sin Radar\n", + /*227*/ "Sin Auto-Apuntar\n", + /*228*/ "Sin Destacar Jug.\n", + /*229*/ "Sin Destacar Obj.\n", + /*230*/ "Destacar Objetivos\n", + /*231*/ "Destacar Terminales\n", + /*232*/ "Cajas en el Radar\n", + /*233*/ "Colina en el Radar\n", + /*234*/ "Colina Mvil\n", + /*235*/ "Tiempo\n", + /*236*/ "Mostrar en el Radar\n", + /*237*/ "Destacar Maletn\n", + /*238*/ "Mostrar en Radar\n", + /*239*/ "Volver\n", + /*240*/ "No\n", + /*241*/ "S\n", + /*242*/ "Intelig.\n", + /*243*/ "Escenario\n", + /*244*/ "。Pelea!\n", + /*245*/ "-Trabajo de Equipo-\n", + /*246*/ "Combate", + /*247*/ "Mant駭 el Maletn", + /*248*/ "Central Hacker", + /*249*/ "T la llevas", + /*250*/ "Rey de la Colina", + /*251*/ "Captura Maletn", + /*252*/ "Toca esa Caja", + /*253*/ "Combate", + /*254*/ "Maletn", + /*255*/ "Hacker", + /*256*/ "Llevar", + /*257*/ "Colina", + /*258*/ "Capturar", + /*259*/ "Cajas", + /*260*/ "Fin del Juego\n", + /*261*/ "Ttulo:\n", + /*262*/ "Arma Preferida:\n", + /*263*/ "Premios:\n", + /*264*/ "1ー\n", + /*265*/ "2ー\n", + /*266*/ "3ー\n", + /*267*/ "4ー\n", + /*268*/ "5ー\n", + /*269*/ "6ー\n", + /*270*/ "7ー\n", + /*271*/ "8ー\n", + /*272*/ "9ー\n", + /*273*/ "10ー\n", + /*274*/ "11ー\n", + /*275*/ "12ー\n", + /*276*/ "Situacin Jugador\n", + /*277*/ "Bajas\n", + /*278*/ "Punt.\n", + /*279*/ "Situacin Equipo\n", + /*280*/ "Estad. de %s", + /*281*/ "Suicidios\n", + /*282*/ "Bajas\n", + /*283*/ "Aci.\n", + /*284*/ "Inventario\n", + /*285*/ "Controles\n", + /*286*/ "T. Juego:\n", + /*287*/ "Acabar Juego\n", + /*288*/ "Pausar\n", + /*289*/ "Reanudar\n", + /*290*/ "Acabar Juego\n", + /*291*/ "ソEst疽 seguro?\n", + /*292*/ "Cancelar\n", + /*293*/ "Acabar Juego\n", + /*294*/ "PerfectHead\n", + /*295*/ "Cargar Cabeza Guardada\n", + /*296*/ "Crear Nueva Cabeza\n", + /*297*/ "Editar Cabeza Cargada\n", + /*298*/ "Editar PerfectHead\n", + /*299*/ "Elegir slot a editar:\n", + /*300*/ "Cancelar\n", + /*301*/ "Crear Nueva Cabeza\n", + /*302*/ "Cargar Cabeza Guardada\n", + /*303*/ "ソDnde querr疽 usar\n", + /*304*/ "esta cabeza?\n", + /*305*/ "Simulador de Combate\n", + /*306*/ "Todas las Misiones\n", + /*307*/ "Ambos\n", + /*308*/ "Cancelar\n", + /*309*/ "Conf. C疥ara\n", + /*310*/ "Inserta tu c疥ara en tu\n", + /*311*/ "Transfer Pak.\n", + /*312*/ "Entonces, inserta tu Transfer Pak\n", + /*313*/ "en cualquier mando.\n", + /*314*/ "Aceptar\n", + /*315*/ "Cancelar\n", + /*316*/ "Error\n", + /*317*/ "。C疥ara de Game Boy No Detectada!\n", + /*318*/ "Por favor, comprueba todas las\n", + /*319*/ "conexiones y reint駭talo.\n", + /*320*/ "Cancelar\n", + /*321*/ "Elegir C疥ara\n", + /*322*/ "M疽 de una c疥ara detectada.\n", + /*323*/ "Por favor, elige qu c疥ara\nquieres usar\n", + /*324*/ "Aceptar\n", + /*325*/ "Cancelar\n", + /*326*/ "PerfectHead\n", + /*327*/ "Tomar una Foto ahora\n", + /*328*/ "Cargar Foto de la C疥ara\n", + /*329*/ "Cancelar\n", + /*330*/ "Cargar de la C疥ara\n", + /*331*/ "Elige foto a cargar de la c疥ara:\n", + /*332*/ "Cancelar\n", + /*333*/ "Tomar Foto\n", + /*334*/ "。Dispara!\n", + /*335*/ "Cancelar\n", + /*336*/ "Guardar Foto\n", + /*337*/ "Reintentar\n", + /*338*/ "Cargar PerfectHead\n", + /*339*/ "Inserta el Controller Pak\n", + /*340*/ "que contiene la cabeza\n", + /*341*/ "que quieres cargar en\n", + /*342*/ "cualquier mando.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancelar\n", + /*345*/ "Origen:\n", + /*346*/ "Cart. 1", + /*347*/ "Cart. 2", + /*348*/ "Cart. 3", + /*349*/ "Cart. 4", + /*350*/ "", + /*351*/ "Editor PerfectHead\n", + /*352*/ "Tomar otra foto\n", + /*353*/ "Cambiar Cabeza\n", + /*354*/ "Posicionar la Foto\n", + /*355*/ "Color de Cara y Pelo\n", + /*356*/ "Forma de la Cabeza\n", + /*357*/ "Quitar Cabeza\n", + /*358*/ "Cancelar Cambios\n", + /*359*/ "Mantener Cambios\n", + /*360*/ "Forma de la Cabeza\n", + /*361*/ "Profundidad\n", + /*362*/ "Aceptar\n", + /*363*/ "Cancelar\n", + /*364*/ "Posicionar la Imagen\n", + /*365*/ "Brillo\n", + /*366*/ "Aceptar\n", + /*367*/ "Cancelar\n", + /*368*/ "Elegir Cabeza\n", + /*369*/ "Aceptar\n", + /*370*/ "Cancelar\n", + /*371*/ "Quitar PerfectHead\n", + /*372*/ "ソEst疽 seguro de que quieres\n", + /*373*/ "quitar esta cabeza de la memoria?\n", + /*374*/ "Borrar\n", + /*375*/ "Cancelar\n", + /*376*/ "Cancelar Cambios\n", + /*377*/ "ソEst疽 seguro de que quieres\n", + /*378*/ "descartar tus cambios?\n", + /*379*/ "Descartar\n", + /*380*/ "Volver al Editor\n", + /*381*/ "Guardar PerfectHead\n", + /*382*/ "Has editado esta cabeza.\n", + /*383*/ "ソQuieres guardar tus cambios?\n", + /*384*/ "Mantener\n", + /*385*/ "Volver\n", + /*386*/ "Guardar PerfectHead\n", + /*387*/ "Tus cambios se mantendr疣 en la memoria.\n", + /*388*/ "ソQuieres guardar tus cambios\n", + /*389*/ "en el Controller Pak?\n", + /*390*/ "Guardar\n", + /*391*/ "No Guardar\n", + /*392*/ "Guardar PerfectHead\n", + /*393*/ "Puedes guardar tu cabeza en el\n", + /*394*/ "Controller Pak que desees.\n", + /*395*/ "Si quieres hacerlo, por favor,\n", + /*396*/ "asegrate de que el Controller Pak\n", + /*397*/ "est insertado y elige \"Guardar\".\n", + /*398*/ "Guardar\n", + /*399*/ "No Guardar\n", + /*400*/ "。Cabeza Completada!\n", + /*401*/ "Para usar tu cabeza en el simulador de combate,\n", + /*402*/ "elige la cabeza desde el men de personajes\n", + /*403*/ "en el men de par疥etros del jugador/simulante.\n", + /*404*/ "Tus cabezas de Misin aparecer疣 en\n", + /*405*/ "cualquier misin que juegues.\n", + /*406*/ "Puedes editar m疽 tu cabeza si quieres.\n", + /*407*/ "Finalizar\n", + /*408*/ "Editar Cabeza\n", + /*409*/ "Color de Cabeza\n", + /*410*/ "Cara:\n", + /*411*/ "Estilo de Pelo:\n", + /*412*/ "Aceptar\n", + /*413*/ "Cancelar\n", + /*414*/ "Pulsa el Botn B para volver.\n", + /*415*/ "Informacin del Hangar\n", + /*416*/ "Holoentrenamiento\n", + /*417*/ "Lista de Dispositivos\n", + /*418*/ "Informacin\n", + /*419*/ "Lugares\n", + /*420*/ "Vehculos\n", + /*421*/ "Perfiles de Personajes\n", + /*422*/ "Informacin Adicional\n", + /*423*/ "Estadsticas de Entrenamiento\n", + /*424*/ "Tiempo Necesitado:\n", + /*425*/ "。Completado!\n", + /*426*/ "。Fallado!\n", + /*427*/ "Aceptar\n", + /*428*/ "Reanudar\n", + /*429*/ "Cancelar\n", + /*430*/ "Abortar\n", + /*431*/ "Perfil del Personaje\n", + /*432*/ "Nombre:\n", + /*433*/ "Edad:\n", + /*434*/ "Raza:\n", + /*435*/ "Pulsa el Botn B para volver.\n", + /*436*/ "Trucos\n", + /*437*/ "Ahora es seguro apagar tu ordenador.\n", + /*438*/ "Cancelar\n", + /*439*/ "Bronce\n", + /*440*/ "Plata\n", + /*441*/ "Oro\n", + /*442*/ "Dificultad\n", + /*443*/ "Dificultad:\n", + /*444*/ "Elegir Dificultad:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informacin de Entrenamiento\n", + /*448*/ "Estadsticas de Entrenamiento\n", + /*449*/ "。Completado!\n", + /*450*/ "Puntuacin:\n", + /*451*/ "Blancos Destruidos:\n", + /*452*/ "Dificultad:\n", + /*453*/ "Tiempo Necesitado:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisin:\n", + /*456*/ "No Fallado\n", + /*457*/ "Sin Municin\n", + /*458*/ "Tiempo Acabado\n", + /*459*/ "Puntuacin Inalcanzable\n", + /*460*/ "Demasiado Impreciso\n", + /*461*/ "Diana\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Total\n", + /*466*/ "Puntuacin\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Lmite de Municin:\n", + /*472*/ "Lmite de Tiempo:\n", + /*473*/ "Precisin Mnima:\n", + /*474*/ "Blancos Necesarios:\n", + /*475*/ "Puntuacin Necesaria:\n", + /*476*/ "Trucos\n", + /*477*/ "Hecho\n", + /*478*/ "Cuidado\n", + /*479*/ "Si activas cualquier truco, ser疽\nincapaz de avanzar m疽 en el juego\nmientras ese truco est activo.\n", + /*480*/ "Aceptar\n", + /*481*/ "Cancelar\n", + /*482*/ "Jugador %d: ", + /*483*/ "。Pulsa START!\n", + /*484*/ "。Buscando C疥ara!\n", + /*485*/ "Calibrando C疥ara\n", + /*486*/ "Descargando Imagen\n", + /*487*/ "Cargando Imagen\n", + /*488*/ "Guardando Imagen\n", + /*489*/ "Transfiriendo Imagen\n", + /*490*/ "Cargando Segmento\n", + /*491*/ "Compr. Controller Pak\n", + /*492*/ "Obteniendo PerfectHead\n", + /*493*/ "Guardando PerfectHead\n", + /*494*/ "Autoajuste de C疥ara\n", + /*495*/ "Por favor... espera...\n", +}; diff --git a/src/files/lang/pal-final/mpweaponsE.c b/src/files/lang/pal-final/mpweaponsE.c new file mode 100644 index 000000000..2b1d497fb --- /dev/null +++ b/src/files/lang/pal-final/mpweaponsE.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweaponsJ.c b/src/files/lang/pal-final/mpweaponsJ.c new file mode 100644 index 000000000..191f20b6f --- /dev/null +++ b/src/files/lang/pal-final/mpweaponsJ.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Capture the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Flag\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak Inserted\n", + /* 66*/ "is damaged or inserted\n", + /* 67*/ "incorrectly.\n", + /* 68*/ "Please remove and try again.\n", + /* 69*/ "Full Controller Pak Inserted\n", + /* 70*/ "is too full to save files.\n", + /* 71*/ "Use the Game Notes Editor to\n", + /* 72*/ "free some space (hold START\n", + /* 73*/ "while powering up.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "Superdragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP7\n", + /*111*/ "DD44\n", + /*112*/ "Klobb\n", + /*113*/ "KF7 Soviet\n", + /*114*/ "ZMG (9mm)\n", + /*115*/ "D5K\n", + /*116*/ "AR33\n", + /*117*/ "RC-P90\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak could\nnot be repaired.\n", + /*185*/ "L/R: ", + /*186*/ "C-UP: ", + /*187*/ "C-L/R: ", + /*188*/ "C-DOWN: ", + /*189*/ "A: ", + /*190*/ "B: ", + /*191*/ "STICK: ", + /*192*/ "Z: ", + /*193*/ "D-PAD: ", + /*194*/ "AIM TOGGLE", + /*195*/ "LOOK UP / GET UP", + /*196*/ "STRAFE", + /*197*/ "LOOK DOWN / CROUCH", + /*198*/ "CHANGE GUN / ACTIVEMENU", + /*199*/ "RELOAD / ACTION / SECONDARY FIRE", + /*200*/ "WALK AND TURN", + /*201*/ "FIRE", + /*202*/ "AS C-BUTTONS", + /*203*/ "Turn off all Cheats\n", + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, + /*264*/ NULL, + /*265*/ NULL, + /*266*/ NULL, + /*267*/ NULL, + /*268*/ NULL, + /*269*/ NULL, + /*270*/ NULL, + /*271*/ NULL, + /*272*/ NULL, + /*273*/ NULL, + /*274*/ NULL, + /*275*/ NULL, + /*276*/ NULL, + /*277*/ NULL, + /*278*/ NULL, + /*279*/ NULL, + /*280*/ NULL, + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweaponsP.c b/src/files/lang/pal-final/mpweaponsP.c new file mode 100644 index 000000000..7250a3295 --- /dev/null +++ b/src/files/lang/pal-final/mpweaponsP.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "Fran軋is\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_f.c b/src/files/lang/pal-final/mpweapons_str_f.c new file mode 100644 index 000000000..190ba1bd5 --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_f.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtient:\nR馗epteur\n", + /* 1*/ "%s obtient:\nMallette\n", + /* 2*/ "%s obtient:\nMallette %s\n", + /* 3*/ "%sa notre\nMallette\n", + /* 4*/ "Mallette %s", + /* 5*/ "Vous capturez:\nMallette %s\n", + /* 6*/ "%s capture notre\nMallette\n", + /* 7*/ "%s capture:\nMallette %s\n", + /* 8*/ "Un point pour survivre!\n", + /* 9*/ "Il faut s'occuper de\n", + /* 10*/ "vos amis!\n", + /* 11*/ "Bien jou!\n", + /* 12*/ "Vous d馗apsulez!\n", + /* 13*/ "2 Points...\n", + /* 14*/ "Vous 黎es la victime!\n", + /* 15*/ "Prot馮ez %s!\n", + /* 16*/ "Abattez %s!\n", + /* 17*/ "T駘馗hargement r騏ssi.\n", + /* 18*/ "Connexion perdue.\n", + /* 19*/ "D饕ut t駘馗hargement.\n", + /* 20*/ "Il faut utiliser le r馗epteur.\n", + /* 21*/ "Roi de\nla zone!\n", + /* 22*/ "Vous avez\nla zone!\n", + /* 23*/ "%sa captur饅nla zone!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "Pas de bouclier\n", + /* 27*/ "Automatiques\n", + /* 28*/ "L-roquettes\n", + /* 29*/ "Simulants\n", + /* 30*/ "Roi de la zone\n", + /* 31*/ "Complexe FarSight\n", + /* 32*/ "Tenir la mallette\n", + /* 33*/ "Pistolets meurtriers\n", + /* 34*/ "Capturer la mallette\n", + /* 35*/ "Occultage\n", + /* 36*/ "Temple Explosifs\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquil.\n", + /* 39*/ "Ralenti\n", + /* 40*/ "Appuyer sur START\n", + /* 41*/ "En pause\n", + /* 42*/ "Custom\n", + /* 43*/ "Hasard\n", + /* 44*/ "Hasard 5\n", + /* 45*/ "Corps corps\n", + /* 46*/ "Mine proximit饅n", + /* 47*/ "L-roquettes\n", + /* 48*/ "Lance-grenades\n", + /* 49*/ "Explosif\n", + /* 50*/ "Magnum d'Or\n", + /* 51*/ "Lourd\n", + /* 52*/ "Tranquil.\n", + /* 53*/ "FarSight\n", + /* 54*/ "Puissant\n", + /* 55*/ "Automatiques\n", + /* 56*/ "Pistolets\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Rien\n", + /* 60*/ "Bouclier\n", + /* 61*/ "Annul饅n", + /* 62*/ "Objectifs remplis\n", + /* 63*/ "Inconnu\n", + /* 64*/ "Manquant\n", + /* 65*/ "Controller Pak ins駻饅n", + /* 66*/ "endommag ou\n", + /* 67*/ "mal branch.\n", + /* 68*/ "Tenter r駱ar.\n", + /* 69*/ "Recommencer\n", + /* 70*/ "Ne pas utiliser\n Controller Pak\n", + /* 71*/ "Controller Pak ins駻饅n", + /* 72*/ "Espace libre insuf.:\n1 note et 28 pages\nrequises.\n", + /* 73*/ "Utiliser le menu\npour faire de la place\n(maintenir START\nen allumant.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Poings du dragon\n", + /* 77*/ "Occulteur\n", + /* 78*/ "Invincible\n", + /* 79*/ "Toutes les armes en solo\n", + /* 80*/ "Munitions infinies\n", + /* 81*/ "Munit. inf. Pas de recharg.\n", + /* 82*/ "Ralenti\n", + /* 83*/ "Mode DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Petite Joanna\n", + /* 87*/ "Petits personnages\n", + /* 88*/ "Boucliers Ennemis\n", + /* 89*/ "Joanna bouclier\n", + /* 90*/ "Super bouclier\n", + /* 91*/ "Vis馥 classique\n", + /* 92*/ "T黎es 駲uipe seulement\n", + /* 93*/ "Jouer Elvis\n", + /* 94*/ "Ennemis roquettes\n", + /* 95*/ "Munit. inf. Laptop sentinelle\n", + /* 96*/ "Ennemis boxeurs\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugiliste\n", + /* 99*/ "Hotshot\n", + /*100*/ "Touche et tire\n", + /*101*/ "Extraterrestre\n", + /*102*/ "Pisteur-R / Coffres armes\n", + /*103*/ "Lance-roquettes\n", + /*104*/ "Fusil sniper\n", + /*105*/ "Scan rayonsX\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Sp馗ial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Jouabilit饅n", + /*121*/ "Armes\n", + /*122*/ "Amis\n", + /*123*/ "Armes pour Joanna en solo\n", + /*124*/ "Armes classiques pour Joanna en solo\n", + /*125*/ "D駸ertion dataDyne", + /*126*/ "Extraction dataDyne ", + /*127*/ "Infiltration S51 ", + /*128*/ "Sauvetage S51", + /*129*/ "Fuite S51", + /*130*/ "Difficult:\n", + /*131*/ "Triche Missions Solo\n", + /*132*/ "Triche Simulateur Combat\n", + /*133*/ "Triche Coop駻atif\n", + /*134*/ "Triche Contre-Op駻ation\n", + /*135*/ "D駸honneur\n", + /*136*/ "Tricheur\n", + /*137*/ "Triche disponible", + /*138*/ "Terminer", + /*139*/ "pour Triche:", + /*140*/ "sur", + /*141*/ "sous", + /*142*/ " ou brancher Perfect Dark Game Boy (r) dans le Transfer Pak (tm), connectez le Transfer Pak dans une manette , sortez et acc馘ez au menu", + /*143*/ "Choix Triche pour information\n", + /*144*/ "Ami disponible", + /*145*/ "Gagner Or sur le champ de tir pour les armes classiques.\n", + /*146*/ "Vis馥 l'馗ran\n", + /*147*/ "Cible\n", + /*148*/ "Port馥 zoom\n", + /*149*/ "Voir munit.\n", + /*150*/ "Fonction arme\n", + /*151*/ "Paintball\n", + /*152*/ "Sous-titres\n", + /*153*/ "Temps mission\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Voulez-vous abandonner\nla mission?\n", + /*157*/ "Joanna Cuir\n", + /*158*/ "Joanna N馮ociatrice\n", + /*159*/ "Elvis (gilet)\n", + /*160*/ "Erreur\n", + /*161*/ "Op駻. impossible.\nUtilisation en cours.\n", + /*162*/ "Annuler\n", + /*163*/ "Limite temps:\n", + /*164*/ "Limite score:\n", + /*165*/ "Limite score 駲uipe:\n", + /*166*/ "Challenge r騏ssi!\n", + /*167*/ "Challenge 馗hou!\n", + /*168*/ "Challenge trich!\n", + /*169*/ "Sous-titres cin饅n", + /*170*/ "Sous-titres jeu\n", + /*171*/ "Ecran titre optionnel\n", + /*172*/ "Commencer Challenge\n", + /*173*/ "Enqu黎e dataDyne", + /*174*/ "Erreur\n", + /*175*/ "Le Controller Pak\na 騁 enlev.\n", + /*176*/ "Tentative r駱aration\n", + /*177*/ "Tenter une\nr駱aration du\nController Pak?\n", + /*178*/ "Donn馥 黎re\nperdue!\n", + /*179*/ "Annuler\n", + /*180*/ "R駱arer\n", + /*181*/ "R駱aration r騏ssie\n", + /*182*/ "Controller Pak\nr駱ar.\n", + /*183*/ "R駱aration 馗hou馥\n", + /*184*/ "Controller Pak\nne peut 黎re r駱ar.\nSauvegarde ou\nchargement impossible\navec ce Cont. Pak.\n", + /*185*/ "Handicap\n", + /*186*/ "BOUTONS L/R: ", + /*187*/ "BOUTON C HAUT: ", + /*188*/ "BOUTONS C G/D: ", + /*189*/ "BOUTON C BAS: ", + /*190*/ "BOUTON A: ", + /*191*/ "BOUTON B: ", + /*192*/ "STICK ANALOG.: ", + /*193*/ "BOUTON Z: ", + /*194*/ "MANETTE +: ", + /*195*/ "VISER", + /*196*/ "ALT. VISER", + /*197*/ "REGARDER HAUT", + /*198*/ "REGARDER BAS", + /*199*/ "REGARDER BAS", + /*200*/ "REGARDER HAUT", + /*201*/ "AVANT", + /*202*/ "ARRIERE", + /*203*/ "DEP. LATERAL", + /*204*/ "ARME", + /*205*/ "ACTION/RECHARGER", + /*206*/ "FEU", + /*207*/ "MARCHER/TOURNER", + /*208*/ "REGARDER", + /*209*/ "MARCHER/LATERAL", + /*210*/ "REGARDER/LATERAL", + /*211*/ "COMME BOUTONS C", + /*212*/ "MAnette 1:", + /*213*/ "Manette 2:", + /*214*/ "Style contrle %s %s\n", + /*215*/ "(Une main)", + /*216*/ "(Deux mains)", + /*217*/ "Maintenir bouton d'arme pour menu rapide.\nMaintenir action pour autre fonction.\nAction+Feu pour changer de fonction.\nViser pour plus de pr馗ision.\nViser + Bouton C Bas pour s'accroupir.\nViser + Bouton C Haut pour se lever.\n", + /*218*/ "D駸activer toutes les triches\n", + /*219*/ "Filtre langage\n", + /*220*/ "UTILISATEUR:\n", + /*221*/ "MOT DE PASSE:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choix param鑼res:\n", + /*224*/ "Vit. r饌ction ennemis:\n", + /*225*/ "Vie ennemis:\n", + /*226*/ "D馮穰s ennemis:\n", + /*227*/ "Pr馗ision ennemis:\n", + /*228*/ "OK\n", + /*229*/ "Annuler\n", + /*230*/ "Controller Pak introuvable\n", + /*231*/ "Nom:\n", + /*232*/ "Emplacement:\n", + /*233*/ "Dupliquer nom fichier\n", + /*234*/ "contient d駛濬n", + /*235*/ "un fichier nomm饅n", + /*236*/ "Renommer fichier\n", + /*237*/ "Changer emplacement\n", + /*238*/ "Annuler\n", + /*239*/ "Changer nom fichier\n", + /*240*/ "Nouveau nom fichier:\n", + /*241*/ " Le fichier en copie\nne peut 黎re effac.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Temps sp馗ial:\n", + /*244*/ "Nouvelle triche disponible:\n", + /*245*/ "Continuer\n", + /*246*/ "Recommencer dernier niveau\n", + /*247*/ "Sauver joueur\n", + /*248*/ "Sauver nouveau joueur\net stats?\n", + /*249*/ "Sauver maintenant\n", + /*250*/ "Non merci!\n", + /*251*/ "Confirmer nom joueur:\n", + /*252*/ "Le fichier sauv饅na 騁 effac:\ncorrupu ou\nendommag.\n", + /*253*/ "Continuer\n", + /*254*/ "Erreur\n", + /*255*/ "Cartouche Game Boy illisible.\nV駻ifier connexions et s'assurer\nque la bonne cartouche est\nutilis馥.\n", + /*256*/ "Annuler\n", + /*257*/ "Erreur\n", + /*258*/ "La sauvegarde a 騁饅n", + /*259*/ "effac馥: corrompue\n", + /*260*/ "ou endommag馥.\n", + /*261*/ "Annuler\n", + /*262*/ "Choix de langue:\n", + /*263*/ "English\n", + /*264*/ "Fran軋is\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "American\n", + /*269*/ "Langue:\n", + /*270*/ "Langue\n", + /*271*/ "Style contrle\n", + /*272*/ "Vis馥 inv.\n", + /*273*/ "Voir droit\n", + /*274*/ "Vue t黎e\n", + /*275*/ "Vis馥 auto\n", + /*276*/ "Contrle cible\n", + /*277*/ "Fixe\n", + /*278*/ "Alt.\n", + /*279*/ "Sous-titres cin饅n", + /*280*/ "Sous-titres jeu\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_g.c b/src/files/lang/pal-final/mpweapons_str_g.c new file mode 100644 index 000000000..1c60de014 --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_g.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shat den\nData Uplink\n", + /* 1*/ "%shat den\nAktenkoffer\n", + /* 2*/ "%shat den Koffer von %s\n", + /* 3*/ "%shat unseren\nAktenkoffer\n", + /* 4*/ "Aktenkoffer von %s geschnappt\n", + /* 5*/ "Sie haben den\nAktenkoffer von %s geschnappt.\n", + /* 6*/ "%shat unseren\nAktenkoffer geschnappt.\n", + /* 7*/ "%shat den\nAktenkoffer von %s geschnappt.\n", + /* 8*/ "Wieviel ist Ihnen das Leben wert?\n", + /* 9*/ "Sie sollten Ihr Team nicht\n", + /* 10*/ "angreifen!\n", + /* 11*/ "Gut gemacht!\n", + /* 12*/ "Einer weniger!\n", + /* 13*/ "Ist Ihnen das Leben noch immer etwas wert?\n", + /* 14*/ "Sie sind das Opfer!\n", + /* 15*/ "Beschtzen Sie %s!\n", + /* 16*/ "Schnappen Sie %s!\n", + /* 17*/ "Download erfolgreich.\n", + /* 18*/ "Verbindung abgebrochen.\n", + /* 19*/ "Download gestartet.\n", + /* 20*/ "Sie mssen den Data Uplink einsetzen.\n", + /* 21*/ "Herr des\nHgels!\n", + /* 22*/ "Der Hgel\nist unser!\n", + /* 23*/ "%shat den Hgel\nerobert!\n", + /* 24*/ "%ds/Punkt\n", + /* 25*/ "1 Punkt!\n", + /* 26*/ "Kein Schild\n", + /* 27*/ "Auto\n", + /* 28*/ "Raketenw.\n", + /* 29*/ "Simulanten\n", + /* 30*/ "Herr des Hgels\n", + /* 31*/ "Weitsicht\n", + /* 32*/ "Der Koffer 1\n", + /* 33*/ "Hchste Vorsicht\n", + /* 34*/ "Der Koffer 2\n", + /* 35*/ "Tarnung\n", + /* 36*/ "Sprengs.\n", + /* 37*/ "Slayer\n", + /* 38*/ "B-Gewehr\n", + /* 39*/ "Zeitlupe\n", + /* 40*/ "Drcken Sie START\n", + /* 41*/ "Pause\n", + /* 42*/ "individuell\n", + /* 43*/ "zuf舁lig\n", + /* 44*/ "Fnf Zuf.\n", + /* 45*/ "Nahkampf\n", + /* 46*/ "A-Mine\n", + /* 47*/ "Raketenw.\n", + /* 48*/ "Granatw.\n", + /* 49*/ "Sprengs.\n", + /* 50*/ "G-Magnum\n", + /* 51*/ "Schwere\n", + /* 52*/ "Bet.-Gewehr\n", + /* 53*/ "Fernsicht\n", + /* 54*/ "Power\n", + /* 55*/ "Autom.\n", + /* 56*/ "Pistolen\n", + /* 57*/ "Test\n", + /* 58*/ "4 MB-Test\n", + /* 59*/ "Nichts\n", + /* 60*/ "Schild\n", + /* 61*/ "Nicht belegt\n", + /* 62*/ "Alle Ziele erreicht\n", + /* 63*/ "Unbekannt\n", + /* 64*/ "Vermisst\n", + /* 65*/ "Contr.-Pak besch臈igt\n", + /* 66*/ "ist besch臈igt oder\n", + /* 67*/ "nicht korrekt eingelegt.\n", + /* 68*/ "Schaden beheben\n", + /* 69*/ "Nochmals versuchen\n", + /* 70*/ "Ohne Controller Pak \nfortfahren\n", + /* 71*/ "Controller Pak ist voll\n", + /* 72*/ "ist zu voll, um zu \nspeichern - Es werden 28 \nfreie Seiten bentigt.\n", + /* 73*/ "Schaffe im Controller Pak \nMen ausreichend Platz. \n(Halte w臧rend des Einschaltens \nSTART gedrckt.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane-Faust\n", + /* 77*/ "Tarnkappe\n", + /* 78*/ "Unbesiegbar\n", + /* 79*/ "Alle Waffen verfgbar\n", + /* 80*/ "Unbegrenzte Munition\n", + /* 81*/ "Unbegrenzte Munition, kein Nachladen\n", + /* 82*/ "Zeitlupen-Modus\n", + /* 83*/ "DK-Modus\n", + /* 84*/ "Trents Magnum\n", + /* 85*/ "Fernsicht\n", + /* 86*/ "Mini-Jo\n", + /* 87*/ "Kleine Charaktere\n", + /* 88*/ "Feinde mit Schild\n", + /* 89*/ "Jo mit Schild\n", + /* 90*/ "Super-Schild\n", + /* 91*/ "Klassische Sicht\n", + /* 92*/ "Nur Kpfe des Teams\n", + /* 93*/ "Elvis\n", + /* 94*/ "Feinde mit Raketen\n", + /* 95*/ "Unbegr. Muni fr Selbstschuss-Anlage\n", + /* 96*/ "Marquis of Queensbury-Regeln\n", + /* 97*/ "Perfekte Dunkelheit\n", + /* 98*/ "Boxer\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Munitions-Fundorte\n", + /*103*/ "Raketenw.\n", + /*104*/ "Sniper-Gewehr\n", + /*105*/ "Rntgen-Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop-Gewehr\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis-Gewehr\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KLO1313\n", + /*113*/ "KF7 Spezial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Waffen\n", + /*122*/ "Kumpel\n", + /*123*/ "Waffen fr Jo im Solo-Modus\n", + /*124*/ "Klassische Waffe fr Jo im Solo-Modus\n", + /*125*/ "dataDyne ワberlauf", + /*126*/ "dataDyne Extraktion", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rettung", + /*129*/ "A51 Flucht", + /*130*/ "Schwierigkeit:\n", + /*131*/ "Cheat Solo Missionen\n", + /*132*/ "Cheat Kampf-Simulator\n", + /*133*/ "Cheat Teamwork\n", + /*134*/ "Cheat Counter Operative-Modus\n", + /*135*/ "Entehrt\n", + /*136*/ "Gecheated\n", + /*137*/ "Cheat verfgbar", + /*138*/ "Komplettierung", + /*139*/ "fr den Cheat:", + /*140*/ "auf", + /*141*/ "in weniger als ", + /*142*/ " oder legen Sie Perfect Dark - Game Boy (R) in das Transfer Pak (TM) ein. Legen Sie ein Transfer Pak in einen beliebigen Controller ein, und gehen Sie ins Men.", + /*143*/ "W臧len Sie den Cheat fr mehr Infos aus.\n", + /*144*/ "Kumpel verfgbar", + /*145*/ "Erlangen Sie Gold am Schie゚stand, um klassische Waffen anzuw臧len.\n", + /*146*/ "Display\n", + /*147*/ "Ziel\n", + /*148*/ "Zoom\n", + /*149*/ "Munition\n", + /*150*/ "Funktion\n", + /*151*/ "Paintball\n", + /*152*/ "Text\n", + /*153*/ "Zeit\n", + /*154*/ "Sound\n", + /*155*/ "Split\n", + /*156*/ "Mchten Sie die Mission\nabbrechen?\n", + /*157*/ "Joanna in Leder\n", + /*158*/ "Joanna als Unterh舅dler\n", + /*159*/ "Elvis (Weste)\n", + /*160*/ "Error\n", + /*161*/ "File ist aktiv. Aktive \nFiles knnen nicht \ngelscht werden.\n", + /*162*/ "Abbrechen\n", + /*163*/ "Zeit-Limit:\n", + /*164*/ "Score-Limit:\n", + /*165*/ "Team Score-Limit:\n", + /*166*/ "Abgeschlossen!\n", + /*167*/ "Fehlgeschlagen!\n", + /*168*/ "CHEATER!\n", + /*169*/ "Cutscene Untertitel\n", + /*170*/ "In-Game Untertitel\n", + /*171*/ "Alternativer Titelbildschirm\n", + /*172*/ "Challenge beginnen\n", + /*173*/ "dataDyne Untersuchung", + /*174*/ "Error\n", + /*175*/ "Das Controller Pak \nwurde entfernt.\n", + /*176*/ "Schaden beheben\n", + /*177*/ "Sind Sie sicher, dass \nSie das Controller Pak \nreparieren wollen)\n", + /*178*/ "Datenverlust\nmglich!\n", + /*179*/ "Abbruch\n", + /*180*/ "Reparatur\n", + /*181*/ "Reparatur erfolgreich\n", + /*182*/ "Das Controller Pak \nwurde repariert.\n", + /*183*/ "Reparatur nicht OK\n", + /*184*/ "Das Controller Pak \nkann nicht repariert\nwerden. Sie knnen\nkeine Daten laden \noder speichern.\n", + /*185*/ "Handicaps\n", + /*186*/ "L/R-TASTEN: ", + /*187*/ "C OBEN: ", + /*188*/ "C LINKS/RECHTS: ", + /*189*/ "C UNEN: ", + /*190*/ "A: ", + /*191*/ "B: ", + /*192*/ "3D-STICK: ", + /*193*/ "Z: ", + /*194*/ "+ STEUERKREUZ: ", + /*195*/ "ZIELEN", + /*196*/ "ZIELFUNKTION", + /*197*/ "BLICK OBEN", + /*198*/ "BLICK UNTEN", + /*199*/ "NACH UNTEN SCHAUEN", + /*200*/ "BLICK OBEN", + /*201*/ "VORWトRTS", + /*202*/ "RワCKWトRTS", + /*203*/ "AUSW.", + /*204*/ "WAFFE", + /*205*/ "AKTION/NACHLADEN", + /*206*/ "FEUER", + /*207*/ "GEHEN/DREHEN", + /*208*/ "UMSCHAUEN", + /*209*/ "GEHEN/AUSW.", + /*210*/ "UMSCHAUEN/AUSW.", + /*211*/ "WIE C-KNヨPFE", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Steuerungsart %s %s\n", + /*215*/ "(Einh舅dig)", + /*216*/ "(Beidh舅dig)", + /*217*/ "'Waffe' gedrckt halten = Quick-Men\n'Aktions' gedrckt halten = 2. Funktion\nAktion+Feuer 舅dert die Funktion kurz\nZielfunktion = manuelles Zielen\nZielen + C-Knopf unten = kriechen.\nZielen + C-Knopf oben = aufstehen.\n", + /*218*/ "Alle Cheats deaktivieren\n", + /*219*/ "Sprachfilter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORT:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Einstellungen w臧len:\n", + /*224*/ "Gegnerische Reaktion:\n", + /*225*/ "Gegnerische Energie:\n", + /*226*/ "Schaden durch Gegner:\n", + /*227*/ "Gegnerische Genauigkeit:\n", + /*228*/ "OK\n", + /*229*/ "Abbruch\n", + /*230*/ "Controller Pak wurde nicht gefunden\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "File Name duplizieren\n", + /*234*/ "beinhaltet bereits\n", + /*235*/ "ein File namens\n", + /*236*/ "File umbenennen\n", + /*237*/ "Location wechseln\n", + /*238*/ "Abbruch\n", + /*239*/ "File Namen 舅dern\n", + /*240*/ "Neuen Namen eingeben:\n", + /*241*/ "Das zu kopierende File \nkann nicht gelscht werden.\n", + /*242*/ "SchockSim:%d\n", + /*243*/ "Maximale Zeit:\n", + /*244*/ "Neuer Cheat verfgbar!\n", + /*245*/ "Weiter\n", + /*246*/ "Letzten Level wiederholen\n", + /*247*/ "Spieler speichern\n", + /*248*/ "Neuen Spieler und \nWerte speichern?\n", + /*249*/ "Speichern\n", + /*250*/ "Nein Danke!\n", + /*251*/ "Spielernamen best舩igen:\n", + /*252*/ "Das gespeicherte File wurde \naufgrund von besch臈igten Daten \noder Hardware-Sch臈en \ngelscht.\n", + /*253*/ "Weiter\n", + /*254*/ "Error\n", + /*255*/ "Game Boy-Modul kann nicht gelesen werden.\nBitte berprfen Sie, ob\ndas richtige Game Boy-Modul\neingelegt ist.\n", + /*256*/ "Abbruch\n", + /*257*/ "Error\n", + /*258*/ "Die gespeicherten Daten\n", + /*259*/ "wurden aufgrund einer\n", + /*260*/ "Besch臈igung gelscht.\n", + /*261*/ "Abbruch\n", + /*262*/ "W臧len Sie die Sprache:\n", + /*263*/ "Englisch\n", + /*264*/ "Franzsisch\n", + /*265*/ "Deutsch\n", + /*266*/ "Italienisch\n", + /*267*/ "Spanisch\n", + /*268*/ "Amerikanisch\n", + /*269*/ "Sprache:\n", + /*270*/ "Sprache\n", + /*271*/ "Steuerung\n", + /*272*/ "Blickrichtung\n", + /*273*/ "Geradeaus\n", + /*274*/ "Kopfbewegung\n", + /*275*/ "Auto-Visier\n", + /*276*/ "Fadenkreuz\n", + /*277*/ "Halten\n", + /*278*/ "Umsch.\n", + /*279*/ "Cutscene Untertitel\n", + /*280*/ "In-Game Untertitel\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_i.c b/src/files/lang/pal-final/mpweapons_str_i.c new file mode 100644 index 000000000..08b885cfa --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_i.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%sha il\nConnettore Dati\n", + /* 1*/ "%sha la\ncartella\n", + /* 2*/ "%sha la cartella di %s\n", + /* 3*/ "%sha la nostra\ncartella\n", + /* 4*/ "Presa la cartella di %s\n", + /* 5*/ "Hai preso la\ncartella di %s\n", + /* 6*/ "%s ha preso la nostra\ncartella\n", + /* 7*/ "%s ha preso la\ncartella di %s\n", + /* 8*/ "Un punto per la resistenza!\n", + /* 9*/ "Dovresti aver cura\n", + /* 10*/ "dei tuoi amici!\n", + /* 11*/ "Ben fatto!\n", + /* 12*/ "Libero!\n", + /* 13*/ "Due punti ...\n", + /* 14*/ "Sei la vittima!\n", + /* 15*/ "Proteggi %s!\n", + /* 16*/ "Prendi %s!\n", + /* 17*/ "Scaricamento avvenuto.\n", + /* 18*/ "Connessione fallita.\n", + /* 19*/ "Avvio scaricamento.\n", + /* 20*/ "Devi usare il Connettore Dati.\n", + /* 21*/ "Re \ndel colle!\n", + /* 22*/ "Abbiamo\nil colle!\n", + /* 23*/ "%sha preso\nil colle!\n", + /* 24*/ "%ds/punto\n", + /* 25*/ "Un punto!\n", + /* 26*/ "Niente scudo\n", + /* 27*/ "Automatica\n", + /* 28*/ "Lanciamissili\n", + /* 29*/ "Replicanti\n", + /* 30*/ "Re del Colle\n", + /* 31*/ "TeleVista complessa\n", + /* 32*/ "Prendi la cartella\n", + /* 33*/ "Un-colpo-e-sei-morto\n", + /* 34*/ "Prendi la cassa\n", + /* 35*/ "Mimesi\n", + /* 36*/ "Esplosivi tempio\n", + /* 37*/ "Killer\n", + /* 38*/ "Sedativo\n", + /* 39*/ "Al rallentatore\n", + /* 40*/ "Premi START\n", + /* 41*/ "In pausa\n", + /* 42*/ "Personale\n", + /* 43*/ "A caso\n", + /* 44*/ "5 a caso\n", + /* 45*/ "Lotta\n", + /* 46*/ "Mina pross.\n", + /* 47*/ "Lanciamissili\n", + /* 48*/ "Lanciagran.\n", + /* 49*/ "Esplosivo\n", + /* 50*/ "Magnum Oro\n", + /* 51*/ "Pesante\n", + /* 52*/ "Sedativo\n", + /* 53*/ "TeleVista\n", + /* 54*/ "Power\n", + /* 55*/ "Automatico\n", + /* 56*/ "Pistole\n", + /* 57*/ "Prova\n", + /* 58*/ "Prova 4mb\n", + /* 59*/ "Niente\n", + /* 60*/ "Scudo\n", + /* 61*/ "Disattivato\n", + /* 62*/ "Obiettivi raggiunti\n", + /* 63*/ "Sconosciuto\n", + /* 64*/ "Mancante\n", + /* 65*/ "Controller Pak difettoso\n", + /* 66*/ "ネ danneggiato o \n", + /* 67*/ "inserito male.\n", + /* 68*/ "Sistemalo\n", + /* 69*/ "Riprova\n", + /* 70*/ "Continua senza\nController Pak\n", + /* 71*/ "Controller Pak pieno\n", + /* 72*/ "Memoria esaurita,\nimpossibile salvare.\n", + /* 73*/ "Accedi al menu\nController Pak per\nliberare spazio - premi\nSTART all'avvio del gioco.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Pugni uragano\n", + /* 77*/ "Dispositivo mimetico\n", + /* 78*/ "Invulnerabile\n", + /* 79*/ "Tutte le armi per missioni individuali\n", + /* 80*/ "Munizioni illimitate\n", + /* 81*/ "Munizioni illimitate, senza ricarica\n", + /* 82*/ "Un giocatore al rallentatore \n", + /* 83*/ "Modalit DK\n", + /* 84*/ "Magnum di Trent\n", + /* 85*/ "TeleVista\n", + /* 86*/ "Jo Piccola\n", + /* 87*/ "Personaggi piccoli\n", + /* 88*/ "Scudi nemici\n", + /* 89*/ "Scudo di Jo\n", + /* 90*/ "SuperScudo\n", + /* 91*/ "Vista classica\n", + /* 92*/ "Solo capi squadra\n", + /* 93*/ "Gioca come Elvis\n", + /* 94*/ "Missili nemici\n", + /* 95*/ "Munizioni illimitate - Pistola Laptop Sentinella\n", + /* 96*/ "Regole del Marchese di Queensbury\n", + /* 97*/ "BuioPerfect\n", + /* 98*/ "Pugile\n", + /* 99*/ "Colpo\n", + /*100*/ "Toccata e fuga\n", + /*101*/ "Alieno\n", + /*102*/ "Puntatore R/Disposizione armi nascoste\n", + /*103*/ "Lanciamissili\n", + /*104*/ "Fucile cecchino\n", + /*105*/ "Scanner a raggi X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Pistola Laptop\n", + /*108*/ "Phoenix\n", + /*109*/ "PsicoArma\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Divertimento\n", + /*120*/ "Gioco\n", + /*121*/ "Armi\n", + /*122*/ "Amici\n", + /*123*/ "Armi per Jo da sola\n", + /*124*/ "Armi classiche per Jo da sola\n", + /*125*/ "Ribellione dD", + /*126*/ "Salvataggio dD", + /*127*/ "Infiltrazione A51", + /*128*/ "Salvataggio A51", + /*129*/ "Fuga A51", + /*130*/ "Difficolt:\n", + /*131*/ "Trucco Missioni Individuali\n", + /*132*/ "Trucco Simulatore Lotta\n", + /*133*/ "Trucco Collaborazione\n", + /*134*/ "Trucco Tutti-contro-Tutti\n", + /*135*/ "Disonore\n", + /*136*/ "Truccata\n", + /*137*/ "Trucco disponibile", + /*138*/ "Completa", + /*139*/ "per trucco:", + /*140*/ "con", + /*141*/ "in meno di", + /*142*/ " o inserisci Perfect Dark Game Boy (r) nel Transfer Pak (tm), connetti il Transfer Pak ad un Controller, esci e accedi al menu", + /*143*/ "Seleziona trucco per informazioni\n", + /*144*/ "Amico disponibile", + /*145*/ "Vinci medaglie d'oro al poligono per attivare le pistole classiche.\n", + /*146*/ "Vista su schermo\n", + /*147*/ "Obiettivo\n", + /*148*/ "Area Zoom\n", + /*149*/ "Munizioni\n", + /*150*/ "Funzioni arma\n", + /*151*/ "Macchia colorata\n", + /*152*/ "Didascalie\n", + /*153*/ "Tempo Missione\n", + /*154*/ "Modalit濬n", + /*155*/ "Dividi\n", + /*156*/ "Vuoi interrompere\nla missione?\n", + /*157*/ "Pelle Joanna\n", + /*158*/ "Negoziatore Joanna\n", + /*159*/ "Gilet Elvis\n", + /*160*/ "Errore\n", + /*161*/ "Impossibile eliminare\nfile in uso.\n", + /*162*/ "Annulla\n", + /*163*/ "Lim. tempo:\n", + /*164*/ "Lim. punti:\n", + /*165*/ "Lim. punti squadra:\n", + /*166*/ "Sfida compiuta!\n", + /*167*/ "Sfida fallita!\n", + /*168*/ "Sfida truccata!\n", + /*169*/ "Didascalie film\n", + /*170*/ "Didascalie nel gioco\n", + /*171*/ "Schermo alternativo titolo\n", + /*172*/ "Inizia sfida\n", + /*173*/ "Indagine dataDyne", + /*174*/ "Errore\n", + /*175*/ "Il Controller Pak\n stato tolto.\n", + /*176*/ "Sistemalo\n", + /*177*/ "Sicuro di voler\nsistemare il\nController Pak?\n", + /*178*/ "Potresti perdere i dati!\n", + /*179*/ "Annulla\n", + /*180*/ "Sistema\n", + /*181*/ "Ci sei riuscito!\n", + /*182*/ "Il Controller Pak\n stato sistemato.\n", + /*183*/ "Non ci sei riuscito.\n", + /*184*/ "Impossibile sistemare\nil Controller Pak:\nimpossibile caricare\no salvare su questo\nController Pak.\n", + /*185*/ "Svantaggio giocatore\n", + /*186*/ "PULSANTI L/R: ", + /*187*/ "PULSANTE C SU: ", + /*188*/ "PULSANTI C DX/SX: ", + /*189*/ "PULSANTE C GIル: ", + /*190*/ "PULSANTE A: ", + /*191*/ "PULSANTE B: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "PULSANTE Z: ", + /*194*/ "PULSANTIERA +: ", + /*195*/ "MIRA", + /*196*/ "DIS/ATTIVA MIRA", + /*197*/ "GUARDA SU", + /*198*/ "GUARDA GIル", + /*199*/ "GUARDA GIル", + /*200*/ "GUARDA SU", + /*201*/ "AVANTI", + /*202*/ "INDIETRO", + /*203*/ "SPOSTATI", + /*204*/ "ARMA", + /*205*/ "AZIONE/RICARICA", + /*206*/ "FUOCO", + /*207*/ "VAI/GIRA", + /*208*/ "GUARDA", + /*209*/ "VAI/SPOSTATI", + /*210*/ "VAI/SPOSTATI", + /*211*/ "COME PULSANTI C", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Modalit comandi %s %s\n", + /*215*/ "(una mano)", + /*216*/ "(due mani)", + /*217*/ "Tieni premuto ARMA per menu rapido.\nTieni premuto AZIONE per dis/attivare.\nAZIONE+FUOCO per cambiare funzioni.\nCon MIRA puoi mirare accuratamente.\nMIRA + C GIル per accucciarti.\nMIRA + C SU per alzarti.\n", + /*218*/ "Disattiva i trucchi\n", + /*219*/ "Filtro lingua\n", + /*220*/ "NOME UTENTE:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Scegli impostaz.:\n", + /*224*/ "Velocit reazione nemico:\n", + /*225*/ "Salute nemico:\n", + /*226*/ "Danno nemico:\n", + /*227*/ "Precisione nemico:\n", + /*228*/ "OK\n", + /*229*/ "Annulla\n", + /*230*/ "Controller Pak assente\n", + /*231*/ "Nome:\n", + /*232*/ "Dove:\n", + /*233*/ "Copia nome file\n", + /*234*/ "contiene gi un\n", + /*235*/ "file di nome\n", + /*236*/ "Rinomina file\n", + /*237*/ "Cambia posto\n", + /*238*/ "Annulla\n", + /*239*/ "Cambia nome file\n", + /*240*/ "Digita nuovo nome:\n", + /*241*/ "Il file che stai copiando\nnon pu essere cancellato.\n", + /*242*/ "RepShock:%d\n", + /*243*/ "Tempo-obiettivo:\n", + /*244*/ "Nuovo trucco disponibile!:\n", + /*245*/ "Continua\n", + /*246*/ "Replay ultimo livello\n", + /*247*/ "Salva giocatore\n", + /*248*/ "Salva nuovo giocatore\ne statistiche?\n", + /*249*/ "Salva!\n", + /*250*/ "Non salvare!\n", + /*251*/ "Conferma nome giocatore:\n", + /*252*/ "Il file in memoria\n stato cancellato\na causa di un errore.\n", + /*253*/ "Continua\n", + /*254*/ "Errore\n", + /*255*/ "Impossibile leggere la cassetta\ndi gioco Game Boy. Controlla le\nconnessioni e assicurati che si\ntratti della cassetta giusta.\n", + /*256*/ "Annulla\n", + /*257*/ "Errore\n", + /*258*/ "I dati in memoria\n", + /*259*/ "sono stati eliminati\n", + /*260*/ "perch danneggiati.\n", + /*261*/ "Annulla\n", + /*262*/ "Scegli la lingua:\n", + /*263*/ "Inglese\n", + /*264*/ "Francese\n", + /*265*/ "Tedesco\n", + /*266*/ "Italiano\n", + /*267*/ "Spagnolo\n", + /*268*/ "Americano\n", + /*269*/ "Lingua:\n", + /*270*/ "Lingua\n", + /*271*/ "Modalit comandi\n", + /*272*/ "Inv. punto vista\n", + /*273*/ "Vista in avanti\n", + /*274*/ "Rotazione testa\n", + /*275*/ "Mira automatica\n", + /*276*/ "Mirino\n", + /*277*/ "Tieni premuto\n", + /*278*/ "Dis/Attiva\n", + /*279*/ "Didascalie film\n", + /*280*/ "Didascalie nel gioco\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_s.c b/src/files/lang/pal-final/mpweapons_str_s.c new file mode 100644 index 000000000..14d747c64 --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_s.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%stiene el\nC. de Datos\n", + /* 1*/ "%stiene el\nMaletn\n", + /* 2*/ "%stiene el Maletn de %s\n", + /* 3*/ "%stiene nuestro Maletn\n", + /* 4*/ "Atrapaste el Maletn\nde %s\n", + /* 5*/ "Has capturado el\nMaletn de %s\n", + /* 6*/ "%sha capturado\nnuestro Maletn\n", + /* 7*/ "%sha capturado\nel Maletn de %s\n", + /* 8*/ "。Un punto por sobrevivir!\n", + /* 9*/ "。Se supone que debes\n", + /* 10*/ "proteger a tus amigos!\n", + /* 11*/ "。Bien hecho!\n", + /* 12*/ "。T la llevas!\n", + /* 13*/ "Obtienes 2 Puntos...\n", + /* 14*/ "。Eres la vctima!\n", + /* 15*/ "。Protege a\n%s!\n", + /* 16*/ "。Coge a\n%s!\n", + /* 17*/ "Descarga completada.\n", + /* 18*/ "Conexin perdida.\n", + /* 19*/ "Comenzando descarga.\n", + /* 20*/ "Necesitas usar el Conector de Datos.\n", + /* 21*/ "。Rey de\nla Colina!\n", + /* 22*/ "。Tenemos\nla Colina!\n", + /* 23*/ "。%sha capturado\nla Colina!\n", + /* 24*/ "%ds/Punto\n", + /* 25*/ "。1 Punto!\n", + /* 26*/ "Sin Escudo\n", + /* 27*/ "Autom疸icas\n", + /* 28*/ "Lanzacohetes\n", + /* 29*/ "Simulantes\n", + /* 30*/ "Rey de la Colina\n", + /* 31*/ "Complejo FarSight\n", + /* 32*/ "Mant駭 el Maletn\n", + /* 33*/ "Mata de Un Tiro\n", + /* 34*/ "Captura el Maletn\n", + /* 35*/ "Ocultacin\n", + /* 36*/ "Explosivos Templo\n", + /* 37*/ "Asesino\n", + /* 38*/ "Tranquilizante\n", + /* 39*/ "C疥ara Lenta\n", + /* 40*/ "Pulsa START\n", + /* 41*/ "Pausa\n", + /* 42*/ "Personalizado\n", + /* 43*/ "Aleatorio\n", + /* 44*/ "Cinco al Azar\n", + /* 45*/ "Mano a Mano\n", + /* 46*/ "Minas Proxim.\n", + /* 47*/ "Lanzacohetes\n", + /* 48*/ "Lanzagranadas\n", + /* 49*/ "Explosivos\n", + /* 50*/ "Magnum Dorada\n", + /* 51*/ "Armas Pesadas\n", + /* 52*/ "Tranquilizantes\n", + /* 53*/ "FarSight\n", + /* 54*/ "Fuerza Bruta\n", + /* 55*/ "Autom疸icas\n", + /* 56*/ "Pistolas\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Nada\n", + /* 60*/ "Escudo\n", + /* 61*/ "Desactivado\n", + /* 62*/ "Objetivos Completados\n", + /* 63*/ "Desconocido\n", + /* 64*/ "Desaparecido\n", + /* 65*/ "Controller Pak Daado\n", + /* 66*/ "est daado o\n", + /* 67*/ "mal insertado.\n", + /* 68*/ "Intentar Reparar\n", + /* 69*/ "Reintentar\n", + /* 70*/ "Continuar sin usar\nel Controller Pak\n", + /* 71*/ "Controller Pak Lleno\n", + /* 72*/ "Est demasiado lleno. Se\nnecesitan 1 nota y 28\np疊inas para guardar.\n", + /* 73*/ "Entra en el Men del\nController Pak para liberar\nespacio (pulsa START\nmientras enciendes.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Puetazos Hurac疣\n", + /* 77*/ "Dispositivo de Ocultacin\n", + /* 78*/ "Invencible\n", + /* 79*/ "Todas las Armas en Solo\n", + /* 80*/ "Municin Ilimitada\n", + /* 81*/ "Municin Ilimitada sin Recargas\n", + /* 82*/ "Un jugador C疥ara Lenta\n", + /* 83*/ "Modo DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Mini-Joanna\n", + /* 87*/ "Mini-Personajes\n", + /* 88*/ "Escudo de Enemigos\n", + /* 89*/ "Escudo de Joanna\n", + /* 90*/ "Sper Escudo\n", + /* 91*/ "Mirilla Cl疽ica\n", + /* 92*/ "Slo Jefes de Equipo\n", + /* 93*/ "Jugar como Elvis\n", + /* 94*/ "Cohetes Enemigos\n", + /* 95*/ "Municin Ilimitada - Arma PC Centinela\n", + /* 96*/ "Reglas del Marqu駸 de Queensbury\n", + /* 97*/ "Oscuridad Perfecta\n", + /* 98*/ "Pugilista\n", + /* 99*/ "Disparo Caliente\n", + /*100*/ "Golpea y Corre\n", + /*101*/ "Aliengena\n", + /*102*/ "Rastreador/Localizacin de armas\n", + /*103*/ "Lanzacohetes\n", + /*104*/ "Rifle Francotirador\n", + /*105*/ "Esc疣er de Rayos-X\n", + /*106*/ "SuperDragn\n", + /*107*/ "Arma PC\n", + /*108*/ "Phoenix\n", + /*109*/ "Pistola Psicosis\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "Klo1313\n", + /*113*/ "KF7 Especial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Diversin\n", + /*120*/ "Jugabilidad\n", + /*121*/ "Armas\n", + /*122*/ "Compaeros\n", + /*123*/ "Armas para Joanna en Solo\n", + /*124*/ "Armas Cl疽icas para Joanna en Solo\n", + /*125*/ "Entrando en dataDyne", + /*126*/ "Extraccin de dataDyne", + /*127*/ "Infiltracin en A51", + /*128*/ "Rescate en A51", + /*129*/ "Escape de A51", + /*130*/ "Dificultad:\n", + /*131*/ "Trucos en Misiones Solo\n", + /*132*/ "Trucos en Simulador de Combate\n", + /*133*/ "Trucos en Co-operativo\n", + /*134*/ "Trucos en Contra-Operativa\n", + /*135*/ "Sin honor\n", + /*136*/ "Trucada\n", + /*137*/ "Truco disponible", + /*138*/ "Completa", + /*139*/ "para el truco:", + /*140*/ "en", + /*141*/ "por debajo de", + /*142*/ " o inserta Perfect Dark de Game Boy (r) en un Transfer Pak (tm), conecta el Transfer Pak a cualquier mando, y sal y vuelve a entrar en el men", + /*143*/ "Elige truco para m疽 informacin\n", + /*144*/ "Camarada disponible", + /*145*/ "Gana Oros en las pruebas de tiro para activar las armas cl疽icas.\n", + /*146*/ "Mirilla\n", + /*147*/ "Objetivo\n", + /*148*/ "Alcance de Zoom\n", + /*149*/ "Mostrar Municin\n", + /*150*/ "Funcin Arma\n", + /*151*/ "Bolas de Pintura\n", + /*152*/ "Subttulos\n", + /*153*/ "Tiempo Misin\n", + /*154*/ "Modo\n", + /*155*/ "Corte\n", + /*156*/ "ソQuieres interrumpir\nla misin?\n", + /*157*/ "Joanna en Piel\n", + /*158*/ "Joanna Negociadora\n", + /*159*/ "Elvis (Chaleco)\n", + /*160*/ "Error\n", + /*161*/ "No se puede borrar un\nfichero en uso.\n", + /*162*/ "Cancelar\n", + /*163*/ "Lmite Tiempo:\n", + /*164*/ "Lmite Puntos:\n", + /*165*/ "Lmite P. Equipo:\n", + /*166*/ "。Desafo Completado!\n", + /*167*/ "。Desafo Fallado!\n", + /*168*/ "。Desafo Trucado!\n", + /*169*/ "Subttulos en Escenas\n", + /*170*/ "Subttulos en el Juego\n", + /*171*/ "Pantalla de Ttulo Alternativa\n", + /*172*/ "Empezar Desafo\n", + /*173*/ "Investigacin dataDyne", + /*174*/ "Error\n", + /*175*/ "El Controller Pak\nha sido quitado.\n", + /*176*/ "Intentar Reparacin\n", + /*177*/ "ソQuieres intentar\nreparar este\nController Pak?\n", + /*178*/ "。Puedes perder datos!\n", + /*179*/ "Cancelar\n", + /*180*/ "Reparar\n", + /*181*/ "Reparado con ノxito\n", + /*182*/ "El Controller Pak ha\nsido reparado.\n", + /*183*/ "Reparacin Fallada\n", + /*184*/ "El Controller Pak \nno puede ser reparado.\nNo podr疽 cargar o\nguardar en este\nController Pak.\n", + /*185*/ "H疣dicap Jugador\n", + /*186*/ "BOTONES L/R: ", + /*187*/ "BOTモN C ARRIBA: ", + /*188*/ "BOTONES C I./D.: ", + /*189*/ "BOTモN C ABAJO: ", + /*190*/ "BOTモN A: ", + /*191*/ "BOTモN B: ", + /*192*/ "STICK C.: ", + /*193*/ "BモTON Z: ", + /*194*/ "+ PANEL C.: ", + /*195*/ "APUNTAR", + /*196*/ "CAMBIAR A PUNTAR", + /*197*/ "MIRAR ARRIBA", + /*198*/ "MIRAR ABAJO", + /*199*/ "MIRAR ABAJO", + /*200*/ "MIRAR ARRIBA", + /*201*/ "ADELANTE", + /*202*/ "ATRチS", + /*203*/ "DESP. LATERAL", + /*204*/ "ARMA", + /*205*/ "ACCIモN/RECARGA", + /*206*/ "DISPARO", + /*207*/ "CAMINAR/VOLVER", + /*208*/ "MIRAR", + /*209*/ "CAMINAR/DESP.", + /*210*/ "MIRAR/DESP.", + /*211*/ "COMO BOTONES C", + /*212*/ "Mando 1:", + /*213*/ "Mando 2:", + /*214*/ "Estilo de Control %s %s\n", + /*215*/ "(1 Mando)", + /*216*/ "(2 Mandos)", + /*217*/ "Mant駭 Arma para el men r疳ido.\nMant駭 Accin para cambiar funcin.\nAccin+Disparo cambia temp. la funcin.\nApuntar aporta una mayor precisin.\nApuntar + Botn C Abajo te agacha.\nApuntar + Botn C Arriba te levanta.\n", + /*218*/ "Desactiva todos los Trucos\n", + /*219*/ "Filtro de Lenguaje\n", + /*220*/ "USUARIO:\n", + /*221*/ "CLAVE:\n", + /*222*/ "Oscuridad Perfecta\n", + /*223*/ "Elige Opciones:\n", + /*224*/ "Vel. de Reaccin Enemiga:\n", + /*225*/ "Salud del Enemigo:\n", + /*226*/ "Dao del Enemigo:\n", + /*227*/ "Precisin del Enemigo:\n", + /*228*/ "Aceptar\n", + /*229*/ "Cancelar\n", + /*230*/ "Controller Pak No Encontrado\n", + /*231*/ "Nombre:\n", + /*232*/ "Lugar:\n", + /*233*/ "Nombre Duplicado\n", + /*234*/ "ya tiene\n", + /*235*/ "un fichero nombrado\n", + /*236*/ "Renombrar Fichero\n", + /*237*/ "Cambiar Lugar\n", + /*238*/ "Cancelar\n", + /*239*/ "Cambiar Nombre\n", + /*240*/ "Introduce nuevo nombre:\n", + /*241*/ "El fichero que est疽 copiando\nno puede ser borrado.\n", + /*242*/ "SimShock:%d\n", + /*243*/ "Tiempo Requerido:\n", + /*244*/ "。Nuevo Truco Disponible!:\n", + /*245*/ "Continuar\n", + /*246*/ "Volver a Jugar el Nivel\n", + /*247*/ "Guardar Jugador\n", + /*248*/ "ソGuardar nuevo jugador\ny estadsticas?\n", + /*249*/ "Guardar Ahora\n", + /*250*/ "。No, Gracias!\n", + /*251*/ "Confirmar nombre:\n", + /*252*/ "El fichero guardado ha\nsido borrado debido\na datos corruptos\no daados.\n", + /*253*/ "Continuar\n", + /*254*/ "Error\n", + /*255*/ "No se puede acceder al Cartucho de GB.\nComprueba las conexiones y asegrate\nde que est疽 usando el cartucho de\nGame Boy correcto.\n", + /*256*/ "Cancelar\n", + /*257*/ "Error\n", + /*258*/ "Los datos guardados\n", + /*259*/ "han sido borrados\n", + /*260*/ "porque estaban daados.\n", + /*261*/ "Cancelar\n", + /*262*/ "Elige tu idioma:\n", + /*263*/ "Ingl駸\n", + /*264*/ "Franc駸\n", + /*265*/ "Alem疣\n", + /*266*/ "Italiano\n", + /*267*/ "Espaol\n", + /*268*/ "I. Americano\n", + /*269*/ "Idioma:\n", + /*270*/ "Idioma\n", + /*271*/ "Estilo C.\n", + /*272*/ "C. Opuesto\n", + /*273*/ "M. Frente\n", + /*274*/ "G. Cabeza\n", + /*275*/ "Auto-Apun.\n", + /*276*/ "C. Apuntar\n", + /*277*/ "Mant.\n", + /*278*/ "Camb.\n", + /*279*/ "Subt. Escenas\n", + /*280*/ "Subt. Juego\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/oatE.c b/src/files/lang/pal-final/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oatJ.c b/src/files/lang/pal-final/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oatP.c b/src/files/lang/pal-final/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_f.c b/src/files/lang/pal-final/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_g.c b/src/files/lang/pal-final/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_i.c b/src/files/lang/pal-final/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_s.c b/src/files/lang/pal-final/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oldE.c b/src/files/lang/pal-final/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oldJ.c b/src/files/lang/pal-final/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oldP.c b/src/files/lang/pal-final/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_f.c b/src/files/lang/pal-final/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_g.c b/src/files/lang/pal-final/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_i.c b/src/files/lang/pal-final/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_s.c b/src/files/lang/pal-final/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/optionsE.c b/src/files/lang/pal-final/optionsE.c new file mode 100644 index 000000000..5395c7e03 --- /dev/null +++ b/src/files/lang/pal-final/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/optionsJ.c b/src/files/lang/pal-final/optionsJ.c new file mode 100644 index 000000000..4ed3c13c7 --- /dev/null +++ b/src/files/lang/pal-final/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "JAP Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/optionsP.c b/src/files/lang/pal-final/optionsP.c new file mode 100644 index 000000000..5395c7e03 --- /dev/null +++ b/src/files/lang/pal-final/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_f.c b/src/files/lang/pal-final/options_str_f.c new file mode 100644 index 000000000..ae50a4297 --- /dev/null +++ b/src/files/lang/pal-final/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Succ鑚\n", + /* 1*/ "Inachev饅n", + /* 2*/ "Echec\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terre:", + /* 6*/ " pr馼istoire", + /* 7*/ "rare pr駸ente", + /* 8*/ "Rouge\n", + /* 9*/ "Jaune\n", + /* 10*/ "Bleu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Rose\n", + /* 15*/ "Marron\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna imper\n", + /* 18*/ "Joanna Robe\n", + /* 19*/ "Joanna Robe courte\n", + /* 20*/ "Joanna Htesse\n", + /* 21*/ "Joanna Plong馥\n", + /* 22*/ "Joanna Scaphandre\n", + /* 23*/ "Joanna Arctique\n", + /* 24*/ "Joanna Laborantin\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Technicien IC H\n", + /* 34*/ "Technicien IC F\n", + /* 35*/ "Soldat IC\n", + /* 36*/ "Commando dataDyne\n", + /* 37*/ "Femme Garde dataDyne\n", + /* 38*/ "S馗urit dataDyne\n", + /* 39*/ "Infanterie dataDyne\n", + /* 40*/ "Troupes dataDyne\n", + /* 41*/ "Secr騁aire\n", + /* 42*/ "Tenue de Bureau\n", + /* 43*/ "Tenue de Bureau\n", + /* 44*/ "N馮ociateur\n", + /* 45*/ "Sniper dataDyne\n", + /* 46*/ "Garde G5\n", + /* 47*/ "Garde SWAT G5\n", + /* 48*/ "Agent CIA\n", + /* 49*/ "Agent FBI\n", + /* 50*/ "Garde Secteur 51\n", + /* 51*/ "Soldat Secteur 51\n", + /* 52*/ "Pilote\n", + /* 53*/ "Ensemble\n", + /* 54*/ "Garde du Corps NSA\n", + /* 55*/ "Technicien Homme\n", + /* 56*/ "Technicien Femme\n", + /* 57*/ "Technicien dataDyne\n", + /* 58*/ "Bio technicien\n", + /* 59*/ "Garde Alaska\n", + /* 60*/ "Pilote AF One\n", + /* 61*/ "Steward\n", + /* 62*/ "Htesse\n", + /* 63*/ "Chef Htesse\n", + /* 64*/ "Le pr駸ident\n", + /* 65*/ "Groom NSA\n", + /* 66*/ "S馗urit Pr駸ident\n", + /* 67*/ "Clone Pr駸ident\n", + /* 68*/ "Garde Pelagic II\n", + /* 69*/ "Soldat Maian\n", + /* 70*/ "Smoking\n", + /* 71*/ "- Pas de Manette branch馥 dans le port 1 -", + /* 72*/ "Eteindre et brancher une manette", + /* 73*/ "DETECTE", + /* 74*/ "NON DETECTE", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Identification Produit Nintendo 64\n", + /* 78*/ "ID Produit:\n", + /* 79*/ "Code Produit:\n", + /* 80*/ "Variante:\n", + /* 81*/ "D騅eloppeur:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "Le Logo Rareware et Perfect Dark sont des trademarks Rare Ltd.\n", + /* 88*/ "Pr駸ent en Dolby Surround. Dolby et le double-D\nsont des trademarks des laboratoires Dolby.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choisissez votre r饌lit饅n", + /* 97*/ "Nouveau...\n", + /* 98*/ "Nouvel Agent...\n", + /* 99*/ "Fichier\n", + /*100*/ "Copier:\n", + /*101*/ "Effacer:\n", + /*102*/ "Effacer notes de jeu...\n", + /*103*/ "Fichier un joueur agent\n", + /*104*/ "Fichier param鑼res simulateur combat\n", + /*105*/ "Fichier joueur simulateur combat\n", + /*106*/ "Fichier PerfcetHead\n", + /*107*/ "Controller Pak\n", + /*108*/ "Utiliser cet 馘iteur pour effacer les notes de jeu\nde votre Controller Pak.\n", + /*109*/ "Choisir le Controller Pak 馘iter:\n", + /*110*/ "Sortie\n", + /*111*/ "Cartouche\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missions Solo\n", + /*118*/ "Simulateur de Combat\n", + /*119*/ "Coop駻atif\n", + /*120*/ "Contre-Op駻ation\n", + /*121*/ "Cin駑a\n", + /*122*/ "S駘ection Mission\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Missions sp馗iales\n", + /*133*/ "Centre dataDyne", + /*134*/ "- D馭ection", + /*135*/ "Recherche dataDyne", + /*136*/ "- Enqu黎e", + /*137*/ "Centre dataDyne", + /*138*/ "- Extraction", + /*139*/ "Villa Carrington", + /*140*/ "- Otage", + /*141*/ "Chicago", + /*142*/ "- Furtif", + /*143*/ "Immeuble G5", + /*144*/ "- Reconnaissance", + /*145*/ "Secteur 51", + /*146*/ "- Infiltration", + /*147*/ "Secteur 51", + /*148*/ "- Sauvetage", + /*149*/ "Secteur 51", + /*150*/ "- Fuite", + /*151*/ "Base A駻ienne", + /*152*/ "- Espionnage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorisme", + /*155*/ "Site du Crash", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Abysses", + /*160*/ "- Eliminer la menace", + /*161*/ "Institut Carrington", + /*162*/ "- D馭ense", + /*163*/ "Croiseur", + /*164*/ "- Assaut", + /*165*/ "Ruines Skedars", + /*166*/ "- Autel Combat", + /*167*/ "Blonde: la vengeance", + /*168*/ "SOS Maian", + /*169*/ "Sauver l'Institut", + /*170*/ "GUERRE!", + /*171*/ "Le Duel", + /*172*/ "Statut\n", + /*173*/ "Abandonner!\n", + /*174*/ "Attention\n", + /*175*/ "Voulez-vous abandonner la mission?\n", + /*176*/ "Annuler\n", + /*177*/ "Abandonner\n", + /*178*/ "Inventaire\n", + /*179*/ "Armes Disponibles\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Vid駮\n", + /*183*/ "Contrle\n", + /*184*/ "Affichage\n", + /*185*/ "Triche\n", + /*186*/ "Sauvegarder jeu\n", + /*187*/ "Changer d'Agent...\n", + /*188*/ "Attention\n", + /*189*/ "Voulez charger un autre agent?\n", + /*190*/ "Oui\n", + /*191*/ "Non\n", + /*192*/ "Options de contrle\n", + /*193*/ "Contrle Joueur 2\n", + /*194*/ "Style de contrle\n", + /*195*/ "Vis馥 invers馥\n", + /*196*/ "Regard t黎e\n", + /*197*/ "Vue t黎e\n", + /*198*/ "Auto-ciblage\n", + /*199*/ "Contrle cible\n", + /*200*/ "Retour\n", + /*201*/ "Fixe\n", + /*202*/ "Alt.\n", + /*203*/ "Options d'affichage\n", + /*204*/ "Affichage Joueur 2\n", + /*205*/ "Vis馥 sur 馗ran\n", + /*206*/ "Toujours montrer cible\n", + /*207*/ "Montrer port馥 zoom\n", + /*208*/ "Munitions affich馥s\n", + /*209*/ "Montrer fonction arme\n", + /*210*/ "Paintball\n", + /*211*/ "Sous-titre\n", + /*212*/ "Afficher temps mission\n", + /*213*/ "Retour\n", + /*214*/ "Options Vid駮\n", + /*215*/ "Taille 馗ran\n", + /*216*/ "Ratio\n", + /*217*/ "Haute-Res\n", + /*218*/ "Split 馗ran 2 joueurs\n", + /*219*/ "Retour\n", + /*220*/ "Plein\n", + /*221*/ "Large\n", + /*222*/ "Cin駑a\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Options Audio\n", + /*228*/ "Son\n", + /*229*/ "Musique\n", + /*230*/ "Mode Son\n", + /*231*/ "Retour\n", + /*232*/ "Mono", + /*233*/ "St駻駮", + /*234*/ "Casque", + /*235*/ "Surround", + /*236*/ "Contrle\n", + /*237*/ "Simple\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "S駘ection Difficult饅n", + /*249*/ "Difficult饅n", + /*250*/ "Meilleur Temps\n", + /*251*/ "Agent\n", + /*252*/ "Agent Sp馗ial\n", + /*253*/ "Agent Perfect\n", + /*254*/ "Annuler\n", + /*255*/ "Options Coop駻atif\n", + /*256*/ "Radar Actif\n", + /*257*/ "Binme Prot馮饅n", + /*258*/ "Binme Perfect\n", + /*259*/ "Continuer\n", + /*260*/ "Annuler\n", + /*261*/ "Humain", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Options Contre-Op駻ation\n", + /*267*/ "Radar Actif\n", + /*268*/ "Contre-Op駻ation\n", + /*269*/ "Continuer\n", + /*270*/ "Annuler\n", + /*271*/ "Joueur 1", + /*272*/ "Joueur 2", + /*273*/ "Briefing\n", + /*274*/ "Accepter\n", + /*275*/ "Refuser\n", + /*276*/ "Succ鑚\n", + /*277*/ "Echec\n", + /*278*/ "Statut Mission:\n", + /*279*/ "Statut Agent:\n", + /*280*/ "Temps Mission:\n", + /*281*/ "Arme de pr馘ilection:\n", + /*282*/ "Victimes:\n", + /*283*/ "Pr馗ision:\n", + /*284*/ "Total de tirs:\n", + /*285*/ " Tirs T黎e:\n", + /*286*/ " Tirs Corps:\n", + /*287*/ " Tirs Membres:\n", + /*288*/ " Autres:\n", + /*289*/ "Appuyer sur START\n", + /*290*/ "D馗馘饅n", + /*291*/ "Actif\n", + /*292*/ "Suspendu\n", + /*293*/ "Echec\n", + /*294*/ "Termin饅n", + /*295*/ "Abandon\n", + /*296*/ "Recommencer", + /*297*/ "Prochaine Mission", + /*298*/ "Accepter\n", + /*299*/ "Refuser\n", + /*300*/ "Objectifs\n", + /*301*/ "Appuyer sur START\n", + /*302*/ "Menu petit mais Perfect\n", + /*303*/ "Simulateur de Combat\n", + /*304*/ "Entranement\n", + /*305*/ "Audio / Vid駮\n", + /*306*/ "Changer d'Agent\n", + /*307*/ "Audio / Visuel\n", + /*308*/ "Son\n", + /*309*/ "Musique\n", + /*310*/ "Mode Son\n", + /*311*/ "Ratio\n", + /*312*/ "Retour\n", + /*313*/ "< Vide >\n", + /*314*/ "SUP", + /*315*/ "MAJ", + /*316*/ "ANNULER", + /*317*/ "OK", + /*318*/ "Visages de Simulateurs de Combat\n", + /*319*/ "Visages Mission\n", + /*320*/ "Erreur\n", + /*321*/ "Annuler\n", + /*322*/ "Controller Pak\nnon d騁ect.\n", + /*323*/ "Fichier non sauvegard.\n", + /*324*/ "Fichier non chargeable.\n", + /*325*/ "Impossible d'effacer le fichier.\n", + /*326*/ "Plus de m駑oire.\n", + /*327*/ "Ce joueur est d駛濬ncharg pour cette partie.\n", + /*328*/ "a 騁 enlev.\n", + /*329*/ "Controller Pak est d馭ectueux ou mal ins駻.\n", + /*330*/ "Effacement des notes 馗hou.\n", + /*331*/ "Erreur charg. jeu\n", + /*332*/ "Erreur sauv. jeu\n", + /*333*/ "Erreur charg. joueur\n", + /*334*/ "Erreur sauv. joueur\n", + /*335*/ "Erreur chargement PerfectHead\n", + /*336*/ "Erreur sauvegarde PerfectHead\n", + /*337*/ "Erreur de lecture de fichier\n", + /*338*/ "Erreur d'馗riture de fichier\n", + /*339*/ "Erreur\n", + /*340*/ "Echec Effacement\n", + /*341*/ "Impossible d'effacer le fichier.\n", + /*342*/ "- V駻ifier que le Controller Pak est\nins駻 correctement.\n", + /*343*/ "Annuler\n", + /*344*/ "Il n'y a plus de place.\n", + /*345*/ "Cool!\n", + /*346*/ "Fichier sauvegard.\n", + /*347*/ "OK\n", + /*348*/ "Une erreur est survenue\npendant la sauvegarde.\n", + /*349*/ "Essayer encore\n", + /*350*/ "Sauver autre emplacement\n", + /*351*/ "Annuler\n", + /*352*/ "Une erreur est survenue\npendant le chargement.\n", + /*353*/ "Essayer encore\n", + /*354*/ "Annuler\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Sauvegarde\n", + /*360*/ "Voulez-vous\nsauvegarder votre\nfichier ailleurs?\n", + /*361*/ "Oui\n", + /*362*/ "Non\n", + /*363*/ "Ins駻ez le\nController Pak\ncontenant: %s dans une manette.\n", + /*364*/ "Ins駻ez le\nController Pak\nde vos sauvegardes\n dans une manette.\n", + /*365*/ "OK\n", + /*366*/ "Annuler\n", + /*367*/ "Choix emplacement\n", + /*368*/ "Lieu\n", + /*369*/ "Dispo\n", + /*370*/ "Effacer Fichiers...\n", + /*371*/ "Annuler\n", + /*372*/ "Satur", + /*373*/ "Copier fichiers\n", + /*374*/ "Choix fichier copier:\n", + /*375*/ "Bouton B pour sortir.\n", + /*376*/ "Effacer Fichier\n", + /*377*/ "Choix fichier effacer:\n", + /*378*/ "Bouton B pour sortir.\n", + /*379*/ "Attention\n", + /*380*/ "Etes-vous sr de\nvouloir effacer?\n", + /*381*/ "Annuler\n", + /*382*/ "OK\n", + /*383*/ "Effacer Notes\n", + /*384*/ "Etes-vous sr\nde vouloir effacer\nces notes?\n", + /*385*/ "Non\n", + /*386*/ "Oui\n", + /*387*/ "Notes de jeu\n", + /*388*/ "Effacer notes de jeu:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Bouton B pour sortir.\n", + /*392*/ "Vide\n", + /*393*/ "--\n", + /*394*/ "Pages Libres: \n", + /*395*/ "Pages libres: %d\n", + /*396*/ "Pages utilis馥s: \n", + /*397*/ "Pages utilis馥s: %d\n", + /*398*/ "D駛 un fichier Perfect Dark.\n", + /*399*/ "Assez de place pour sauver Perfect Dark.\n", + /*400*/ "Controller Pak trop plein pour sauver: 1 note\net 28 pages requises.\n", + /*401*/ "Entrer Nom Agent\n", + /*402*/ "Nouveau...\n", + /*403*/ "Nouvel Agent...\n", + /*404*/ "Nouvelle Recrue", + /*405*/ "Temps Mission:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Sp馗ial\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - Centre dataDyne\n", + /*439*/ "Mission 2 - Villa Carrington\n", + /*440*/ "Mission 3 - Immeuble G5\n", + /*441*/ "Mission 4 - Secteur 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Institut Carrington\n", + /*445*/ "Mission 8 - Croiseur Skedar\n", + /*446*/ "Mission 9 - Ruines Skedars\n", + /*447*/ "Finale\n", + /*448*/ "Jouer Tous\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Op駻ation Dark\n", + /*451*/ "1:1 Conclusion - Descente rapide\n", + /*452*/ "1:2 Intro - En bas\n", + /*453*/ "1:2 Conclusion - Bonjour docteur\n", + /*454*/ "1:3 Intro - Bonne nuit\n", + /*455*/ "1:3 Conclusion - Tu vas o, toi?\n", + /*456*/ "2:1 Intro - N馮ocie-moi 軋!\n", + /*457*/ "2:1 Intro 2 - A un fil\n", + /*458*/ "2:1 Conclusion - Carrington sauv饅n", + /*459*/ "3:1 Intro - Sombre all馥\n", + /*460*/ "3:1 Conclusion - G5 investi\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Sp馗ial - Conspiration\n", + /*463*/ "3:2 Conclusion - Sortie de secours\n", + /*464*/ "4:1 Intro - Sale vid駮\n", + /*465*/ "4:1 Conclusion - A n馮liger\n", + /*466*/ "4:2 Intro - Perles de sagesse\n", + /*467*/ "4:2 Conclusion - Sous la lame\n", + /*468*/ "4:3 Intro - Gaz!\n", + /*469*/ "4:3 Sp馗ial - R騅eil d'Elvis\n", + /*470*/ "4:3 Conclusion - Fuite\n", + /*471*/ "5:1 Intro - Haute altitude\n", + /*472*/ "5:1 Conclusion - D馗ollage\n", + /*473*/ "5:2 Intro - Derni鑽e chance\n", + /*474*/ "5:2 Sp馗ial - Arrimage\n", + /*475*/ "5:2 Conclusion - Plus de choix\n", + /*476*/ "5:3 Intro - Horizons rouges\n", + /*477*/ "5:3 Conclusion - Monstre blond\n", + /*478*/ "6:1 Intro - Infiltration\n", + /*479*/ "6:1 Conclusion - Profondeurs\n", + /*480*/ "6:2 Intro - Plus profond\n", + /*481*/ "6:2 Sp馗ial - Virus!\n", + /*482*/ "6:2 Conclusion - En arri鑽e!\n", + /*483*/ "7:1 Intro - Salut de victoire\n", + /*484*/ "7:1 Conclusion - Course libert饅n", + /*485*/ "8:1 Intro - Piqu!\n", + /*486*/ "8:1 Conclusion - Des ennuis\n", + /*487*/ "9:1 Intro - Air calme\n", + /*488*/ "9:1 Conclusion - J'te tiens!\n", + /*489*/ "Fin de s駲uence\n", + /*490*/ "Cin駑a\n", + /*491*/ "Occult. %d\n", + /*492*/ "Choisir Cible\n", + /*493*/ "Score de Frags\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_g.c b/src/files/lang/pal-final/options_str_g.c new file mode 100644 index 000000000..e83caad68 --- /dev/null +++ b/src/files/lang/pal-final/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Komplettiert\n", + /* 1*/ "Nicht komplettiert\n", + /* 2*/ "Fehlgeschlagen\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Die Erde:", + /* 6*/ " ...in pr臧istorischer Zeit", + /* 7*/ "Rare pr舖entiert", + /* 8*/ "Rot\n", + /* 9*/ "Gelb\n", + /* 10*/ "Blau\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Braun\n", + /* 16*/ "Joanna im Kampfanzug\n", + /* 17*/ "Joanna im Trenchcoat\n", + /* 18*/ "Joanna im Partykleid\n", + /* 19*/ "Joanna im Kleid (zerrissen)\n", + /* 20*/ "Joanna als Stewardess\n", + /* 21*/ "Joanna im Neoprenanzug\n", + /* 22*/ "Joanna - Tauchger舩\n", + /* 23*/ "Joanna im Polar-Outfit\n", + /* 24*/ "Joanna als Labortechniker\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maianer\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington im Anzug\n", + /* 29*/ "Mr. Blond\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI-Labortechniker m.\n", + /* 34*/ "CI-Labortechniker w.\n", + /* 35*/ "CI-Soldat\n", + /* 36*/ "dataDyne Elitesoldat\n", + /* 37*/ "Weibliche dataDyne Wache\n", + /* 38*/ "dataDyne Security-Mann\n", + /* 39*/ "dataDyne Infanterist\n", + /* 40*/ "dataDyne Soldat\n", + /* 41*/ "Sekret舐in\n", + /* 42*/ "Brokleidung\n", + /* 43*/ "lockere Brokleidung\n", + /* 44*/ "Unterh舅dlerin\n", + /* 45*/ "dataDyne Scharfschtze\n", + /* 46*/ "G5-Wache\n", + /* 47*/ "G5-SWAT-Wache\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Wache\n", + /* 51*/ "Area 51 Soldat\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "M舅nlicher Labortechniker\n", + /* 56*/ "Weiblicher Labortechniker\n", + /* 57*/ "dataDyne Labortechniker\n", + /* 58*/ "Biotechniker\n", + /* 59*/ "Alaska-Wache\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Chef-Stewardess\n", + /* 64*/ "Der Pr舖ident\n", + /* 65*/ "NSA Lakai\n", + /* 66*/ "Pr舖identenwache\n", + /* 67*/ "Pr舖ident\"en Klon\n", + /* 68*/ "Pelagic II Wache\n", + /* 69*/ "Maianischer Soldat\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- Kein Controller in Controller-Port 1 -", + /* 72*/ "Schalten Sie aus und schlie゚en Sie einen Controller an.", + /* 73*/ "GEFUNDEN", + /* 74*/ "NICHT GEFUNDEN", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "W臧le deine Wahrheit\n", + /* 97*/ "Neu...\n", + /* 98*/ "Neuer Agent...\n", + /* 99*/ "Speicher\n", + /*100*/ "Kopieren:\n", + /*101*/ "Lschen:\n", + /*102*/ "Spielstand wird gelscht...\n", + /*103*/ "Solo-Missionen Speicherst舅de\n", + /*104*/ "Kampfsimulator Einstellung Speicherst舅de\n", + /*105*/ "Kampfsimulator Spielerdaten\n", + /*106*/ "PerfectHead-Speicherst舅de\n", + /*107*/ "Controller Pak Men\n", + /*108*/ "Dieses Men dient dazu, Speicherst舅de von den\n Controller Paks zu lschen.\n", + /*109*/ "W臧len Sie das Controller Pak:\n", + /*110*/ "Abbruch\n", + /*111*/ "Spielmodul\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Men\n", + /*117*/ "Solo-Missionen\n", + /*118*/ "Multiplayer\n", + /*119*/ "Teamwork\n", + /*120*/ "Counter Operative-Modus\n", + /*121*/ "Filmsequenzen\n", + /*122*/ "Missionsauswahl\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Spezialmissionen\n", + /*133*/ "dataDyne", + /*134*/ "- Abtrnnig", + /*135*/ "dataDyne", + /*136*/ "- Ermittlung", + /*137*/ "dataDyne", + /*138*/ "- Ausbruch", + /*139*/ "Carrington Villa", + /*140*/ "- Geisel Nr. 1", + /*141*/ "Chicago", + /*142*/ "- Unter Tarnung", + /*143*/ "G5-Building", + /*144*/ "- Aufkl舐ung", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rettung", + /*149*/ "Area 51", + /*150*/ "- Flucht", + /*151*/ "Sttzpunkt", + /*152*/ "- Spionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismus", + /*155*/ "Absturzstelle", + /*156*/ "- Konfrontation", + /*157*/ "Pelagic II", + /*158*/ "- Erforschung", + /*159*/ "Tiefsee", + /*160*/ "- Abwendung", + /*161*/ "Carrington Institut", + /*162*/ "- Verteidigung", + /*163*/ "Das Schiff", + /*164*/ "- Verdeckter Angriff", + /*165*/ "Skedar-Ruinen", + /*166*/ "- Der Schrein", + /*167*/ "Mr. Blonds Rache", + /*168*/ "Maianisches SOS", + /*169*/ "Die ワbernahme", + /*170*/ "KRIEG!", + /*171*/ "Das Duell", + /*172*/ "Status\n", + /*173*/ "Abbruch!\n", + /*174*/ "ACHTUNG!\n", + /*175*/ "Mchten Sie die Mission wirklich abbrechen?\n", + /*176*/ "NEIN\n", + /*177*/ "JA\n", + /*178*/ "Inventar\n", + /*179*/ "Verfgbare Waffen\n", + /*180*/ "Optionen\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Steuerung\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Spiel speichern\n", + /*187*/ "Agent wechseln...\n", + /*188*/ "ACHTUNG!\n", + /*189*/ "Mchten Sie wirklich andere Agenten-Daten laden?\n", + /*190*/ "Ja\n", + /*191*/ "Nein\n", + /*192*/ "Steuerungsoptionen\n", + /*193*/ "Steuerung Spieler 2\n", + /*194*/ "Art der Steuerung\n", + /*195*/ "Blick nach oben/unten\n", + /*196*/ "Geradeausschauen\n", + /*197*/ "Kopfbewegung\n", + /*198*/ "Auto-Visier\n", + /*199*/ "Fadenkreuz-Ausricht.\n", + /*200*/ "Zurck\n", + /*201*/ "Halten\n", + /*202*/ "Umschalten\n", + /*203*/ "Display-Optionen\n", + /*204*/ "Spieler 2 anzeigen\n", + /*205*/ "Sicht on-screen\n", + /*206*/ "Ziel immer anzeigen\n", + /*207*/ "Zoom-Bereich anzeigen\n", + /*208*/ "Munition on-screen\n", + /*209*/ "Waffenfunktion anzeigen\n", + /*210*/ "Farbklecks\n", + /*211*/ "Untertitel\n", + /*212*/ "Missionszeit anzeigen\n", + /*213*/ "Zurck\n", + /*214*/ "Video-Optionen\n", + /*215*/ "Screen-Gr゚e\n", + /*216*/ "Verh舁tnis\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Spieler Splitscreen\n", + /*219*/ "Zurck\n", + /*220*/ "Vollbild\n", + /*221*/ "Breitbild\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertikal\n", + /*227*/ "Audio-Optionen\n", + /*228*/ "Soundeffekte\n", + /*229*/ "Musik\n", + /*230*/ "Sound\n", + /*231*/ "Zurck\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Kopfhrer", + /*235*/ "Surround", + /*236*/ "Steuerung\n", + /*237*/ "Einh.\n", + /*238*/ "Beidh.\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "W臧le den Schwierigkeitsgrad\n", + /*249*/ "Schwierigkeitsgrad\n", + /*250*/ "Beste Zeit\n", + /*251*/ "Agent\n", + /*252*/ "Spezialagent\n", + /*253*/ "Perfekter Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Teamwork-Optionen\n", + /*256*/ "Radar Ein\n", + /*257*/ "Teamspieler verletzbar\n", + /*258*/ "Perfekter Kumpel\n", + /*259*/ "Weiter\n", + /*260*/ "Abbrechen\n", + /*261*/ "Menschlich", + /*262*/ "1 Simulant", + /*263*/ "2 Simulanten", + /*264*/ "3 Simulanten", + /*265*/ "4 Simulanten", + /*266*/ "Counter Operative-Optionen\n", + /*267*/ "Radar Ein\n", + /*268*/ "Counter Operative\n", + /*269*/ "Weiter\n", + /*270*/ "Abbrechen\n", + /*271*/ "Spieler 1", + /*272*/ "Spieler 2", + /*273*/ "ワberblick\n", + /*274*/ "Annehmen\n", + /*275*/ "Ablehnen\n", + /*276*/ "Komplettiert\n", + /*277*/ "Fehlgeschlagen\n", + /*278*/ "Missions-Status:\n", + /*279*/ "Status der Agentin:\n", + /*280*/ "Missions-Zeit:\n", + /*281*/ "Bevorzugte Waffe:\n", + /*282*/ "Hits:\n", + /*283*/ "Pr艘.:\n", + /*284*/ "Schsse:\n", + /*285*/ " Kopf:\n", + /*286*/ " Rumpf:\n", + /*287*/ " Gliedm.:\n", + /*288*/ " Andere:\n", + /*289*/ "Drcke START\n", + /*290*/ "Gefallen\n", + /*291*/ "ワberlebt\n", + /*292*/ "Abgebrochen\n", + /*293*/ "Fehlgeschlagen\n", + /*294*/ "Komplettiert\n", + /*295*/ "Abgebrochen\n", + /*296*/ "Neuer Versuch", + /*297*/ "N臘hste Mission", + /*298*/ "Akzeptieren\n", + /*299*/ "Ablehnen\n", + /*300*/ "Ziele\n", + /*301*/ "Drcke START\n", + /*302*/ "Kleines aber feines Men\n", + /*303*/ "Kampfsimulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Agent wechseln\n", + /*307*/ "Audio/Video\n", + /*308*/ "Sound\n", + /*309*/ "Musik\n", + /*310*/ "Sound\n", + /*311*/ "Verh舁tnis\n", + /*312*/ "Zurck\n", + /*313*/ "< Leer >\n", + /*314*/ "ENTF", + /*315*/ "SHIFT", + /*316*/ "ABBR", + /*317*/ "OK", + /*318*/ "Kampfsimulator-Kpfe\n", + /*319*/ "Kpfe in den Missionen\n", + /*320*/ "Fehler\n", + /*321*/ "Abbruch\n", + /*322*/ "Es wurde kein\nController Pak in den\nControllern gefunden.\n", + /*323*/ "Spielstand wurde nicht gespeichert.\n", + /*324*/ "Spielstand wurde nicht geladen.\n", + /*325*/ "Spielstand konnte nicht gelscht werden.\n", + /*326*/ "Zu wenig Speicherplatz.\n", + /*327*/ "Diese Daten sind bereits\ngeladen worden.\n", + /*328*/ "wurde entfernt.\n", + /*329*/ "Controller Pak ist besch臈igt oder nicht richtig eingelegt.\n", + /*330*/ "Lschvorgang konnte nicht durchgefhrt werden.\n", + /*331*/ "Ladefehler\n", + /*332*/ "Speicherfehler\n", + /*333*/ "Ladefehler Spieler\n", + /*334*/ "Speicherfehler Spieler\n", + /*335*/ "Fehler w臧rend des Ladens von PerfectHead.\n", + /*336*/ "Fehler w臧rend des Speicherns von PerfectHead.\n", + /*337*/ "Fehler w臧rend des Lesevorgangs.\n", + /*338*/ "Fehler w臧rend des Schreibvorgangs.\n", + /*339*/ "Fehler\n", + /*340*/ "Lschvorgang nicht erfolgreich.\n", + /*341*/ "Spielstand konnte nicht gelscht werden.\n", + /*342*/ "- ワberprfen Sie, ob das Controller Pak is\nkorrekt eingelegt ist.\n", + /*343*/ "Abbrechen\n", + /*344*/ "Es ist nicht genug Platz vorhanden.\n", + /*345*/ "Cool!\n", + /*346*/ "Spiel gespeichert.\n", + /*347*/ "OK\n", + /*348*/ "W臧rend des Speicherns ereignete\nsich ein Fehler.\n", + /*349*/ "Versuche es nochmals.\n", + /*350*/ "Anderen Speicherplatz w臧len\n", + /*351*/ "Abbrechen\n", + /*352*/ "W臧rend des Ladens ereignete\nsich ein Fehler.\n", + /*353*/ "Wiederholen\n", + /*354*/ "Abbrechen\n", + /*355*/ "Es wird Platz fr den Kopf bentigt.\n", + /*356*/ "W臧len Sie einen Kopf, der berschrieben werden soll:\n", + /*357*/ "OK\n", + /*358*/ "Abbrechen\n", + /*359*/ "Speichern\n", + /*360*/ "Mchten Sie die Daten\nwoanders speichern?\n", + /*361*/ "Ja\n", + /*362*/ "Nein\n", + /*363*/ "Bitte legen Sie das\nController Pak\nmit den %s ein.\n", + /*364*/ "Bitte legen Sie das\nController Pak ein,\nauf dem Sie speichern mchten.\n", + /*365*/ "OK\n", + /*366*/ "Abbrechen\n", + /*367*/ "Speicherplatz w臧len\n", + /*368*/ "Wo!\n", + /*369*/ "Pl舩ze\n", + /*370*/ "Lschen...\n", + /*371*/ "Abbrechen\n", + /*372*/ "Voll", + /*373*/ "Spielstand kopieren\n", + /*374*/ "W臧len Sie den zu kopierenden Spielstand:\n", + /*375*/ "Abbruch\n", + /*376*/ "Spielstand lschen\n", + /*377*/ "Welchen Spielstand:\n", + /*378*/ "Abbruch\n", + /*379*/ "ACHTUNG!\n", + /*380*/ "Mchten Sie diesen Spielstand\nwirklich lschen?\n", + /*381*/ "Abbrechen\n", + /*382*/ "OK\n", + /*383*/ "Spielerdaten lschen\n", + /*384*/ "Mchten Sie diese Spielerdaten\nwirklich lschen?\n", + /*385*/ "Nein\n", + /*386*/ "Ja\n", + /*387*/ "Spielerdaten\n", + /*388*/ "Spielerdaten lschen:\n", + /*389*/ "Daten\n", + /*390*/ "Seiten\n", + /*391*/ "Abbruch\n", + /*392*/ "Frei\n", + /*393*/ "--\n", + /*394*/ "Freie Pl舩ze: \n", + /*395*/ "Freie Pl舩ze: %d\n", + /*396*/ "Belegte Pl舩ze: \n", + /*397*/ "Belegte Pl舩ze: %d\n", + /*398*/ "Es existiert bereits ein Speicherstand.\n", + /*399*/ "Es steht ausreichend freier\nSpeicher zur Verfgung.\n", + /*400*/ "Das Controller Pak ist zu voll, um das Spiel zu\nspeichern. Es werden 28 freie Pl舩ze bentigt.\n", + /*401*/ "Geben Sie den Namen des Agenten ein!\n", + /*402*/ "Neu...\n", + /*403*/ "Neuer Agent...\n", + /*404*/ "Neuer Rekrut", + /*405*/ "Missionszeit:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Zentrale\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5-Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institut\n", + /*445*/ "Mission 8 - Skedar Schiff\n", + /*446*/ "Mission 9 - Skedar Ruinen\n", + /*447*/ "Finale\n", + /*448*/ "Zeig mir alles!\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Die Dunkelheit\n", + /*451*/ "1:1 Outro - Ein rascher Abstieg\n", + /*452*/ "1:2 Intro - Abw舐ts!\n", + /*453*/ "1:2 Outro - Das Treffen\n", + /*454*/ "1:3 Intro - Licht aus\n", + /*455*/ "1:3 Outro - Wohin geht's?\n", + /*456*/ "2:1 Intro - Verhandle DARワBER!\n", + /*457*/ "2:1 Intro 2 - Am seidenen Faden\n", + /*458*/ "2:1 Outro - Carringtons Rettung\n", + /*459*/ "3:1 Intro - Dunkle Gassen\n", + /*460*/ "3:1 Outro - Das Eindringen\n", + /*461*/ "3:2 Intro - Die Perfektion\n", + /*462*/ "3:2 Special - Die Verschwrung\n", + /*463*/ "3:2 Outro - ワber die Feuerleiter\n", + /*464*/ "4:1 Intro - Video-Gemeinheiten\n", + /*465*/ "4:1 Outro - Lose Enden\n", + /*466*/ "4:2 Intro - Perlen der Weisheit\n", + /*467*/ "4:2 Outro - Unterm Messer\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Das Erwachen\n", + /*470*/ "4:3 Outro - Die Flucht\n", + /*471*/ "5:1 Intro - ワber den Wolken\n", + /*472*/ "5:1 Outro - Der Abflug\n", + /*473*/ "5:2 Intro - Die letzte Chance\n", + /*474*/ "5:2 Special - Das Andockmanver\n", + /*475*/ "5:2 Outro - Keine Wahl\n", + /*476*/ "5:3 Intro - Roter Horizont\n", + /*477*/ "5:3 Outro - Der blonde Freak\n", + /*478*/ "6:1 Intro - Wer schleicht da?\n", + /*479*/ "6:1 Outro - In der Tiefe\n", + /*480*/ "6:2 Intro - Noch tiefer\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Der Weg nach oben\n", + /*483*/ "7:1 Intro - Salut\n", + /*484*/ "7:1 Outro - In die Freiheit\n", + /*485*/ "8:1 Intro - Entfhrt\n", + /*486*/ "8:1 Outro - トrger voraus\n", + /*487*/ "9:1 Intro - Ruhe vor dem Sturm\n", + /*488*/ "9:1 Outro - Hab dich!\n", + /*489*/ "Endsequenz\n", + /*490*/ "Cinema\n", + /*491*/ "Tarnung %d\n", + /*492*/ "Zielauswahl\n", + /*493*/ "Hits\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_i.c b/src/files/lang/pal-final/options_str_i.c new file mode 100644 index 000000000..ad87b6209 --- /dev/null +++ b/src/files/lang/pal-final/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Compiuto\n", + /* 1*/ "Incompleto\n", + /* 2*/ "Fallito\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terra:", + /* 6*/ " nella preistoria", + /* 7*/ "Rare presenta", + /* 8*/ "Rosso\n", + /* 9*/ "Giallo\n", + /* 10*/ "Blu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azzurro\n", + /* 13*/ "Arancio\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrone\n", + /* 16*/ "Jo in tuta da lotta\n", + /* 17*/ "Jo in impermeabile\n", + /* 18*/ "Jo in abito da sera\n", + /* 19*/ "Jo in abito strappato\n", + /* 20*/ "Jo come hostess\n", + /* 21*/ "Jo in muta da sub\n", + /* 22*/ "Jo con bombole da sub\n", + /* 23*/ "Jo in tenuta polare\n", + /* 24*/ "Jo in camice\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington in smoking\n", + /* 29*/ "Mr Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Tecnico di lab. CI (uomo)\n", + /* 34*/ "Tecnico di lab. CI (donna)\n", + /* 35*/ "Soldato CI\n", + /* 36*/ "Soldato d'assalto dD\n", + /* 37*/ "Guardia (donna) dD\n", + /* 38*/ "Sicurezza dataDyne\n", + /* 39*/ "Fanteria dataDyne\n", + /* 40*/ "Soldato dataDyne\n", + /* 41*/ "Segretaria\n", + /* 42*/ "Vestito da ufficio\n", + /* 43*/ "Vestito casual\n", + /* 44*/ "Negoziatore\n", + /* 45*/ "Cecchino dataDyne\n", + /* 46*/ "Guardia G5\n", + /* 47*/ "Guardia SWAT G5\n", + /* 48*/ "Agente CIA\n", + /* 49*/ "Agente FBI\n", + /* 50*/ "Guardia Area 51\n", + /* 51*/ "Soldato Area 51\n", + /* 52*/ "Pilota\n", + /* 53*/ "Tute\n", + /* 54*/ "Guardia del corpo NSA\n", + /* 55*/ "Tecnico di lab. (uomo)\n", + /* 56*/ "Tecnico di lab. (donna)\n", + /* 57*/ "Tecnico di lab. dD\n", + /* 58*/ "Tecnico biologico\n", + /* 59*/ "Guardia dell'Alaska\n", + /* 60*/ "Pilota Air Force One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hostess\n", + /* 63*/ "Hostess capo\n", + /* 64*/ "Presidente\n", + /* 65*/ "Lacch NSA\n", + /* 66*/ "Sicurezza presidenziale\n", + /* 67*/ "Clone del Presidente\n", + /* 68*/ "Guardia Pelagic II\n", + /* 69*/ "Soldato Maian\n", + /* 70*/ "Giacca elegante\n", + /* 71*/ "nessun Controller nella presa 1", + /* 72*/ "spegni la console e collega un Controller", + /* 73*/ "PRESENTE", + /* 74*/ "ASSENTE", + /* 75*/ "tm", + /* 76*/ "EXPANSION PAK N64", + /* 77*/ "Identificazione prodotto Nintendo 64\n", + /* 78*/ "ID prodotto:\n", + /* 79*/ "Codice prodotto:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Ideatore:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Versione PAL 8.7 finale\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "I logo Rareware e Perfect Dark sono trademark di Rare Ltd.\n", + /* 88*/ "Presentato in Dolby Surround. Dolby e il simbolo\ndoppia D sono trademark di Dolby Laboratories.", + /* 89*/ "Usa Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback fornito con Miles Sound System da\nRAD Game Tools, Inc. tecnologia di compressione audio MPEG Layer-3\nsu licenza di Fraunhofer IIS e THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "Design Rare nel futuro <<<\n", + /* 94*/ "Edito da Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Scegli la tua realt濬n", + /* 97*/ "Nuovo...\n", + /* 98*/ "Nuovo agente...\n", + /* 99*/ "File di gioco\n", + /*100*/ "Copia:\n", + /*101*/ "Cancella:\n", + /*102*/ "Cancella dati gioco...\n", + /*103*/ "File missioni individuali\n", + /*104*/ "File impostaz. simulatore lotta\n", + /*105*/ "File giocatore simulatore lotta\n", + /*106*/ "File testaPerfect\n", + /*107*/ "Menu Controller Pak\n", + /*108*/ "Usalo per cancellare i dati di gioco\ndai Controller Pak.\n", + /*109*/ "Scegli Controller Pak:\n", + /*110*/ "Esci\n", + /*111*/ "Cassetta gioco\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missioni individuali\n", + /*118*/ "Simulatore lotta\n", + /*119*/ "Collaborazione\n", + /*120*/ "Tutti contro tutti!\n", + /*121*/ "Cinema\n", + /*122*/ "Seleziona Missione\n", + /*123*/ "Missione 1\n", + /*124*/ "Missione 2\n", + /*125*/ "Missione 3\n", + /*126*/ "Missione 4\n", + /*127*/ "Missione 5\n", + /*128*/ "Missione 6\n", + /*129*/ "Missione 7\n", + /*130*/ "Missione 8\n", + /*131*/ "Missione 9\n", + /*132*/ "Missioni speciali\n", + /*133*/ "QG dataDyne", + /*134*/ "- Ribellione", + /*135*/ "Ricerca dataDyne", + /*136*/ "- L'indagine", + /*137*/ "QG dataDyne", + /*138*/ "- Salvataggio", + /*139*/ "Villa Carrington", + /*140*/ "- L'ostaggio nー1", + /*141*/ "Chicago", + /*142*/ "- In incognito", + /*143*/ "Edificio G5", + /*144*/ "- Ricognizione", + /*145*/ "Area 51", + /*146*/ "- L'infiltrazione", + /*147*/ "Area 51", + /*148*/ "- Salvataggio", + /*149*/ "Area 51", + /*150*/ "- La fuga", + /*151*/ "Base aerea", + /*152*/ "- Lo spionaggio", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Luogo del disastro", + /*156*/ "- Lo scontro", + /*157*/ "Pelagic II", + /*158*/ "- L'esplorazione", + /*159*/ "Negli abissi", + /*160*/ "- La minaccia", + /*161*/ "Carrington Institute", + /*162*/ "- La difesa", + /*163*/ "Astronave d'assalto", + /*164*/ "- Attacco", + /*165*/ "Rovine Skedar", + /*166*/ "- Tempio di guerra", + /*167*/ "La vendetta di Mr Blonde", + /*168*/ "L'SOS Maian", + /*169*/ "Il riscatto dell'istituto", + /*170*/ "GUERRA!", + /*171*/ "Il duello", + /*172*/ "Situazione\n", + /*173*/ "Interruzione!\n", + /*174*/ "Attenzione!\n", + /*175*/ "Vuoi interrompere la missione?\n", + /*176*/ "Annulla\n", + /*177*/ "Interrompi\n", + /*178*/ "Inventario\n", + /*179*/ "Armi disponibili\n", + /*180*/ "Opzioni\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Comandi\n", + /*184*/ "Visualizza\n", + /*185*/ "Trucchi\n", + /*186*/ "Salva gioco\n", + /*187*/ "Cambia agente...\n", + /*188*/ "Attenzione!\n", + /*189*/ "Vuoi caricare un altro agente?\n", + /*190*/ "S\n", + /*191*/ "No\n", + /*192*/ "Opzioni comandi\n", + /*193*/ "Comandi giocatore 2\n", + /*194*/ "Modalit comandi\n", + /*195*/ "Inv. punto vista\n", + /*196*/ "Vista in avanti\n", + /*197*/ "Rotazione testa\n", + /*198*/ "Mira automatica\n", + /*199*/ "Mirino\n", + /*200*/ "Esci\n", + /*201*/ "Tieni premuto\n", + /*202*/ "Attiva/Disattiva\n", + /*203*/ "Visualizza opzioni\n", + /*204*/ "Comandi giocatore 2\n", + /*205*/ "Vista su schermo\n", + /*206*/ "Obiettivo sempre\n", + /*207*/ "Area zoom\n", + /*208*/ "Munizioni\n", + /*209*/ "Funzioni arma\n", + /*210*/ "Macchia colorata\n", + /*211*/ "Didascalia\n", + /*212*/ "Tempo missione\n", + /*213*/ "Esci\n", + /*214*/ "Opzioni video\n", + /*215*/ "Dimensioni schermo\n", + /*216*/ "Rapporto\n", + /*217*/ "Alta risoluzione\n", + /*218*/ "Diviso per 2 giocatori\n", + /*219*/ "Esci\n", + /*220*/ "Intero\n", + /*221*/ "Allargato\n", + /*222*/ "Cinema\n", + /*223*/ "Normale\n", + /*224*/ "16:9\n", + /*225*/ "Orizzontale\n", + /*226*/ "Verticale\n", + /*227*/ "Opzioni audio\n", + /*228*/ "Suono\n", + /*229*/ "Musica\n", + /*230*/ "Modalit suono\n", + /*231*/ "Esci\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Cuffie", + /*235*/ "Surround", + /*236*/ "Comandi\n", + /*237*/ "Singolo\n", + /*238*/ "Doppio\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Istruzioni\n", + /*248*/ "Seleziona difficolt濬n", + /*249*/ "Difficolt濬n", + /*250*/ "Tempo migliore\n", + /*251*/ "Agente\n", + /*252*/ "Agente speciale\n", + /*253*/ "Agente Perfect\n", + /*254*/ "Annulla\n", + /*255*/ "Opzioni collaborazione\n", + /*256*/ "Radar acceso\n", + /*257*/ "Fuoco sugli amici\n", + /*258*/ "AmicoPerfect\n", + /*259*/ "Continua\n", + /*260*/ "Annulla\n", + /*261*/ "Umano", + /*262*/ "Un replicante", + /*263*/ "2 replicanti", + /*264*/ "3 replicanti", + /*265*/ "4 replicanti", + /*266*/ "Tutti contro tutti!\n", + /*267*/ "Radar acceso\n", + /*268*/ "Tutti contro tutti!\n", + /*269*/ "Continua\n", + /*270*/ "Annulla\n", + /*271*/ "Giocat. 1", + /*272*/ "Giocat. 2", + /*273*/ "Panoramica\n", + /*274*/ "Accetta\n", + /*275*/ "Rifiuta\n", + /*276*/ "Compiuto\n", + /*277*/ "Fallito\n", + /*278*/ "Risultati missione:\n", + /*279*/ "Stato agente:\n", + /*280*/ "Tempo missione:\n", + /*281*/ "Arma pi usata:\n", + /*282*/ "Vittime:\n", + /*283*/ "Accuratezza:\n", + /*284*/ "Colpi totali:\n", + /*285*/ " Colpi al capo:\n", + /*286*/ " Colpi al corpo:\n", + /*287*/ " Colpi agli arti:\n", + /*288*/ " Altro:\n", + /*289*/ "Premi START\n", + /*290*/ "Deceduto\n", + /*291*/ "Attivo\n", + /*292*/ "Fuggito\n", + /*293*/ "Fallito\n", + /*294*/ "Compiuto\n", + /*295*/ "Interrotto\n", + /*296*/ "Riprova", + /*297*/ "Missione seguente", + /*298*/ "Accetta\n", + /*299*/ "Rifiuta\n", + /*300*/ "Obiettivi\n", + /*301*/ "Premi START\n", + /*302*/ "Menu breve e conciso\n", + /*303*/ "Simulatore\n", + /*304*/ "Addestramento\n", + /*305*/ "Audio/Video\n", + /*306*/ "Cambia agente\n", + /*307*/ "Audio/Video\n", + /*308*/ "Suono\n", + /*309*/ "Musica\n", + /*310*/ "Modalit suono\n", + /*311*/ "Rapporto\n", + /*312*/ "Esci\n", + /*313*/ "< Vuoto >\n", + /*314*/ "CANC", + /*315*/ "MAIU", + /*316*/ "ANNULLA", + /*317*/ "OK", + /*318*/ "Testi simulatore\n", + /*319*/ "Teste missione\n", + /*320*/ "Errore\n", + /*321*/ "Annulla\n", + /*322*/ "Controller Pak assente\nda tutti i Controller.\n", + /*323*/ "File non salvato.\n", + /*324*/ "File non caricato.\n", + /*325*/ "Impossibile cancellare file.\n", + /*326*/ "Memoria esaurita.\n", + /*327*/ "Giocatore gi caricato\nnel gioco.\n", + /*328*/ "rimosso.\n", + /*329*/ "Controller Pak danneggiato o in posizione errata.\n", + /*330*/ "Impossibile cancellare dati gioco.\n", + /*331*/ "Errore caric. gioco\n", + /*332*/ "Errore salv. gioco\n", + /*333*/ "Errore caric. giocat.\n", + /*334*/ "Errore salv. giocat.\n", + /*335*/ "Errore caric. testaPerfect\n", + /*336*/ "Errore salv. testaPerfect\n", + /*337*/ "Errore lettura file\n", + /*338*/ "Errore scrittura file\n", + /*339*/ "Errore\n", + /*340*/ "Non cancellato\n", + /*341*/ "Impossibile cancellare.\n", + /*342*/ "- Controlla che il Controller Pak \nsia inserito correttamente.\n", + /*343*/ "Annulla\n", + /*344*/ "Spazio esaurito.\n", + /*345*/ "Perfetto!\n", + /*346*/ "File salvato.\n", + /*347*/ "OK\n", + /*348*/ "Errore durante il \nsalvataggio!\n", + /*349*/ "Riprova\n", + /*350*/ "Salva altrove\n", + /*351*/ "Annulla\n", + /*352*/ "Errore durante il \ncaricamento!\n", + /*353*/ "Riprova\n", + /*354*/ "Annulla\n", + /*355*/ "Serve spazio per la testa\n", + /*356*/ "Scegli una testa da caricare:\n", + /*357*/ "OK\n", + /*358*/ "Annulla\n", + /*359*/ "Salva\n", + /*360*/ "Vuoi salvare il file\naltrove?\n", + /*361*/ "S\n", + /*362*/ "No\n", + /*363*/ "Inserisci il Controller Pak con il tuo %s in un Controller.\n", + /*364*/ "Inserisci il\nController Pak\ndove vuoi salvare in un Controller.\n", + /*365*/ "OK\n", + /*366*/ "Annulla\n", + /*367*/ "Scegli dove!\n", + /*368*/ "Dove?\n", + /*369*/ "Spazi\n", + /*370*/ "Cancella file...\n", + /*371*/ "Annulla\n", + /*372*/ "Pieno", + /*373*/ "Copia file\n", + /*374*/ "Scegli un file da copiare:\n", + /*375*/ "Premi B per uscire.\n", + /*376*/ "Cancella file\n", + /*377*/ "Che file cancellare?\n", + /*378*/ "Premi B per uscire.\n", + /*379*/ "Attenzione!\n", + /*380*/ "Sicuro di voler\ncancellare il file?\n", + /*381*/ "Annulla\n", + /*382*/ "OK\n", + /*383*/ "Cancella dati gioco\n", + /*384*/ "Sicuro di voler\ncancellare\nquesti dati?\n", + /*385*/ "No\n", + /*386*/ "S\n", + /*387*/ "Dati gioco\n", + /*388*/ "Cancella dati:\n", + /*389*/ "Dati\n", + /*390*/ "Spazi\n", + /*391*/ "Premi B per uscire.\n", + /*392*/ "Vuoto\n", + /*393*/ "--\n", + /*394*/ "Spazi vuoti: \n", + /*395*/ "Spazi vuoti: %d\n", + /*396*/ "Spazi pieni: \n", + /*397*/ "Spazi pieni: %d\n", + /*398*/ "Questo Controller Pak contiene gi濬nun gioco in memoria.\n", + /*399*/ "Spazio sufficiente per\ni dati di Perfect Dark.\n", + /*400*/ "Controller Pak pieno: impossibile salvare dati.\nServono 28 spazi per salvare sul Controller Pak.\n", + /*401*/ "Digita nome agente\n", + /*402*/ "Nuovo...\n", + /*403*/ "Nuovo agente...\n", + /*404*/ "Nuova recluta", + /*405*/ "Tempo missione:", + /*406*/ "Sfida 1", + /*407*/ "Sfida 2", + /*408*/ "Sfida 3", + /*409*/ "Sfida 4", + /*410*/ "Sfida 5", + /*411*/ "Sfida 6", + /*412*/ "Sfida 7", + /*413*/ "Sfida 8", + /*414*/ "Sfida 9", + /*415*/ "Sfida 10", + /*416*/ "Sfida 11", + /*417*/ "Sfida 12", + /*418*/ "Sfida 13", + /*419*/ "Sfida 14", + /*420*/ "Sfida 15", + /*421*/ "Sfida 16", + /*422*/ "Sfida 17", + /*423*/ "Sfida 18", + /*424*/ "Sfida 19", + /*425*/ "Sfida 20", + /*426*/ "Sfida 21", + /*427*/ "Sfida 22", + /*428*/ "Sfida 23", + /*429*/ "Sfida 24", + /*430*/ "Sfida 25", + /*431*/ "Sfida 26", + /*432*/ "Sfida 27", + /*433*/ "Sfida 28", + /*434*/ "Sfida 29", + /*435*/ "Sfida 30", + /*436*/ "Speciale\n", + /*437*/ "Prologo\n", + /*438*/ "Missione 1 - QG dataDyne\n", + /*439*/ "Missione 2 - Villa Carrington\n", + /*440*/ "Missione 3 - Edificio G5\n", + /*441*/ "Missione 4 - Area 51\n", + /*442*/ "Missione 5 - Air Force One\n", + /*443*/ "Missione 6 - Pelagic II\n", + /*444*/ "Missione 7 - Carrington Institute\n", + /*445*/ "Missione 8 - Astronave d'assalto Skedar\n", + /*446*/ "Missione 9 - Rovine Skedar\n", + /*447*/ "Finale\n", + /*448*/ "Mostra tutto!\n", + /*449*/ "Prologo\n", + /*450*/ "1:1 Prologo - Al buio\n", + /*451*/ "1:1 Epilogo - Discesa rapida\n", + /*452*/ "1:2 Prologo - Avanti!\n", + /*453*/ "1:2 Epilogo - L'incontro\n", + /*454*/ "1:3 Prologo - A luci spente\n", + /*455*/ "1:3 Epilogo - Dove si va?\n", + /*456*/ "2:1 Prologo - Il negoziato\n", + /*457*/ "2:1 Prologo 2 - Sul filo del rasoio\n", + /*458*/ "2:1 Epilogo - Il salvataggio\n", + /*459*/ "3:1 Prologo - Vicoli bui\n", + /*460*/ "3:1 Epilogo - Irruzione G5\n", + /*461*/ "3:2 Prologo - La perfezione\n", + /*462*/ "3:2 Speciale - La cospirazione\n", + /*463*/ "3:2 Epilogo - Uscita antincendio\n", + /*464*/ "4:1 Prologo - Interferenze\n", + /*465*/ "4:1 Epilogo - Lasciamo perdere...\n", + /*466*/ "4:2 Prologo - Perle di saggezza\n", + /*467*/ "4:2 Epilogo - Sotto i ferri\n", + /*468*/ "4:3 Prologo - Gas!\n", + /*469*/ "4:3 Speciale - Il risveglio\n", + /*470*/ "4:3 Epilogo - La fuga\n", + /*471*/ "5:1 Prologo - Ad alta quota\n", + /*472*/ "5:1 Epilogo - Il decollo\n", + /*473*/ "5:2 Prologo - L'ultima possibilit濬n", + /*474*/ "5:2 Speciale - L'attracco\n", + /*475*/ "5:2 Epilogo - L'inevitabile\n", + /*476*/ "5:3 Prologo - Orizzonte rosso\n", + /*477*/ "5:3 Epilogo - Il fanatico biondo\n", + /*478*/ "6:1 Prologo - Chi va l?\n", + /*479*/ "6:1 Epilogo - Negli abissi\n", + /*480*/ "6:2 Prologo - Ancora pi gi\n", + /*481*/ "6:2 Speciale - Virus!\n", + /*482*/ "6:2 Epilogo - La risalita\n", + /*483*/ "7:1 Prologo - L'ambasciata\n", + /*484*/ "7:1 Epilogo - Fuga per la libert濬n", + /*485*/ "8:1 Prologo - Prigioniera\n", + /*486*/ "8:1 Epilogo - Guai in vista\n", + /*487*/ "9:1 Prologo - Venti di guerra\n", + /*488*/ "9:1 Epilogo - Fatto!\n", + /*489*/ "Fine sequenza\n", + /*490*/ "Cinema\n", + /*491*/ "Mimesi %d\n", + /*492*/ "Scegli obiettivo\n", + /*493*/ "Uccisioni\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_s.c b/src/files/lang/pal-final/options_str_s.c new file mode 100644 index 000000000..487d1222e --- /dev/null +++ b/src/files/lang/pal-final/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Completado\n", + /* 1*/ "No completado\n", + /* 2*/ "Fallado\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "tierra:", + /* 6*/ " prehistoria", + /* 7*/ "rare presenta", + /* 8*/ "Rojo\n", + /* 9*/ "Amarillo\n", + /* 10*/ "Azul\n", + /* 11*/ "Magenta\n", + /* 12*/ "Az. Claro\n", + /* 13*/ "Naranja\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrn\n", + /* 16*/ "Joanna de Combate\n", + /* 17*/ "Joanna con Gabardina\n", + /* 18*/ "Joanna de Gala\n", + /* 19*/ "Joanna de Fiesta\n", + /* 20*/ "Joanna Azafata\n", + /* 21*/ "Joanna Traje Isot駻mico\n", + /* 22*/ "Joanna con Escafandra\n", + /* 23*/ "Joanna con Traje Polar\n", + /* 24*/ "Joanna Cientfica\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington de Gala\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "T馗nico Masculino del IC\n", + /* 34*/ "T馗nico Femenino del IC\n", + /* 35*/ "Soldado del IC\n", + /* 36*/ "Tropa Asalto dataDyne\n", + /* 37*/ "Guarda de dataDyne\n", + /* 38*/ "Seguridad de dataDyne\n", + /* 39*/ "Infantera de dataDyne\n", + /* 40*/ "Soldado de dataDyne\n", + /* 41*/ "Secretaria\n", + /* 42*/ "Ropa de Oficina\n", + /* 43*/ "Ropa Normal\n", + /* 44*/ "Negociadora\n", + /* 45*/ "Francotirador dataDyne\n", + /* 46*/ "Guarda del G5\n", + /* 47*/ "Guarda SWAT del G5\n", + /* 48*/ "Agente de la CIA\n", + /* 49*/ "Agente del FBI\n", + /* 50*/ "Guarda del チrea 51\n", + /* 51*/ "Soldado del チrea 51\n", + /* 52*/ "Piloto\n", + /* 53*/ "Mono de Trabajo\n", + /* 54*/ "Guardaespaldas de la ANS\n", + /* 55*/ "T馗nico Masculino Lab.\n", + /* 56*/ "T馗nico Femenino Lab.\n", + /* 57*/ "T馗nico del Lab. dataDyne\n", + /* 58*/ "Biot馗nico\n", + /* 59*/ "Guarda de Alaska\n", + /* 60*/ "Piloto del Air Force One\n", + /* 61*/ "Auxiliar\n", + /* 62*/ "Azafata\n", + /* 63*/ "Azafata Jefe\n", + /* 64*/ "El Presidente\n", + /* 65*/ "Lacayo de la ANS\n", + /* 66*/ "Seguridad Presidencial\n", + /* 67*/ "Clon del Presidente\n", + /* 68*/ "Guarda del Pelagic II\n", + /* 69*/ "Soldado Maian\n", + /* 70*/ "Esmoquin\n", + /* 71*/ "- no hay mando conectado a la ranura 1 -", + /* 72*/ "por favor, apaga la consola y conecta un mando", + /* 73*/ "DETECTADO", + /* 74*/ "NO DETECTADO", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Elige Tu Realidad\n", + /* 97*/ "Nuevo...\n", + /* 98*/ "Nuevo Agente...\n", + /* 99*/ "Ficheros de Juego\n", + /*100*/ "Copiar:\n", + /*101*/ "Borrar:\n", + /*102*/ "Borrar Notas de Juego...\n", + /*103*/ "Fichero de Agente Un Jugador\n", + /*104*/ "Fichero de Opciones del Simulador\n", + /*105*/ "Ficheros de Jugador del Simulador\n", + /*106*/ "Ficheros PerfectHead\n", + /*107*/ "Men Controller Pak\n", + /*108*/ "Usa este men para borrar notas de juego\nde tus Controller Pak.\n", + /*109*/ "Elige Controller Pak a Editar:\n", + /*110*/ "Salir\n", + /*111*/ "Cartucho\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Men Perfecto\n", + /*117*/ "Misiones Solo\n", + /*118*/ "Simulador de Combate\n", + /*119*/ "Co-Operativo\n", + /*120*/ "Contra-Operativa\n", + /*121*/ "Pelculas\n", + /*122*/ "Selecciona Misin\n", + /*123*/ "Misin 1\n", + /*124*/ "Misin 2\n", + /*125*/ "Misin 3\n", + /*126*/ "Misin 4\n", + /*127*/ "Misin 5\n", + /*128*/ "Misin 6\n", + /*129*/ "Misin 7\n", + /*130*/ "Misin 8\n", + /*131*/ "Misin 9\n", + /*132*/ "Asignaciones Especiales\n", + /*133*/ "Central dataDyne", + /*134*/ "- Comienzo", + /*135*/ "Lab. dataDyne", + /*136*/ "- Investigacin", + /*137*/ "Central dataDyne", + /*138*/ "- Extraccin", + /*139*/ "Villa Carrington", + /*140*/ "- Reh駭 Uno", + /*141*/ "Chicago", + /*142*/ "- Sigilo", + /*143*/ "Edificio G5", + /*144*/ "- Reconocimiento", + /*145*/ "チrea 51", + /*146*/ "- Infiltracin", + /*147*/ "チrea 51", + /*148*/ "- Rescate", + /*149*/ "チrea 51", + /*150*/ "- Escape", + /*151*/ "Base A駻ea", + /*152*/ "- Espionaje", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Lugar del Impacto", + /*156*/ "- Confrontacin", + /*157*/ "Pelagic II", + /*158*/ "- Exploracin", + /*159*/ "Mar Profundo", + /*160*/ "- Anular Amenaza", + /*161*/ "Instituto Carrington", + /*162*/ "- Defensa", + /*163*/ "Nave de Ataque", + /*164*/ "- Asalto", + /*165*/ "Ruinas Skedar", + /*166*/ "- Templo", + /*167*/ "Venganza de Mr. Blonde", + /*168*/ "SOS Maian", + /*169*/ "Retomando el Instituto", + /*170*/ "。GUERRA!", + /*171*/ "El Duelo", + /*172*/ "Estatus\n", + /*173*/ "。Abortar!\n", + /*174*/ "Cuidado\n", + /*175*/ "ソQuieres abortar la misin?\n", + /*176*/ "Cancelar\n", + /*177*/ "Abortar\n", + /*178*/ "Inventario\n", + /*179*/ "Armas Disponibles\n", + /*180*/ "Opciones\n", + /*181*/ "Audio\n", + /*182*/ "Vdeo\n", + /*183*/ "Controles\n", + /*184*/ "Pantalla\n", + /*185*/ "Trucos\n", + /*186*/ "Guardar Juego\n", + /*187*/ "Cambiar Agente...\n", + /*188*/ "Cuidado\n", + /*189*/ "ソQuieres cargar otro agente?\n", + /*190*/ "S\n", + /*191*/ "No\n", + /*192*/ "Opciones de Control\n", + /*193*/ "Controles Jugador 2\n", + /*194*/ "Estilo de Control\n", + /*195*/ "Control Opuesto\n", + /*196*/ "Mirar al Frente\n", + /*197*/ "Giro de Cabeza\n", + /*198*/ "Auto-Apuntar\n", + /*199*/ "Control Apuntar\n", + /*200*/ "Volver\n", + /*201*/ "Mantener\n", + /*202*/ "Cambiar\n", + /*203*/ "Opciones de Pantalla\n", + /*204*/ "Pantalla Jugador 2\n", + /*205*/ "Mirilla en Pantalla\n", + /*206*/ "Siempre Muestra Objetivo\n", + /*207*/ "Mostrar Alcance del Zoom\n", + /*208*/ "Municin en Pantalla\n", + /*209*/ "Mostrar Funcin del Arma\n", + /*210*/ "Bolas de Pintura\n", + /*211*/ "Subttulos\n", + /*212*/ "Mostrar Tiempo de Misin\n", + /*213*/ "Volver\n", + /*214*/ "Opciones de Vdeo\n", + /*215*/ "Tamao de Pantalla\n", + /*216*/ "Ratio\n", + /*217*/ "Alta Resolucin\n", + /*218*/ "Pantalla Partida 2 Jugadores\n", + /*219*/ "Volver\n", + /*220*/ "Completa\n", + /*221*/ "Panor疥ica\n", + /*222*/ "Cine\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Opciones de Audio\n", + /*228*/ "Sonido\n", + /*229*/ "Msica\n", + /*230*/ "Modo de Sonido\n", + /*231*/ "Volver\n", + /*232*/ "Mono", + /*233*/ "Est駻eo", + /*234*/ "Cascos", + /*235*/ "Surround", + /*236*/ "Controles\n", + /*237*/ "Simple\n", + /*238*/ "Doble\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Informe\n", + /*248*/ "Elegir Dificultad\n", + /*249*/ "Dificultad\n", + /*250*/ "Mejor Tiempo\n", + /*251*/ "Agente\n", + /*252*/ "Agente Especial\n", + /*253*/ "Agente Perfecto\n", + /*254*/ "Cancelar\n", + /*255*/ "Opciones Modo Cooperativo\n", + /*256*/ "Radar S\n", + /*257*/ "Fuego Amigo\n", + /*258*/ "Compaero Perfecto\n", + /*259*/ "Continuar\n", + /*260*/ "Cancelar\n", + /*261*/ "Humano", + /*262*/ "1 Simulante", + /*263*/ "2 Simulantes", + /*264*/ "3 Simulantes", + /*265*/ "4 Simulantes", + /*266*/ "Opciones Contra-Operativa\n", + /*267*/ "Radar S\n", + /*268*/ "Contra-Operativa\n", + /*269*/ "Continuar\n", + /*270*/ "Cancelar\n", + /*271*/ "Jugador 1", + /*272*/ "Jugador 2", + /*273*/ "Visin General\n", + /*274*/ "Aceptar\n", + /*275*/ "Declinar\n", + /*276*/ "Completado\n", + /*277*/ "Fallado\n", + /*278*/ "Estatus de Misin:\n", + /*279*/ "Estatus de Agente:\n", + /*280*/ "Tiempo de Misin:\n", + /*281*/ "Arma Preferida:\n", + /*282*/ "Muertos:\n", + /*283*/ "Precisin:\n", + /*284*/ "Total Disparos:\n", + /*285*/ " Disp. Cabeza:\n", + /*286*/ " Disp. Cuerpo:\n", + /*287*/ " Disp. Miembros:\n", + /*288*/ " Otros:\n", + /*289*/ "Pulsa START\n", + /*290*/ "Difunto\n", + /*291*/ "Activo\n", + /*292*/ "Anulado\n", + /*293*/ "Fallada\n", + /*294*/ "Completada\n", + /*295*/ "Abortada\n", + /*296*/ "Reintentar", + /*297*/ "Sig. Misin", + /*298*/ "Aceptar\n", + /*299*/ "Declinar\n", + /*300*/ "Objetivos\n", + /*301*/ "Pulsa START\n", + /*302*/ "Men Pequeo pero Perfecto\n", + /*303*/ "Simulador de Combate\n", + /*304*/ "Entrenamiento\n", + /*305*/ "Audio/Vdeo\n", + /*306*/ "Cambiar Agente\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sonido\n", + /*309*/ "Msica\n", + /*310*/ "Modo de Sonido\n", + /*311*/ "Ratio\n", + /*312*/ "Volver\n", + /*313*/ "< Vaco >\n", + /*314*/ "SUPR", + /*315*/ "MAY.", + /*316*/ "SALIR", + /*317*/ "OK", + /*318*/ "Cabezas Simulador Combate\n", + /*319*/ "Cabezas de Misiones\n", + /*320*/ "Error\n", + /*321*/ "Cancelar\n", + /*322*/ "El Controller Pak\nno se encontr\nen ningn mando.\n", + /*323*/ "El fichero no ha sido salvado.\n", + /*324*/ "El fichero no se cargar.\n", + /*325*/ "No se puede borrar el fichero.\n", + /*326*/ "Sin memoria.\n", + /*327*/ "Este jugador ya ha sido\ncargado en este juego.\n", + /*328*/ "ha sido quitado.\n", + /*329*/ "El Controller Pak est daado o mal insertado.\n", + /*330*/ "Fall el borrado de la Nota de Juego.\n", + /*331*/ "Error Cargando\n", + /*332*/ "Error Guardando\n", + /*333*/ "Error Cargando\n", + /*334*/ "Error Guardando\n", + /*335*/ "Error Cargando\n", + /*336*/ "Error Guardando\n", + /*337*/ "Error Leyendo\n", + /*338*/ "Error Escribiendo\n", + /*339*/ "Error\n", + /*340*/ "Borrar Fallado\n", + /*341*/ "No se puede borrar el fichero.\n", + /*342*/ "- Comprueba que el Controller Pak\nest insertado correctamente.\n", + /*343*/ "Cancelar\n", + /*344*/ "No hay espacio.\n", + /*345*/ "。Bien!\n", + /*346*/ "Fichero Guardado.\n", + /*347*/ "Aceptar\n", + /*348*/ "Ha aparecido un error\nal intentar guardar.\n", + /*349*/ "Reintentar\n", + /*350*/ "Guardar en otro Sitio\n", + /*351*/ "Cancelar\n", + /*352*/ "Ha aparecido un error\nal intentar cargar.\n", + /*353*/ "Reintentar\n", + /*354*/ "Cancelar\n", + /*355*/ "Necesitas Espacio para la Cabeza\n", + /*356*/ "Elige una cabeza para cargar encima:\n", + /*357*/ "Aceptar\n", + /*358*/ "Cancelar\n", + /*359*/ "Guardar\n", + /*360*/ "ソQuieres guardar tu\nfichero en otro sitio?\n", + /*361*/ "S\n", + /*362*/ "No\n", + /*363*/ "Por favor, inserta el Controller Pak que contiene tu %s en cualquier mando.\n", + /*364*/ "Por favor, inserta el\nController Pak\ndonde est駸 salvando\nen cualquier mando.\n", + /*365*/ "Aceptar\n", + /*366*/ "Cancelar\n", + /*367*/ "Elige Lugar\n", + /*368*/ "Dnde\n", + /*369*/ "Espacios\n", + /*370*/ "Borrar Ficheros...\n", + /*371*/ "Cancelar\n", + /*372*/ "Completo", + /*373*/ "Copiar Fichero\n", + /*374*/ "Elige fichero a copiar:\n", + /*375*/ "Pulsa B para salir.\n", + /*376*/ "Borrar Fichero\n", + /*377*/ "Elige fichero a borrar:\n", + /*378*/ "Pulsa B para salir.\n", + /*379*/ "Cuidado\n", + /*380*/ "ソSeguro que quieres\nborrar este fichero?\n", + /*381*/ "Cancelar\n", + /*382*/ "Aceptar\n", + /*383*/ "Borrar Nota de Juego\n", + /*384*/ "ソEst疽 seguro de\nque quieres borrar\nesta nota de juego?\n", + /*385*/ "No\n", + /*386*/ "S\n", + /*387*/ "Notas de Juego\n", + /*388*/ "Borra Notas de Juego:\n", + /*389*/ "Nota\n", + /*390*/ "P疊inas\n", + /*391*/ "Pulsa B para salir.\n", + /*392*/ "Vaco\n", + /*393*/ "--\n", + /*394*/ "P疊inas Libres: \n", + /*395*/ "P疊inas Libres: %d\n", + /*396*/ "P疊inas Usadas: \n", + /*397*/ "P疊inas Usadas: %d\n", + /*398*/ "Ya existe informacin de Perfect Dark\nen este Controller Pak.\n", + /*399*/ "Hay espacio suficiente para\nnotas de Perfect Dark.\n", + /*400*/ "El Controller Pak est demasiado lleno - 1 nota\ny 28 p疊inas son necesarias para guardar.\n", + /*401*/ "Introduce Nombre del Agente\n", + /*402*/ "Nuevo...\n", + /*403*/ "Nuevo Agente...\n", + /*404*/ "Nuevo Recluta", + /*405*/ "Tiempo de Misin:", + /*406*/ "Desafo 1", + /*407*/ "Desafo 2", + /*408*/ "Desafo 3", + /*409*/ "Desafo 4", + /*410*/ "Desafo 5", + /*411*/ "Desafo 6", + /*412*/ "Desafo 7", + /*413*/ "Desafo 8", + /*414*/ "Desafo 9", + /*415*/ "Desafo 10", + /*416*/ "Desafo 11", + /*417*/ "Desafo 12", + /*418*/ "Desafo 13", + /*419*/ "Desafo 14", + /*420*/ "Desafo 15", + /*421*/ "Desafo 16", + /*422*/ "Desafo 17", + /*423*/ "Desafo 18", + /*424*/ "Desafo 19", + /*425*/ "Desafo 20", + /*426*/ "Desafo 21", + /*427*/ "Desafo 22", + /*428*/ "Desafo 23", + /*429*/ "Desafo 24", + /*430*/ "Desafo 25", + /*431*/ "Desafo 26", + /*432*/ "Desafo 27", + /*433*/ "Desafo 28", + /*434*/ "Desafo 29", + /*435*/ "Desafo 30", + /*436*/ "Especial\n", + /*437*/ "Introduccin\n", + /*438*/ "Misin 1 - Central dataDyne\n", + /*439*/ "Misin 2 - Villa Carrington\n", + /*440*/ "Misin 3 - Edificio G5\n", + /*441*/ "Misin 4 - チrea 51\n", + /*442*/ "Misin 5 - Air Force One\n", + /*443*/ "Misin 6 - Pelagic II\n", + /*444*/ "Misin 7 - Instituto Carrington\n", + /*445*/ "Misin 8 - Nave de Ataque Skedar\n", + /*446*/ "Misin 9 - Ruinas Skedar\n", + /*447*/ "Final\n", + /*448*/ "Mostrar Todo\n", + /*449*/ "Introduccin\n", + /*450*/ "Intro 1:1 - En la Oscuridad\n", + /*451*/ "Final 1:1 - Descenso R疳ido\n", + /*452*/ "Intro 1:2 - Bajando\n", + /*453*/ "Final 1:2 - El Doctor\n", + /*454*/ "Intro 1:3 - Luces Fuera\n", + /*455*/ "Final 1:3 - ソDnde vas?\n", + /*456*/ "Intro 2:1 - 。Negocia esto!\n", + /*457*/ "Intro 2 2:1 - Vida en Lnea\n", + /*458*/ "Final 2:1 - Carrington Rescatado\n", + /*459*/ "Intro 3:1 - Callejn Oscuro\n", + /*460*/ "Final 3:1 - Entrando al G5\n", + /*461*/ "Intro 3:2 - Armas y Poses\n", + /*462*/ "Especial 3:2 - Conspiracin\n", + /*463*/ "Final 3:2 - Salida de Incendios\n", + /*464*/ "Intro 4:1 - Vdeos\n", + /*465*/ "Final 4:1 - Sin Salida\n", + /*466*/ "Intro 4:2 - Perlas de Sabidura\n", + /*467*/ "Final 4:2 - A Cuchillo\n", + /*468*/ "Intro 4:3 - 。Gas!\n", + /*469*/ "Especial 4:3 - Elvis Despierta\n", + /*470*/ "Final 4:3 - Escape\n", + /*471*/ "Intro 5:1 - Gran Altitud\n", + /*472*/ "Final 5:1 - Despegue\n", + /*473*/ "Intro 5:2 - レltima Oportunidad\n", + /*474*/ "Especial 5:2 - Atraque\n", + /*475*/ "Final 5:2 - Sin Opciones\n", + /*476*/ "Intro 5:3 - Horizontes Rojos\n", + /*477*/ "Final 5:3 - Manaco Rubio\n", + /*478*/ "Intro 6:1 - Sube a Bordo\n", + /*479*/ "Final 6:1 - Descendiendo\n", + /*480*/ "Intro 6:2 - M疽 Profundo\n", + /*481*/ "Especial 6:2 - 。Virus!\n", + /*482*/ "Final 6:2 - Saliendo\n", + /*483*/ "Intro 7:1 - Saludo Victorioso\n", + /*484*/ "Final 7:1 - Ayudando a Escapar\n", + /*485*/ "Intro 8:1 - 。Atrapada!\n", + /*486*/ "Final 8:1 - Buscando Problemas\n", + /*487*/ "Intro 9:1 - Aire en Calma\n", + /*488*/ "Final 9:1 - 。Te pill!\n", + /*489*/ "Secuencia Final\n", + /*490*/ "Pelculas\n", + /*491*/ "Oculto %d\n", + /*492*/ "Escoge Objetivo\n", + /*493*/ "Puntuacin\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/pamE.c b/src/files/lang/pal-final/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-final/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pamJ.c b/src/files/lang/pal-final/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/pal-final/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pamP.c b/src/files/lang/pal-final/pamP.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-final/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_f.c b/src/files/lang/pal-final/pam_str_f.c new file mode 100644 index 000000000..f6ce2d90c --- /dev/null +++ b/src/files/lang/pal-final/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'oc饌n Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alli馥 forc馥: la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif 1: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle de Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif 3: - S馗uriser la Salle de Contrle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrle afin de pouvoir restaurer la personnalit du Dr. Caroll sans interruption. Nous ne savons pas quelles s馗urit駸 ont 騁 mises en place pour emp鹹her cette op駻ation, alors soyez prudente.\n\n|Objectif 4: - Restaurer la personnalit du Dr. Caroll\n\nC'est la derni鑽e 騁ape du plan d'urgence mis en place par le Dr. Caroll durant le debriefing la villa. Restaurer sa personnalit l'I.A. lui permettra de reprendre le contrle de l'enveloppe dou馥 de raison et d'autres parties du vaisseau.\n\n|Objectif 5: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 1*/ "VAISSEAU CETAN\n", + /* 2*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'oc饌n Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alli馥 forc馥: la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais exist.\n\n|Objectif 1: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle de Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif 3: - S馗uriser la Salle de Contrle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrle afin de pouvoir restaurer la personnalit du Dr. Caroll sans interruption. Nous ne savons pas quelles s馗urit駸 ont 騁 mises en place pour emp鹹her cette op駻ation, alors soyez prudente.\n\n|Objectif 4: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin d馗ouvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'oc饌n Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alli馥 forc馥: la dataDyne Corporation.\n\n|Carrington - \n\nLa premi鑽e analyse des donn馥s r騅鑞e des informations incroyables. Nous avons d騁ermin autant d'objectifs que possible partir de ces informations. La gigantesque structure au fond de l'oc饌n est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau dou de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais exist馥.\n\n|Objectif 1: - R饌ctiver les t駘駱orteurs\n\nR饌ctiver les t駘駱orteurs vous permet d'acc馘er des parties du vaisseau qui 騁aient normalement inaccessibles. Si les Skedars ont r騏ssi bloquer l'acc鑚 la Salle de Contrle, le chemin le plus long sera srement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analys馥s, elle est capable de disloquer le faible lien qui maintient les mol馗ules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussi鑽e. A vous donc de jouer: d騁ruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-黎re hors de port馥 des armes normales.\n\n|Objectif 3: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, apr鑚 vous 黎re assur駸 de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, o le croiseur HMAS Newcastle vous r馗up駻era.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "R饌ctiver t駘駱orteurs\n", + /* 6*/ "Neutraliser Super-Arme Cetan\n", + /* 7*/ "S馗uriser la Salle de Contrle\n", + /* 8*/ "Restaurer la personnalit du Dr. Caroll\n", + /* 9*/ "S'馗happer du vaisseau cetan\n", + /* 10*/ "Cela nous aidera nous d駱lacer plus\n vite dans ce vaisseau.\n", + /* 11*/ "Ce camouflage corporel nous aidera nous \nprot馮er des d馭enses automatiques.\n", + /* 12*/ "Voil le Dr. Caroll. Voyons voir si nous \npouvons inverser le processus.\n", + /* 13*/ "On doit se barrer d'ici!\n", + /* 14*/ "Elvis a 騁 tu.\n", + /* 15*/ "Dr. Caroll a 騁 tu.\n", + /* 16*/ "Evacuation du vaisseau Cetan r騏ssie.\n", + /* 17*/ "Elvis a d騅errouill la porte.\n", + /* 18*/ "Tiens, prends cette arme et tiens ces Skedars distance pendant que je travaille.\n", + /* 19*/ "Camouflage corporel obtenu.\n", + /* 20*/ "Super-Arme Cetan neutralis馥.\n", + /* 21*/ "Salle de Contrle s馗uris馥.\n", + /* 22*/ " Personnalit du Dr. Caroll restaur馥.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disque sauvegarde\n", + /* 26*/ "Un disque sauvegarde \n", + /* 27*/ "\n", + /* 28*/ "Un peu de sabotage ne ferait pas de mal\n ce truc.\n", + /* 29*/ "Il est temps de r饌ctiver ces t駘駱orteurs.\n", + /* 30*/ "T駘駱orteurs r饌ctiv駸.\n", + /* 31*/ "C'est bizarre, il n'y a personne dans le coin.\n", + /* 32*/ "Pas de traces de combat. Pas de douilles ou d'impacts d'armes feu.\n", + /* 33*/ "Ca n'a pas de sens. Il devrait au moins y avoir une arri鑽e-garde.\n", + /* 34*/ "Il doit y avoir quelqu'un plus loin. Couvre-moi.\n", + /* 35*/ "C'est parti... J'esp鑽e que la dataDyne n'a rien pr騅u pour emp鹹her 軋...\n", + /* 36*/ "Virus d騁ect.\n", + /* 37*/ "Ca m'apprendra, tiens...\n", + /* 38*/ "Lancement des contre-mesures. Lancem...***ooOOoh!!***aaAAh!!***aaAAAhh!! ***ooOOoh!!***YaaAAAhh!!***YEEAaAaAaAAAaAAaAHHH!!***\n", + /* 39*/ "Dr. Caroll? Avez-vous repris le contrle? Pouvez-vous arr黎er le programme?\n", + /* 40*/ "En effet, me voil de retour, tr鑚 ch鑽e. Le programme est lanc depuis trop longtemps pour que je puisse l'arr黎er. Il n'y a qu'une seule issue maintenant.\n", + /* 41*/ "Que voulez-vous dire?\n", + /* 42*/ "Quand le programme sera termin, j'aurai le contrle d'une arme extr麥ement puissante. Cette arme ne doit pas exister. Je dois par cons駲uent d騁ruire le vaisseau cetan et moi avec, malheureusement. Joanna... Nous n'avons ni le choix ni le temps d'en discuter. Allez-y! Evitez les Skedars et vous aurez le temps de vous 馗happer. Ce fut un honneur de travailler avec vous. Adieu, Joanna Dark.\n", + /* 43*/ "La Super-Arme Cetan a 騁 neutralis馥.\n", + /* 44*/ "Munitions 駱uis馥s - arme ennemie ne peut 黎re d騁ruite.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_g.c b/src/files/lang/pal-final/pam_str_g.c new file mode 100644 index 000000000..ce54ba24b --- /dev/null +++ b/src/files/lang/pal-final/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Zerstren Sie alle Kraftknoten innerhalb des Schiffes. Nur so knnen Sie die Waffe au゚er Kraft setzen. Einige dieser Knoten knnten sich aber au゚erhalb menschlicher Reichweite befinden.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persnlichkeit ungestrt restaurieren knnen. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Restaurieren Sie Dr. Carolls Persnlichkeitsprofil!\n\nDies ist die letzte Stufe des Notfallplans, ber den uns Dr. Caroll bei seinem Aufenthalt in der Villa informiert hat. Wenn seine Persnlichkeit mit der Codeknacker-Einheit verbunden ist, erlangt er nicht nur wieder die Kontrolle ber den Sapienten, sondern auch ber manche Teile des Cetanischen Schiffs.\n\n|5. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 1*/ "CETANISCHES SCHIFF\n", + /* 2*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben,besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persnlichkeit ungestrt restaurieren knnen. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Ziel der Verschwrung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff au゚erirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsf臧ig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Gnstling, der dataDyne Corporation, berrannt.\n\n|Carrington - \n\nBereits die oberfl臘hliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein au゚erirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall tr臠t es die gef臧rlichste Waffe, die Sie sich vorstellen knnen, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar w舐en. Fr den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht fr Sie zwar die Mglichkeit, eine alternative Route zu w臧len, diese ist allerdings wesentlich l舅ger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunf臧ig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfgt ber unvorstellbare Zerstrungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kr臟te, welche alle Molekle zusammenhalten, reversieren kann. Wenn diese Waffe in die H舅de der Skedar ger舩, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Flchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umst舅den zerstrt wird. Anschlie゚end mssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfl臘he. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Reaktivieren Sie die Teleporter!\n", + /* 6*/ "Machen Sie die Waffe funktionsunf臧ig!\n", + /* 7*/ "Sichern Sie den Kontrollraum!\n", + /* 8*/ "Restaurieren Sie Dr. Caroll!\n", + /* 9*/ "Flchten Sie aus dem Schiff!\n", + /* 10*/ "Auf diese Weise kommen wir innerhalb des Schiffs\nschneller voran.\n", + /* 11*/ "Diese Tarnkappe schtzt uns vor den automatischen\nVerteidigungsanlagen.\n", + /* 12*/ "Da ist Dr. Caroll. Wir mssen versuchen,\nseine Persnlichkeit wieder herzustellen.\n", + /* 13*/ "Wir mssen hier raus!\n", + /* 14*/ "Elvis wurde eliminiert.\n", + /* 15*/ "Dr. Caroll wurde zerstrt.\n", + /* 16*/ "Evakuierung erfolgreich\n", + /* 17*/ "Elvis hat die Tr entriegelt.\n", + /* 18*/ "Hier, nimm diese Waffe und halte mir die Skedar\nvom Leib, w臧rend ich hier arbeite.\n", + /* 19*/ "Tarnkappe wurde aufgenommen.\n", + /* 20*/ "Die Cetanische Waffe wurde funktionsunf臧ig gemacht.\n", + /* 21*/ "Kontrollraum wurde gesichert.\n", + /* 22*/ "Dr. Carolls Presnlichkeitsprofil wurde restauriert.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Sicherungsdiskette\n", + /* 26*/ "Eine Sicherungsdiskette\n", + /* 27*/ "\n", + /* 28*/ "Ich glaube, ein klein wenig Sabotage w舐e hier \ndurchaus angebracht.\n", + /* 29*/ "Wir sollten nun diese Teleporter reaktivieren.\n", + /* 30*/ "Teleporter wurde reaktiviert.\n", + /* 31*/ "Irgendwas ist hier faul. Es ist niemand zu sehen.\n", + /* 32*/ "Keine Spuren eines Kampfes. Keine leeren Patronenhlsen oder Einschusslcher.\n", + /* 33*/ "Aber es sollte zumindest noch eine Wache hier sein. Das macht alles keinen Sinn.\n", + /* 34*/ "Vielleicht finden wir weiter drinnen noch jemanden. Gib mir Deckung.\n", + /* 35*/ "Ich hoffe, dass dataDyne nichts unternommen hat, um zu verhindern, dass...\n", + /* 36*/ "Virus entdeckt.\n", + /* 37*/ "Ich und mein gro゚es Mundwerk.\n", + /* 38*/ "Gegenma゚nahmen werden eingeleitet. Gegenma...*** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Haben Sie sich wieder unter Kontrolle? Knnen Sie das Programm stoppen?\n", + /* 40*/ "Ich habe mich wieder unter Kontrolle. Aber das Programm l舫ft schon zu lange. Ich kann es jetzt nicht mehr unterbrechen. Es gibt jetzt nur noch eine Mglichkeit.\n", + /* 41*/ "Wovon sprechen Sie?\n", + /* 42*/ "Wenn das Programm durchgelaufen ist, bin ich der einzige, der diese schreckliche Waffe kontrollieren kann. Ich darf nicht l舅ger existieren. Das Cetanische Schiff muss mit mir zerstrt werden. Es gibt leider keine Alternative, Joanna. Glauben Sie mir! Gehen Sie! Weichen Sie den Skedar aus und flchten Sie! Es war mir eine gro゚e Ehre, mit Ihnen zu arbeiten. Leben Sie wohl, Joanna Dark.\n", + /* 43*/ "Die Cetanische Waffe wurde funktionsunf臧ig gemacht.\n", + /* 44*/ "Munition verschwendet - Die Waffe kann nicht funktionsunf臧ig gemacht werden.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_i.c b/src/files/lang/pal-final/pam_str_i.c new file mode 100644 index 000000000..b95cc1948 --- /dev/null +++ b/src/files/lang/pal-final/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Devi disattivare l'arma distruggendo i punti nevralgici di comando sparsi per l'astronave. Attenta: talvolta le armi normali non fuzioneranno.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Restituisci il cervello al Dr. Caroll\n\nQuesta l'ultima fase del piano di contingenza presentato dal Dr. Caroll durante il suo rapporto alla villa. Riportando il suo cervello alla struttura del decodificatore gli sar restituita la facolt di comando sul Sapiente e su quelle parti dell'astronave Cetan inglobate dal decodificatore. \n\n|Obiettivo 5: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 1*/ "ASTRONAVE CETAN\n", + /* 2*/ "|Situazione:\n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscir a sabotare l'unit di comando dell'arma.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba pi pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetter l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero gi riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilit d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscir a sabotare l'unit di comando dell'arma.\n\n|Obiettivo 3: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unit sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva i teleportali\n", + /* 6*/ "Disattiva la megabomba Cetan \n", + /* 7*/ "Controlla la sala comandi\n", + /* 8*/ "Restituisci il cervello al Dr. Caroll \n", + /* 9*/ "Fuga dall'astronave Cetan\n", + /* 10*/ "Questo ci aiuter a fare il giro \ndell'astronave pi velocemente.\n", + /* 11*/ "Questa immuno-maschera ci protegger \ndalle difese automatiche.\n", + /* 12*/ "Ecco il Dr. Caroll! Vediamo se riusciamo \nancora a recuperarlo.\n", + /* 13*/ "Dobbiamo uscire di qua! Presto!\n", + /* 14*/ "Elvis stato ucciso.\n", + /* 15*/ "Il Dr. Caroll stato ucciso.\n", + /* 16*/ "Evacuazione dall'astronave Cetan riuscita.\n", + /* 17*/ "Elvis ha aperto la porta.\n", + /* 18*/ "To'! Prendi questa e tienimi lontano \nquegli Skedar mentre sto lavorando.\n", + /* 19*/ "Trovata immuno-maschera.\n", + /* 20*/ "Disattivata megabomba Cetan.\n", + /* 21*/ "Sala comandi sotto controllo.\n", + /* 22*/ "Restituito il cervello al Dr. Caroll.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco di backup\n", + /* 26*/ "Disco di backup\n", + /* 27*/ "\n", + /* 28*/ "Sembra che un po' di sabotaggio \nnon possa fargli che bene! \n", + /* 29*/ "ネ ora di riattivare questi teleportali.\n", + /* 30*/ "I teleportali sono stati riattivati.\n", + /* 31*/ "Non normale! Non si vede anima viva!\n", + /* 32*/ "Tutto tranquillo!!! Niente bossoli, niente tracce di proiettili!\n", + /* 33*/ "Ma ci deve essere almeno qualche retroguardia... Non ha senso!!!\n", + /* 34*/ "Ci deve essere qualcuno all'interno. Coprimi!\n", + /* 35*/ "Ecco! Spero solo che la dataDyne non abbia fatto niente per impedire...\n", + /* 36*/ "Trovato un virus.\n", + /* 37*/ "Io e la mia linguaccia!!!\n", + /* 38*/ "Contromisure adottate... Contromi...***(cric... cric... crac... ecc...)*** Non ci posso credere! Quei vandali mi hanno manipolato i circuiti... ***AAAHIIIAAA... cric... crac...\n", + /* 39*/ "Dr. Caroll? Riprenda il controllo di s! Riesce a fermare il programma?\n", + /* 40*/ "S, s, ci sono, mia cara! Ma ho paura che il programma sia andato troppo oltre per poterlo fermare adesso. C' un sola via d'uscita!\n", + /* 41*/ "Cosa significa?\n", + /* 42*/ "Quando il programma avr finito, sar ingrado di comandare una bomba potentissima! Non posso permettermi di restare in vita! Devo distruggere i Cetan e con loro me stesso, sfortunatamente! Mi spiace, Joanna... Non c' altro modo e neanche tempo di discutere la cosa! Ora va! Evita gli Skedar e avrai tutto il tempo di fuggire. ネ stato un onore lavorare con te. Addio, Joanna Dark!\n", + /* 43*/ "La megabomba Cetan stata disattivata.\n", + /* 44*/ "Operazione fallita: megabomba ancora attiva.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_s.c b/src/files/lang/pal-final/pam_str_s.c new file mode 100644 index 000000000..e5346c7b7 --- /dev/null +++ b/src/files/lang/pal-final/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Depende de ti: destruye los nodos de energa a lo largo de la nave, y el arma dejar de ser operativa. Algunos estar疣 fuera del alcance de las armas normales.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegrate de que la Sala de Control est libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qu salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, as que ten cuidado.\n\n|Objetivo Cuatro: - Restaurar la Personalidad del Dr. Caroll\n\nノsta es la ltima fase del plan de contingencia que el Dr. Caroll adelant durante su informe en la Villa. Restaurar su personalidad a la del creador de cdigos de apertura reafirmar su control sobre el caparazn inteligente y aquellas partes de la nave Cetan que como 'rompedor de cdigos' es capaz de tomar.\n\n|Objetivo Cinco: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 1*/ "NAVE CETAN\n", + /* 2*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Elvis sabotear los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegrate de que la Sala de Control est libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qu salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, as que ten cuidado.\n\n|Objetivo Cuatro: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa meta de la conspiracin se conoce por fin: una gigantesca nave aliengena se encuentra en el fondo del Pacfico. Parcialmente org疣ica, aunque inactiva, la nave Cetan est siendo invadida por los Skedar y sus inconscientes vasallos de la Corporacin dataDyne.\n\n|Carrington - \n\nNuestro primer an疝isis de los datos de la investigacin nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido bas疣donos en la interpretacin de estos datos. La gigantesca estructura del fondo oce疣ico es una nave espacial de origen aliengena. Aparentemente es una nave org疣ica, de una raza llamada Cetan, aunque ahora est inactiva. No obstante, aloja el arma m疽 peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significar que tendr疽 acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo ser el nico acceso disponible que podr疽 encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fant疽tica. De acuerdo con las notas de investigacin descifradas, es capaz de invertir la d饕il fuerza nuclear que mantiene las mol馗ulas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertir en una creciente nube de polvo en slo una hora. Elvis sabotear los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la baha de carga despu駸 de asegurar la destruccin de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde ser駟s recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar los teleportales\n", + /* 6*/ "Desactivar la mega-arma Cetan\n", + /* 7*/ "Asegurar la sala de control\n", + /* 8*/ "Restaurar personalidad del Dr. Caroll\n", + /* 9*/ "Escapar de la nave Cetan\n", + /* 10*/ "Esto nos ayudar a recorrer la \nnave m疽 r疳ido.\n", + /* 11*/ "Este disfraz de anticuerpos nos proteger \nde las defensas autom疸icas.\n", + /* 12*/ "Ah est el Dr. Caroll. Veamos si podemos \narreglar lo que le hicieron.\n", + /* 13*/ "。Tenemos que salir de aqu!\n", + /* 14*/ "Elvis ha muerto.\n", + /* 15*/ "El Dr. Caroll ha muerto.\n", + /* 16*/ "Evacuacin de la nave Cetan exitosa.\n", + /* 17*/ "Elvis ha abierto la puerta.\n", + /* 18*/ "Aqu. Coge este arma y mant駭 a los Skedar \nalejados de m mientras trabajo.\n", + /* 19*/ "M疽cara de anticuerpos obtenida.\n", + /* 20*/ "La mega-arma Cetan ha sido desactivada.\n", + /* 21*/ "La Sala de Control ha sido asegurada.\n", + /* 22*/ "La personalidad del Dr. Caroll ha sido restaurada.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco de seguridad\n", + /* 26*/ "Un disco de seguridad\n", + /* 27*/ "\n", + /* 28*/ "Parece que esto puede beneficiarnos para \nun pequeo sabotaje.\n", + /* 29*/ "Es hora de reactivar esos teleportales.\n", + /* 30*/ "Los teleportales han sido reactivados.\n", + /* 31*/ "Esto no es normal. No hay nadie por aqu.\n", + /* 32*/ "No hay seales de lucha. No hay casquillos o agujeros de bala.\n", + /* 33*/ "Pero debera haber un guarda al menos. No tiene sentido.\n", + /* 34*/ "Debe haber alguien m疽 adelante. Cbreme.\n", + /* 35*/ "All vamos. Espero que dataDyne no haya hecho nada para prevenir esto...\n", + /* 36*/ "Virus detectado.\n", + /* 37*/ "。Qu bocaza tengo!\n", + /* 38*/ "Iniciando contramedidas. Inician.....*** 。。ooOOoh!! *** 。。eeEEe!! *** 。。aaAhh!! *** 。。oOOoh!! *** 。。aAArRrgghh!! *** 。。YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "ソDr. Caroll? ソTiene el control de nuevo? ソPuede detener el programa?\n", + /* 40*/ "S, estoy de vuelta, cario. Pero el programa ha estado en marcha demasiado como para detenerlo completamente. Slo existe una manera de acabar con esto...\n", + /* 41*/ "ソQu quiere decir?\n", + /* 42*/ "Cuando el programa haya acabado, tendr el control de un arma devastadoramente poderosa. No puede permitirse mi existencia. As que debo destruir la nave Cetan y a m mismo con ella. Lo siento, Joanna... No hay otra manera, ni tiempo para discutirlo. Vete. Esquiva a los Skedar y tendr疽 tiempo para escapar. Ha sido un honor trabajar contigo. Adis, Joanna Dark.\n", + /* 43*/ "La mega-arma Cetan ha sido inutilizada.\n", + /* 44*/ "Municin desperdiciada - incapaz de desactivar la mega-arma.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/peteE.c b/src/files/lang/pal-final/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-final/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/peteJ.c b/src/files/lang/pal-final/peteJ.c new file mode 100644 index 000000000..dd9f41ca6 --- /dev/null +++ b/src/files/lang/pal-final/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/peteP.c b/src/files/lang/pal-final/peteP.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-final/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_f.c b/src/files/lang/pal-final/pete_str_f.c new file mode 100644 index 000000000..b4a3498b4 --- /dev/null +++ b/src/files/lang/pal-final/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2: - Placer un Pisteur sur la limousine\n\nLa limousine est arriv馥 dans la rue principale peu apr鑚 vous. Toutes les tentatives pour la pister ont 馗hou馥s, il va falloir faire 軋 l'ancienne. Placez le Pisteur sur la limousine. Nous pourrons alors savoir d'o elle vient.\n\n|Objectif 3: - Pr駱arer voie de sortie\n\nIl y a une issue de secours d駸affect馥 l'arri鑽e de l'immeuble du G5 qui vous servira vous enfuir. Pr駱arer le chemin en pla軋nt des explosifs la porte. Pour 騅iter de donner l'alarme, vous devrez d馗lencher la mine une fois le meeting termin.\n\n|Objectif 4: - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 5: - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 1*/ "LES RUES DE CHICAGO\n", + /* 2*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2 - Pr駱arer voie de sortie\n\nIl y a une issue de secours d駸affect馥 l'arri鑽e de l'immeuble du G5 qui vous servira vous enfuir. Pr駱arer le chemin en pla軋nt des explosifs la porte. Pour 騅iter de donner l'alarme, vous devrez d馗lencher la mine une fois le meeting termin.\n\n|Objectif 3 - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 4 - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa Corporation G5 sert de couverture la dataDyne. Il faudra 黎re prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous une forte r駸istance l'int駻ieur comme l'ext駻ieur de l'immeuble. Nos espions ont rapport la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entranement en milieu urbain. La situation n'a pas beaucoup 騅olu depuis la premi鑽e reconnaissance. Faites attention, une unit de s馗urit robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - R馗up駻er l'駲uipement au point de largage\n\nL'escouade de reconnaissance a laiss de l'駲uipement derri鑽e elle pour vous, cach dans une bouche d'馮out. Il y aura tout ce qu'il vous faut pour mener bien votre mission.\n\n|Objectif 2: - Cr馥r une diversion\n\nLes gardes sont tr鑚 vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'馗raser devant les gardes pour cr馥r une diversion.\n\n|Objectif 3: - Entrer dans l'immeuble du G5\n\nUn des gardes pr鑚 de l'entr馥 de l'ascenseur est charg du panneau de contrle qui permet de verrouiller les portes. La diversion engendr馥 par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "R馗up駻er 駲uipement point de largage\n", + /* 10*/ "Placer Pisteur sur limousine\n", + /* 11*/ "Pr駱arer voie de sortie\n", + /* 12*/ "Acqu駻ir cible de diversion\n", + /* 13*/ "Cr馥r diversion\n", + /* 14*/ "Entrer dans l'immeuble du G5\n", + /* 15*/ "Mine bien positionn馥.\n", + /* 16*/ "Mine mal positionn馥.\n", + /* 17*/ "Virus t駘馗harg dans le NavComp.\n", + /* 18*/ "Taxi incontrlable - reprogrammation n馗essaire.\n", + /* 19*/ "Acc鑚 au syst鑪e de navigation du taxi.\n", + /* 20*/ "Virus t駘馗harg.\n", + /* 21*/ "Syst鑪e de navigation taxi reprogramm.\n", + /* 22*/ "Connexion au taxi perdu.\n", + /* 23*/ "Pisteur bien positionn.\n", + /* 24*/ "Pisteur mal positionn.\n", + /* 25*/ "V馼icule crucial d騁ruit.\n", + /* 26*/ "MISSION ECHOUEE\n", + /* 27*/ "MISSION ACCOMPLIE\n", + /* 28*/ "Limousine DataDyne perdue.\n", + /* 29*/ "Mission 馗hou馥 - trop de pertes civiles.\n", + /* 30*/ "Attention - elle a une arme!\n", + /* 31*/ "Y'a une maniaque dans les rues!\n", + /* 32*/ "Alerte Intrus - Envoyez des renforts.\n", + /* 33*/ "Acc鑚 ascenseur scell.\n", + /* 34*/ "H - Qu'est-ce que vous faites l?\n", + /* 35*/ "Pfff. M麥e pas peur!\n", + /* 36*/ "Pisteur remarqu.\n", + /* 37*/ "Salutations, citoyen.\n", + /* 38*/ "Obtenir Mine t駘馗om.\n", + /* 39*/ "Dr. Caroll: \n", + /* 40*/ "Mine t駘馗om\n", + /* 41*/ "Une mine t駘馗om.\n", + /* 42*/ "Mine t駘馗om. obtenue.\n", + /* 43*/ "Obtenir pisteur.\n", + /* 44*/ "Dr Caroll: \n", + /* 45*/ "Pisteur\n", + /* 46*/ "Un pisteur\n", + /* 47*/ "Pisteur obtenu.\n", + /* 48*/ "Les portes ascenseur ne peuvent plus 黎re ouvertes.\n", + /* 49*/ "Obtenir Reprogrammeur.\n", + /* 50*/ "Dr. Caroll: \n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un reprogrammeur\n", + /* 53*/ "Reprogrammeur obtenu.\n", + /* 54*/ "Diversion cr鳬e.\n", + /* 55*/ "Obtenir mine t駘馗om.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Une mine t駘馗om.\n", + /* 59*/ "Mine t駘馗om.\n", + /* 60*/ "Nous avons cach l'駲uipement \ndans une bouche d'馮out.\n", + /* 61*/ "N'importe laquelle de ces portes bloqu馥 \npeut servir de sortie.\n", + /* 62*/ "Reprogrammez ce taxi, c'est un type 2. \nIl devrait 黎re compatible.\n", + /* 63*/ "Cet ascenseur voiture est votre \nseul point d'entr馥.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Une autre diversion a 騁 cr鳬e!\n", + /* 67*/ "Pisteur 騁 d馗ouvert.\n", + /* 68*/ "Nous pensons que le G5 n'est qu'une \ncouverture de la dataDyne et qu'il est \nimpliqu dans ce complot. Je sais que \nCassandra de Vries sera pr駸ente, mais j'ai besoin \nde savoir qui d'autre sera l et de quoi ils \nvont parler. Le temps que vous 騅acuiez, \nles renforts d饕arqueront.\n", + /* 69*/ "Une cavalerie va venir me sauver... \nA qui avez-vous fait appel?\n", + /* 70*/ "Je ne peux rien dire pour l'instant. \nSilence radio! Bonne chance, Joanna!\n", + /* 71*/ "Merci, chef.\n", + /* 72*/ "Mine t駘馗om. g稍h馥.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_g.c b/src/files/lang/pal-final/pete_str_g.c new file mode 100644 index 000000000..9ec3eabc8 --- /dev/null +++ b/src/files/lang/pal-final/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Befestigen Sie das Peilger舩 an der Limousine!\n\nDie Limousine, die auf der Hauptstra゚e steht, ist kurz vor Ihnen eingetroffen. Alle Versuche, ein Peilger舩 anzubringen, sind fehlgeschlagen. Daher muss die Sache wohl auf die altmodische Weise geregelt werden. Platzieren Sie ein Peilger舩 am Wagen, damit wir ihren Weg verfolgen knnen.\n\n|3. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rckseite des G5-Buildings ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als 舫゚erst ntzlich erweisen. In weiterer Folge mssen Sie einen blockierten Durchgang frei sprengen. Sie drfen die Minen allerdings erst znden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|4. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|5. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 1*/ "STRASSEN VON CHICAGO\n", + /* 2*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rckseite des G5-Building ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als 舫゚erst ntzlich erweisen. In weiterer Folge mssen Sie einen blockierten Durchgang frei sprengen. Sie drfen die Minen allerdings erst znden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|3. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|4. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Pr舖enzen auf den Stra゚en ist 舫゚erste Vorsicht oberstes Prinzip. Rechnen Sie au゚erhalb und innerhalb des Geb舫des mit massivem Widerstand. Unser Aufkl舐ungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Fr den Fall, dass das Aufkl舐ungsteam Recht beh舁t, wird es sich als ausgesprochen ntzlich erweisen. Eines noch, Joanna - Auf der Stra゚e patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umst舅den den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrstung!\n\nW臧rend Ihres Transits hat das Aufkl舐ungsteam ein kleines Paket mit der entsprechenden Ausrstung fr Sie hinterlassen. Es wurde in einem der Abwasserkan舁e versteckt. Das Paket enth舁t alles, was Sie zur Komplettierung dieser Mission bentigen.\n\n|2. Ziel: - Starten Sie ein Ablenkungsmanver!\n\nJegliche Strung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand knnte fr Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|3. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist fr die Sicherung der Steuerelemente verantwortlich. Die Tren bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es drfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie die Ausrstung!\n", + /* 10*/ "Befestigen Sie das Peilger舩 am Wagen!\n", + /* 11*/ "Bereiten Sie Ihren Fluchtweg vor!\n", + /* 12*/ "W臧len Sie ein Objekt fr das Ablenkungsmanver!\n", + /* 13*/ "Sorgen Sie fr ein Ablenkungsmanver!\n", + /* 14*/ "Betreten Sie das G5-Building!\n", + /* 15*/ "Mine wurde korrekt platziert.\n", + /* 16*/ "Mine wurde nicht korrekt platziert.\n", + /* 17*/ "Virus wurde bereits installiert.\n", + /* 18*/ "Hover-Cab reagiert nicht - Reprogrammierung erforderlich\n", + /* 19*/ "Zugriff auf das Navigationssystem erfolgt\n", + /* 20*/ "Virus wurde erfolgreich installiert.\n", + /* 21*/ "Navigationssystem wurde reprogrammiert.\n", + /* 22*/ "Verbindung zum Hover-Cab wurde unterbrochen.\n", + /* 23*/ "Peilsender wurde korrekt platziert.\n", + /* 24*/ "Peilsender wurde nicht korrekt platziert.\n", + /* 25*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 26*/ "MISSION FEHLGESCHLAGEN\n", + /* 27*/ "MISSION ERFOLGREICH\n", + /* 28*/ "Die dataDyne-Limousine befindet sich au゚er Reichweite.\n", + /* 29*/ "Mission fehlgeschlagen - Unakzeptable zivile Verluste\n", + /* 30*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 31*/ "Da l舫ft wohl ein Spinner frei herum!\n", + /* 32*/ "Eindringling geortet - Verst舐kung ist unterwegs.\n", + /* 33*/ "Zugriff zum Aufzug ist versiegelt.\n", + /* 34*/ "Hey - Was machen Sie da?\n", + /* 35*/ "Sie machen mir keine Angst.\n", + /* 36*/ "Peilsender wurde gefunden.\n", + /* 37*/ "Sei mir gegr゚t, Brger.\n", + /* 38*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 39*/ "Dr. Carolls\n", + /* 40*/ "Fernznder-Mine\n", + /* 41*/ "Eine Fernznder-Mine\n", + /* 42*/ "Fernznder-Mine aufgenommen\n", + /* 43*/ "Erlangen Sie den Peilsender.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Peilsender\n", + /* 46*/ "Ein Peilsender\n", + /* 47*/ "Peilsender aufgenommen\n", + /* 48*/ "Aufzugstr kann nicht wieder geffnet werden.\n", + /* 49*/ "Erlangen Sie den Programm-Overrider.\n", + /* 50*/ "Dr. Carolls\n", + /* 51*/ "Programm-Overrider\n", + /* 52*/ "Ein Programm-Overrider\n", + /* 53*/ "Programm-Overrider aufgenommen\n", + /* 54*/ "Ablenkungsmanver erfolgreich\n", + /* 55*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Eine Fernznder-Mine\n", + /* 59*/ "Fernznder-Mine aufgenommen\n", + /* 60*/ "Der einzige Ort, an dem wir die Ausrstung sicher unterbringen \nkonnten, ist ein Kanal.\n", + /* 61*/ "Jede dieser blockierten Tren eignet \nsich als Fluchtweg.\n", + /* 62*/ "Reprogrammieren Sie das Taxi! Der Wagen ist vom Typ Mark 2 \nund sollte kompatibel sein.\n", + /* 63*/ "Der einzige Zutritt fr Sie ist der \nAufzug am Parkdeck.\n", + /* 64*/ "EEPROM-Flag wurde gesetzt.\n", + /* 65*/ "EEPROM-Flag wurde gelscht.\n", + /* 66*/ "Es wurde ein alternatives Ablenkungsmanver durchgefhrt!\n", + /* 67*/ "Peilsender wurde entdeckt.\n", + /* 68*/ "Wir vermuten, dass die G5 Corporation nur \nals Tarnung fr dataDyne fungiert. Ich wei゚, \ndass Cassandra de Vries anwesend sein wird. \nAber ich muss wissen, wer au゚erdem an dem \nTreffen teilnimmt und worber gesprochen wird. \nWenn Sie das Geb舫de verlassen, sollte die Hilfe, \ndie ich angefordert habe, eingetroffen sein.\n", + /* 69*/ "Wer ist diese 'Hilfe', auf die Sie sich \nbeziehen?\n", + /* 70*/ "Nicht jetzt, Joanna. Ab jetzt herrscht absolute \nFunkstille. Viel Glck!\n", + /* 71*/ "Hm, herzlichen Dank.\n", + /* 72*/ "Fernznder-Mine wurde verschwendet.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_i.c b/src/files/lang/pal-final/pete_str_i.c new file mode 100644 index 000000000..2e671c664 --- /dev/null +++ b/src/files/lang/pal-final/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Attacca una microspia alla limousine\n\nLa limousine sulla strada principale arrivata poco prima di te. Tutti i tentativi di ricostruirne il percorso sono falliti, quindi bisogner agire nel modo tradizionale. Attacca una microspia alla limousine per poter scoprirne la provenienza.\n\n|Obiettivo 3: - Prepara la via di fuga\n\nDietro all'Edificio G5 c' un'uscita antincendio abbandonata che ti sar sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 4: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 5: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 1*/ "STRADE DI CHICAGO\n", + /* 2*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Prepara la via di fuga\n\nDietro all'Edificio G5 c' un'uscita antincendio abbandonata che ti sar sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 3: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 4: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sar molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c' un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: l troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirer l'attenzione delle guardie l intorno, ma questo pu anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente l vicino.\n\n|Obiettivo 3: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Va a prendere l'attrezzatura\n", + /* 10*/ "Attacca una microspia alla limousine\n", + /* 11*/ "Prepara la via di fuga\n", + /* 12*/ "Identifica obiettivo di distrazione\n", + /* 13*/ "Distrai le forze di sicurezza\n", + /* 14*/ "Entra nell'Edificio G5\n", + /* 15*/ "Mina piazzata correttamente\n", + /* 16*/ "Mina in posizione errata\n", + /* 17*/ "Virus gi scaricato nel computer.\n", + /* 18*/ "Computer non risponde: serve riprogrammatore.\n", + /* 19*/ "Accesso al sistema di navigazione.\n", + /* 20*/ "Virus scaricato correttamente.\n", + /* 21*/ "Computer di navigazione riprogrammato.\n", + /* 22*/ "Interrotto collegamento al computer.\n", + /* 23*/ "Microspia piazzata correttamente.\n", + /* 24*/ "Microspia in posizione errata.\n", + /* 25*/ "Distrutto veicolo essenziale alla missione.\n", + /* 26*/ "MISSIONE FALLITA\n", + /* 27*/ "MISSIONE COMPIUTA\n", + /* 28*/ "La limousine dataDyne riuscita a scappare.\n", + /* 29*/ "Missione fallita - Vittime civili inaccettabili.\n", + /* 30*/ "Attenzione! Ha una pistola!\n", + /* 31*/ "ネ pazza! ネ pazza! Rinchiudetela!!!\n", + /* 32*/ "Allarme intrusione - Mandate rinforzi!\n", + /* 33*/ "Bloccato l'accesso all'ascensore.\n", + /* 34*/ "Ehi, cosa stai facendo?\n", + /* 35*/ "Non mi fai paura!\n", + /* 36*/ "La microspia stata scoperta.\n", + /* 37*/ "Saluti!!!\n", + /* 38*/ "Procurati mina a distanza.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina distanza\n", + /* 42*/ "Presa mina a distanza.\n", + /* 43*/ "Procurati microspia.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "Microspia\n", + /* 46*/ "Microspia\n", + /* 47*/ "Presa microspia.\n", + /* 48*/ "Impossibile riaprire porta ascensore.\n", + /* 49*/ "Procurati riprogrammatore.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Riprogramm.\n", + /* 52*/ "Riprogramm.\n", + /* 53*/ "Preso riprogrammatore.\n", + /* 54*/ "Creata la distrazione.\n", + /* 55*/ "Procurati mina a distanza.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Mina distanza\n", + /* 59*/ "Presa mina a distanza.\n", + /* 60*/ "L'unico posto in cui stato possibile \nnascondere gli strumenti era il canale.\n", + /* 61*/ "Una di quelle porte bloccate pu \nessere un'ottima via di fuga.\n", + /* 62*/ "Riprogramma quel taxi: un Mark 2, \ndovrebbe essere compatibile!\n", + /* 63*/ "Quell'ascensore nel parcheggio \n l'unica entrata possibile!\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Creata distrazione alternativa!\n", + /* 67*/ "La microspia stata scoperta.\n", + /* 68*/ "Sospettiamo che la G5 Corporation sia \nsolo una copertura per la dataDyne e per \nchiunque altro sia coinvolto in questo \ncomplotto. So per certo che sar presente \nCassandra de Vries, ma devo anche scoprire \nchi altro ci sar e di che cosa si parler. \nAl momento che uscirai i rinforzi che ho \nrichiesto saranno gi arrivati.\n", + /* 69*/ "Solo una cosa, chi sono questi \n'rinforzi'?\n", + /* 70*/ "Non adesso, Joanna. ネ ora del silenzio \nradio. In bocca al lupo!\n", + /* 71*/ "Grazie tante!!!\n", + /* 72*/ "Sprecata mina a distanza.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_s.c b/src/files/lang/pal-final/pete_str_s.c new file mode 100644 index 000000000..451c3591f --- /dev/null +++ b/src/files/lang/pal-final/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Colocar el Rastreador en la Limusina\n\nLa limusina de la calle principal lleg poco antes que t. Todos los intentos de rastrearla han sido intiles, as que tendremos que hacerlo a la vieja usanza. Coloca un 'bicho' en la limusina para que as podamos rastrear adnde se dirige.\n\n|Objetivo Tres: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detr疽 del Edificio G5 que nos puede ser til para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Cuatro: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cinco: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 1*/ "CALLES DE CHICAGO\n", + /* 2*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detr疽 del Edificio G5 que nos puede ser til para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Tres: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cuatro: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSe cree que la Corporacin G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que est疣 reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te ser muy til si la situacin no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa m疽, Joanna: hay robots de seguridad patrullando la calle. Al駛ate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dej un pequeo paquete con equipo para ti, oculto en los desages. Contiene todo lo que necesitas para completar los objetivos de la misin.\n\n|Objetivo Dos: - Crear Distraccin Mvil\n\nCualquier alboroto puede atraer la atencin de los guardas de la zona, pero esto tambi駭 puede ser ventajoso. Reprograma el piloto autom疸ico del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Tres: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor est a cargo de un panel de control que cerrar las puertas del mismo inmediatamente. La distraccin causada por el choque del taxi puede sacar a ese guarda y sus compaeros a la calle, dejando el camino abierto. Recuerda, no debes daar a los civiles.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Recuperar el equipo\n", + /* 10*/ "Colocar el rastreador en la limusina\n", + /* 11*/ "Preparar la ruta de escape\n", + /* 12*/ "Adquirir blancos de distraccin\n", + /* 13*/ "Crear distraccin mvil\n", + /* 14*/ "Entrar en el edificio G5\n", + /* 15*/ "Mina colocada correctamente.\n", + /* 16*/ "Mina colocada incorrectamente.\n", + /* 17*/ "Virus ya implantado en el Navegador.\n", + /* 18*/ "El aerotaxi no responde: requiere Reprogramacin.\n", + /* 19*/ "Accediendo al sistema de navegacin del aerotaxi.\n", + /* 20*/ "Virus descargado satisfactoriamente.\n", + /* 21*/ "Sistema de navegacin del taxi reprogramado.\n", + /* 22*/ "Conexin con el aerotaxi perdida.\n", + /* 23*/ "'Bicho' Rastreador colocado correctamente.\n", + /* 24*/ "'Bicho' Rastreador colocado incorrectamente.\n", + /* 25*/ "Vehculo crtico de la misin destruido.\n", + /* 26*/ "MISIモN FALLADA\n", + /* 27*/ "MISIモN CONSEGUIDA\n", + /* 28*/ "La limusina de dataDyne ha escapado.\n", + /* 29*/ "Misin fallada: bajas civiles inaceptables.\n", + /* 30*/ "Cuidado. 。Tiene un arma!\n", + /* 31*/ "。Hay un manaco suelto!\n", + /* 32*/ "Alerta de Intruso: refuerzos enviados.\n", + /* 33*/ "Acceso del ascensor sellado.\n", + /* 34*/ "。Hey! ソQu haces?\n", + /* 35*/ "No me asustas.\n", + /* 36*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 37*/ "Bienvenido, ciudadano.\n", + /* 38*/ "Obt駭 la Mina Remota.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Una Mina Remota\n", + /* 42*/ "Mina Remota obtenida.\n", + /* 43*/ "Obt駭 el 'Bicho' Rastreador.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "'Bicho' R.\n", + /* 46*/ "Un 'Bicho' Rastreador\n", + /* 47*/ "'Bicho' Rastreador obtenido.\n", + /* 48*/ "La puerta del ascensor no puede reabrirse.\n", + /* 49*/ "Obt駭 el Reprogramador.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un Reprogramador\n", + /* 53*/ "Reprogramador obtenido.\n", + /* 54*/ "Distraccin en marcha.\n", + /* 55*/ "Obt駭 la Mina Remota.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Una Mina Remota\n", + /* 59*/ "Mina Remota obtenida.\n", + /* 60*/ "El nico lugar donde pudimos asegurar \nel equipo fue en un desage.\n", + /* 61*/ "Cada una de esas puertas bloqueadas \npuede ser una ruta de escape.\n", + /* 62*/ "Reprograma ese taxi: es un Mark 2 \ny debe ser compatible.\n", + /* 63*/ "Ese elevador de coches es el \nnico punto de acceso.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "。Una distraccin alternativa ha sido creada!\n", + /* 67*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 68*/ "Sospechamos que la Corporacin G5 es slo una \ntapadera de dataDyne y que est tambi駭 \nenvuelta en este complot. S que Cassandra \nDe Vries va a estar aqu, pero necesito \nsaber qui駭 m疽 va a venir y sobre qu \nvan a discutir. Una vez salgas, la ayuda \nque solicit estar esperando.\n", + /* 69*/ "ソPero a qu ayuda te est疽 \nrefiriendo?\n", + /* 70*/ "Ahora no, Joanna. Mant駭 la radio en silencio. \n。Buena suerte!\n", + /* 71*/ "Muchas gracias.\n", + /* 72*/ "La Mina Remota ha sido desperdiciada.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobjE.c b/src/files/lang/pal-final/propobjE.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-final/propobjE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobjJ.c b/src/files/lang/pal-final/propobjJ.c new file mode 100644 index 000000000..fc459a214 --- /dev/null +++ b/src/files/lang/pal-final/propobjJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "ammo", + /* 3*/ "cartridge", + /* 4*/ "magnum bullet", + /* 5*/ "golden bullet", + /* 6*/ "hand grenade", + /* 7*/ "grenade round", + /* 8*/ "rocket", + /* 9*/ "homing rocket", + /* 10*/ "remote mine", + /* 11*/ "proximity mine", + /* 12*/ "timed mine", + /* 13*/ "combat ", + /* 14*/ "knife", + /* 15*/ "knives", + /* 16*/ "s", + /* 17*/ "dart", + /* 18*/ "n-bomb", + /* 19*/ "drugs", + /* 20*/ "explosive pen", + /* 21*/ "explosive case", + /* 22*/ "flare", + /* 23*/ "piton", + /* 24*/ "of dynamite", + /* 25*/ "stick ", + /* 26*/ "sticks ", + /* 27*/ "bug", + /* 28*/ "micro camera", + /* 29*/ "GoldenEye key", + /* 30*/ "token", + /* 31*/ "plastique", + /* 32*/ "Picked up a key.\n", + /* 33*/ "Picked up a shield.\n", + /* 34*/ "A shield.\n", + /* 35*/ "Picked up something.\n", + /* 36*/ "This door is locked.\n", + /* 37*/ "bolt", + /* 38*/ "orb", + /* 39*/ "Reaper ammo", + /* 40*/ "cloaking device", + /* 41*/ "speed pill", + /* 42*/ "your ", + /* 43*/ "YOUR some ", + /* 44*/ "Some ", + /* 45*/ "a ", + /* 46*/ "A ", + /* 47*/ "an ", + /* 48*/ "An ", + /* 49*/ "the ", + /* 50*/ "The ", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, + /* 68*/ NULL, + /* 69*/ NULL, + /* 70*/ NULL, + /* 71*/ NULL, + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, + /* 76*/ NULL, + /* 77*/ NULL, + /* 78*/ NULL, + /* 79*/ NULL, + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobjP.c b/src/files/lang/pal-final/propobjP.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-final/propobjP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_f.c b/src/files/lang/pal-final/propobj_str_f.c new file mode 100644 index 000000000..504f77ac0 --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtenu.\n", + /* 1*/ "%s obtenue.\n", + /* 2*/ "", + /* 3*/ "", + /* 4*/ "%s obtenus.\n", + /* 5*/ "%s obtenues.\n", + /* 6*/ "", + /* 7*/ "", + /* 8*/ "Double ", + /* 9*/ "Munitions", + /* 10*/ "Cartouche", + /* 11*/ "Balle Magnum", + /* 12*/ "balle en or", + /* 13*/ "Grenade", + /* 14*/ "Munit. grenade", + /* 15*/ "Roquette", + /* 16*/ "Roquette t黎e cher.", + /* 17*/ "Mine t駘馗om.", + /* 18*/ "Mine prox.", + /* 19*/ "Mine retard.", + /* 20*/ "Couteau combat", + /* 21*/ "Couteaux combat", + /* 22*/ "Fl馗hette", + /* 23*/ "Bombe-N", + /* 24*/ "S馘atif", + /* 25*/ "stylo explosif", + /* 26*/ "malle explosive", + /* 27*/ "fus馥", + /* 28*/ "piton", + /* 29*/ "de dynamite", + /* 30*/ "b穰on ", + /* 31*/ "b穰ons ", + /* 32*/ "mouchard", + /* 33*/ "micro camera", + /* 34*/ "Cl GoldenEye", + /* 35*/ "jeton", + /* 36*/ "plastique", + /* 37*/ "Cl obtenue.\n", + /* 38*/ "Bouclier obtenu.\n", + /* 39*/ "Un bouclier.\n", + /* 40*/ "El駑ent obtenu.\n", + /* 41*/ "Cette porte est ferm馥.\n", + /* 42*/ "Carreau", + /* 43*/ "Orbe", + /* 44*/ "Munit. Reaper", + /* 45*/ "Occulteur", + /* 46*/ "Pilule boost", + /* 47*/ "votre ", + /* 48*/ "Votre ", + /* 49*/ "des ", + /* 50*/ "Des ", + /* 51*/ "des ", + /* 52*/ "Des ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "une ", + /* 60*/ "Une ", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Carreaux", + /* 66*/ "Orbes", + /* 67*/ "Munit. Reaper", + /* 68*/ "Occulteurs", + /* 69*/ "Pilules boost", + /* 70*/ "Munitions", + /* 71*/ "Cartouches", + /* 72*/ "Balles Magnum", + /* 73*/ "Balles en or", + /* 74*/ "Grenades", + /* 75*/ "Munit. grenades", + /* 76*/ "Roquettes", + /* 77*/ "Roquettes t黎e cher.", + /* 78*/ "Mines t駘馗om.", + /* 79*/ "Mines prox.", + /* 80*/ "Mines retard.", + /* 81*/ "Fl馗hettes", + /* 82*/ "Bombes-N", + /* 83*/ "S馘atifs", + /* 84*/ "jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_g.c b/src/files/lang/pal-final/propobj_str_g.c new file mode 100644 index 000000000..bce046735 --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s aufgenommen\n", + /* 1*/ "%s aufgenommen\n", + /* 2*/ "%s aufgenommen\n", + /* 3*/ "%s aufgenommen\n", + /* 4*/ "%s aufgenommen\n", + /* 5*/ "%s aufgenommen\n", + /* 6*/ "%s aufgenommen\n", + /* 7*/ "%s aufgenommen\n", + /* 8*/ "Doppel ", + /* 9*/ "Munition", + /* 10*/ "Magazin", + /* 11*/ "Magnum-Kugel", + /* 12*/ "goldene Kugel", + /* 13*/ "Granate", + /* 14*/ "Granatwerfer-Munition", + /* 15*/ "Rakete", + /* 16*/ "Zielsuch-Rakete", + /* 17*/ "Fernznder-Mine", + /* 18*/ "Ann臧erungs-Mine", + /* 19*/ "Zeitznder-Mine", + /* 20*/ "Kampfmesser", + /* 21*/ "Kampfmesser", + /* 22*/ "Pfeil", + /* 23*/ "N-Bombe", + /* 24*/ "Bet舫bungsgeschoss", + /* 25*/ "Explosiver Kugelschreiber", + /* 26*/ "Explosiver Koffer", + /* 27*/ "Leuchtkugel", + /* 28*/ "Felshaken", + /* 29*/ "Dynamit-", + /* 30*/ "Stab ", + /* 31*/ "St臙e ", + /* 32*/ "Peilsender", + /* 33*/ "Mikro-Kamera", + /* 34*/ "GoldenEye-Schlssel", + /* 35*/ "Symbol", + /* 36*/ "Plastik", + /* 37*/ "Schlssel aufgenommen\n", + /* 38*/ "Schild aufgenommen\n", + /* 39*/ "Ein Schild\n", + /* 40*/ "Etwas wurde aufgenommen.\n", + /* 41*/ "Diese Tr ist verschlossen.\n", + /* 42*/ "Bolzen", + /* 43*/ "Kraftzelle", + /* 44*/ "Reaper-Munition", + /* 45*/ "Tarnkappe", + /* 46*/ "St舐kungs-Pille", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Bolzen", + /* 66*/ "Kraftzellen", + /* 67*/ "Reaper-Munition", + /* 68*/ "Tarnkappen", + /* 69*/ "St舐kungs-Pillen", + /* 70*/ "Munition", + /* 71*/ "Magazin", + /* 72*/ "Magnum-Kugeln", + /* 73*/ "Goldkugeln", + /* 74*/ "Granaten", + /* 75*/ "Granatwerfer-Munition", + /* 76*/ "Raketen", + /* 77*/ "Zielsuch-Raketen", + /* 78*/ "Fernznder-Minen", + /* 79*/ "Ann臧erungs-Minen", + /* 80*/ "Zeitznder-Minen", + /* 81*/ "Pfeile", + /* 82*/ "N-Bomben", + /* 83*/ "Bet舫bungsgeschosse", + /* 84*/ "Jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_i.c b/src/files/lang/pal-final/propobj_str_i.c new file mode 100644 index 000000000..91b90bb2b --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Preso %s\n", + /* 1*/ "Presa %s\n", + /* 2*/ "Presa %s\n", + /* 3*/ "Preso %s\n", + /* 4*/ "Presi %s\n", + /* 5*/ "Prese %s\n", + /* 6*/ "Prese %s\n", + /* 7*/ "Prese %s\n", + /* 8*/ "Doppio ", + /* 9*/ "munizioni", + /* 10*/ "cartuccia", + /* 11*/ "pallottola magnum", + /* 12*/ "pallottola d'oro", + /* 13*/ "granata", + /* 14*/ "granata a giro", + /* 15*/ "missile", + /* 16*/ "missile di ritorno", + /* 17*/ "mina a distanza", + /* 18*/ "mina di prossimit", + /* 19*/ "mina a tempo", + /* 20*/ "pugnale da lotta", + /* 21*/ "pugnali da lotta", + /* 22*/ "freccia", + /* 23*/ "bomba-n", + /* 24*/ "sedativi", + /* 25*/ "penna esplosiva", + /* 26*/ "cassa esplosiva", + /* 27*/ "fiamma", + /* 28*/ "chiodo", + /* 29*/ "di dinamite", + /* 30*/ "carica ", + /* 31*/ "cariche ", + /* 32*/ "cimice", + /* 33*/ "microcamera", + /* 34*/ "chiave GoldenEye", + /* 35*/ "buono", + /* 36*/ "plastica", + /* 37*/ "Presa chiave.\n", + /* 38*/ "Preso scudo.\n", + /* 39*/ "uno scudo.\n", + /* 40*/ "Preso qualcosa.\n", + /* 41*/ "La porta chiusa.\n", + /* 42*/ "dardo", + /* 43*/ "globo", + /* 44*/ "munizioni Falciatore", + /* 45*/ "Dispositivo mimetico", + /* 46*/ "Pillola booster", + /* 47*/ "la ", + /* 48*/ "La ", + /* 49*/ "dei ", + /* 50*/ "Presi ", + /* 51*/ "delle ", + /* 52*/ "Prese ", + /* 53*/ "", + /* 54*/ "Prese ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "un'", + /* 62*/ "Un'", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "dardi", + /* 66*/ "globi", + /* 67*/ "munizioni Falciatore", + /* 68*/ "Dispositivo mimetico", + /* 69*/ "Pillole booster", + /* 70*/ "munizioni", + /* 71*/ "cartucce", + /* 72*/ "pallottole magnum", + /* 73*/ "pallottole d'oro", + /* 74*/ "granate", + /* 75*/ "granate a giro", + /* 76*/ "missili", + /* 77*/ "missili a giro", + /* 78*/ "mine a distanza", + /* 79*/ "mine di prossimit", + /* 80*/ "mine a tempo", + /* 81*/ "frecce", + /* 82*/ "bombe-n", + /* 83*/ "sedativi", + /* 84*/ "gettoni", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_s.c b/src/files/lang/pal-final/propobj_str_s.c new file mode 100644 index 000000000..a197bb941 --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Recogiste %s.\n", + /* 1*/ "Recogiste %s.\n", + /* 2*/ "Recogiste %s.\n", + /* 3*/ "Recogiste %s.\n", + /* 4*/ "Recogiste %s.\n", + /* 5*/ "Recogiste %s.\n", + /* 6*/ "Recogiste %s.\n", + /* 7*/ "Recogiste %s.\n", + /* 8*/ "Doble ", + /* 9*/ "municin", + /* 10*/ "cartucho", + /* 11*/ "bala de magnum", + /* 12*/ "balas doradas", + /* 13*/ "granada", + /* 14*/ "cinto de granadas", + /* 15*/ "cohete", + /* 16*/ "cohete buscador", + /* 17*/ "mina remota", + /* 18*/ "mina de proximidad", + /* 19*/ "mina de tiempo", + /* 20*/ "cuchillo de combate", + /* 21*/ "cuchillos de combate", + /* 22*/ "dardo", + /* 23*/ "bomba-N", + /* 24*/ "sedante", + /* 25*/ "Boli Explosivo", + /* 26*/ "Caja de Explosivos", + /* 27*/ "Bengalas", + /* 28*/ "Pitn", + /* 29*/ "", + /* 30*/ "Cartucho de Dinamita", + /* 31*/ "Cartuchos de Dinamita", + /* 32*/ "Bicho", + /* 33*/ "Microc疥ara", + /* 34*/ "Llave GoldenEye", + /* 35*/ "Ficha", + /* 36*/ "Explosivo Pl疽tico", + /* 37*/ "Has cogido una Llave.\n", + /* 38*/ "Has cogido un Escudo.\n", + /* 39*/ "Un Escudo.\n", + /* 40*/ "Has cogido algo.\n", + /* 41*/ "Esta puerta est cerrada.\n", + /* 42*/ "saeta", + /* 43*/ "orbe", + /* 44*/ "municin Segadora", + /* 45*/ "disp. de ocultacin", + /* 46*/ "reforzador", + /* 47*/ "tu ", + /* 48*/ "Tu ", + /* 49*/ "algunos ", + /* 50*/ "Algunos ", + /* 51*/ "algunas ", + /* 52*/ "Algunas ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "unos", + /* 62*/ "Unos", + /* 63*/ "unas", + /* 64*/ "Unas", + /* 65*/ "saetas", + /* 66*/ "orbes", + /* 67*/ "Municin Segadora", + /* 68*/ "disp. de ocultacin", + /* 69*/ "reforzadores", + /* 70*/ "Municin", + /* 71*/ "cartuchos", + /* 72*/ "balas de magnum", + /* 73*/ "balas doradas", + /* 74*/ "granadas", + /* 75*/ "cintos de granadas", + /* 76*/ "cohetes", + /* 77*/ "cohetes buscadores", + /* 78*/ "minas remotas", + /* 79*/ "minas de proximidad", + /* 80*/ "minas de tiempo", + /* 81*/ "dardos", + /* 82*/ "bombas-N", + /* 83*/ "sedantes", + /* 84*/ "fichas", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/refE.c b/src/files/lang/pal-final/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/refJ.c b/src/files/lang/pal-final/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/refP.c b/src/files/lang/pal-final/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_f.c b/src/files/lang/pal-final/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_g.c b/src/files/lang/pal-final/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_i.c b/src/files/lang/pal-final/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_s.c b/src/files/lang/pal-final/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ritE.c b/src/files/lang/pal-final/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-final/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/ritJ.c b/src/files/lang/pal-final/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/pal-final/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/ritP.c b/src/files/lang/pal-final/ritP.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-final/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_f.c b/src/files/lang/pal-final/rit_str_f.c new file mode 100644 index 000000000..fee1613b8 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser et r馗up駻er l'駲uipement\n\nTrouvez l'駲uipement dissimul dans la soute bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'駲uipe de s馗urit du Pr駸ident est neutre et qu'elle ne doit pas 黎re attaqu馥.\n\n|Objectif 2: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connu. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 3: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - S馗urisez le plan de vol de Air Force One\n\nLes d騁ails du plan de Trent sont encore inconnus, mais nous pensons que l'駲uipage de l'avion sera en danger. Vous devrez acc馘er la cabine de pilotage pour d馗ouvrir ce qu'il pr駱are. Si la situation 馗happe votre contrle, activez l'auto-pilote.\n\n|Objectif 5: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One. La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser et r馗up駻er l'駲uipement\n\nTrouvez l'駲uipement dissimul dans la soute bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'駲uipe de s馗urit du Pr駸ident est neutre et qu'elle ne doit pas 黎re attaqu馥.\n\n|Objectif 2: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connu. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 3: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One. La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Pr駸ident est commenc. L'institut Carrington veut parer cette manoeuvre en d駱la軋nt le Pr駸ident de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compt, Joanna. Pour d駛ouer les plans de Trent il faut que vous d駱laciez le Pr駸ident de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute bagages afin de les montrer au Pr駸ident.\n\n|Objectif 1: - Localiser le Pr駸ident\n\nL'emplacement exact du Pr駸ident ne nous est pas connu. Une fois que vous aurez trouv son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation son avantage.\n\n|Objectif 2: - Placer le Pr駸ident dans la capsule\n\nIl y a une capsule d'騅acuation plac馥 l'arri鑽e de l'appareil. Escortez le Pr駸ident jusqu' cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 3: - D騁acher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reli馥 Air Force One. La fa輟n la plus rapide serait de faire exploser une mine dans le connecteur lui-m麥e. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localiser et r馗up駻er 駲uipement\n", + /* 6*/ "Localiser Pr駸ident\n", + /* 7*/ "Placer Pr駸ident dans capsule\n", + /* 8*/ "S馗uriser plan de vol de Air Force One\n", + /* 9*/ "D騁acher OVNI de Air Force One\n", + /* 10*/ "Obtenir mallette.\n", + /* 11*/ "\n", + /* 12*/ "Mallette\n", + /* 13*/ "Mallette\n", + /* 14*/ "Mallette obtenue.\n", + /* 15*/ "Obtenir Arbal鑼e.\n", + /* 16*/ "\n", + /* 17*/ "Arbal鑼e\n", + /* 18*/ "Arbal鑼e\n", + /* 19*/ "Arbal鑼e obtenue.\n", + /* 20*/ "Trop de victimes neutres.\n", + /* 21*/ "Connexion l'OVNI d騁ruite.\n", + /* 22*/ "Impossible de d騁ruire connexion OVNI.\n", + /* 23*/ "Auto-pilote enclench.\n", + /* 24*/ "Air Force One stabilis.\n", + /* 25*/ "Syst鑪e Auto-pilote d騁ruit.\n", + /* 26*/ "Le Pr駸ident est K.O.\n", + /* 27*/ "Pilotes tu駸.\n", + /* 28*/ "Pilotes sauv駸.\n", + /* 29*/ "Air Force One va s'馗raser.\n", + /* 30*/ "Obtenir mine t駘馗om.\n", + /* 31*/ "\n", + /* 32*/ "Mine t駘馗om.\n", + /* 33*/ "Mine t駘馗om.\n", + /* 34*/ "Mine t駘馗om. obtenue.\n", + /* 35*/ "Qui 黎es-vous, jeune fille?\n", + /* 36*/ "Securit, SECURITE!!\n", + /* 37*/ "Mr. le Pr駸ident, vous 黎es en danger. Trent va essayer \nde vous kidnapper.\n", + /* 38*/ "Mais? Que se passe-t-il?!\n", + /* 39*/ "Vous devez gagner sans tarder la capsule de secours! \nSuivez-moi!\n", + /* 40*/ "Avez-vous des preuves pour avancer de tels propos?\n Vos accusations sont tr鑚 graves.\n", + /* 41*/ "Voici l'enregistrement de la r騏nion entre \nTrent et ses sbires conspirateurs.\n", + /* 42*/ "C'est effrayant... Je vous crois. \nQue fait-on maintenant?\n", + /* 43*/ "H, ce n'est pas...\n", + /* 44*/ "C'est un intrus...\n", + /* 45*/ "Comment avez-vous fait pour monter bord?\n", + /* 46*/ "Bon, r馗up駻ons les preuves.\n", + /* 47*/ "Le bureau du Pr駸ident est dans \nle secteur, Joanna.\n", + /* 48*/ "Il y a quelque chose de bizarre... Foncez la cabine de pilotage! \n", + /* 49*/ "Peut-黎re une mine pourrait d騁ruire la connexion l'OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pilule d'adr駭aline\n", + /* 53*/ "Pilule d'adr駭aline\n", + /* 54*/ "Pilule d'adr駭aline obtenue.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Carte\n", + /* 58*/ "Carte\n", + /* 59*/ "Carte obtenue.\n", + /* 60*/ "Soute baiss馥.\n", + /* 61*/ "Soute lev馥.\n", + /* 62*/ "Objet crucial d騁ruit.\n", + /* 63*/ "Acc鑚 refus - Carte ascenseur requise.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Carte ascenseur\n", + /* 67*/ "Carte ascenseur \n", + /* 68*/ "Carte ascenseur obtenue.\n", + /* 69*/ "Mine retardement.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "C'est trop tard, tu ne pourras pas le sauver.\n", + /* 72*/ "Le Pr駸ident est attaqu.\n", + /* 73*/ "Avez-vous r馭l馗hi la proposition que je vous ai pr駸ent馥, monsieur?\n", + /* 74*/ "Ma r駱onse est toujours la m麥e: d駸ol Trent, c'est non. Je ne confierai pas le Pelagic II la dataDyne. Changeons de sujet, voulez-vous!\n", + /* 75*/ "Mais c'est l'occasion en or de montrer que l'Am駻ique a foi en son industrie et que vous 黎es pr黎 les...\n", + /* 76*/ "Ca suffit, quand je dis non c'est non! Je ne vais pas changer d'avis sur ce sujet! Je veux que mes conseillers soient impartiaux, et vous ne me donnez pas cette impression, Trent. Le sujet est clos. C'est votre derni鑽e chance. Je ne reviendrai pas sur ma d馗ision.\n", + /* 77*/ "Comme vous voulez, monsieur.\n", + /* 78*/ "Ma derni鑽e chance? Ha! Pauvre fou. C'騁ait plutt la tienne, cr騁in!\n", + /* 79*/ "Elvis! Elvis! Je n'arrive pas d騁acher ce tube du fuselage! Peux-tu t'en charger?\n", + /* 80*/ "Un jeu d'enfant, Joanna. Regarde-moi faire!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "Regarder quoi? Et si tu faisais dans l'efficace pour une fois, ouvre le feu!\n", + /* 83*/ "Je n'ai plus le choix... Joanna, accroche-toi, 軋 va secouer!\n", + /* 84*/ "Les pilotes ont stabilis Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_g.c b/src/files/lang/pal-final/rit_str_g.c new file mode 100644 index 000000000..0f8ffdee8 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen, ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identen vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrstung!\n\nFinden Sie die Ausrstung, die im Gep臘kraum im Bauch des Flugzeugs fr Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Pr舖identen um neutrale Personen handelt, denen kein Schaden zugefgt werden darf.\n\n|2. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie dem Pr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|4. Ziel: - Sichern Sie die Flugroute der Air Force One!\n\nGenauere Informationen ber Trents Plan sind uns nicht bekannt. Wir vermuten aber, dass sich das Flugpersonal in hchster Gefahr befindet. Gehen Sie ins Cockpit und versichern Sie sich, dass es der Crew gut geht. Im schlimmsten anzunehmenden Fall mssen Sie den Autopiloten aktivieren.\n\n|5. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identen vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrstung!\n\nFinden Sie die Ausrstung, die im Gep臘kraum im Bauch des Flugzeugs fr Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Pr舖identen um neutrale Personen handelt, denen kein Schaden zugefgt werden darf.\n\n|2. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie dem Pr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|4. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Eastons Plan den Pr舖identen zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Pr舖identen aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, mssen Sie den Pr舖identen aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Pr舖identen von Trents Betrug berzeugen mssen. Dazu mssen Sie den Beweis im Gep臘kraum finden und dem Pr舖identen vorlegen.\n\n|1. Ziel: - Finden Sie den Pr舖identen!\n\nDie exakte Lage des Pr舖identen-Bros ist nicht bekannt. Legen Sie dem Pr舖identen den Beweis vor, um ihn von der Konspiration zu berzeugen. Sie mssen das Bro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|2. Ziel: - Bringen Sie den Pr舖identen zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Pr舖identen zur Kapsel, und sorgen Sie fr seine Sicherheit!\n\n|3. Ziel: - Lsen Sie die Verankerung des UFOs!\n\nLsen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie knnen dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden und bergen Sie die Ausrstung!\n", + /* 6*/ "Finden Sie den Pr舖identen!\n", + /* 7*/ "Bringen Sie den Pr舖identen zur Kapsel!\n", + /* 8*/ "Sichern Sie die Flugroute!\n", + /* 9*/ "Lsen Sie die Verankerung des UFOs!\n", + /* 10*/ "Finden Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer wurde aufgenommen\n", + /* 15*/ "Erlangen Sie die Armbrust!\n", + /* 16*/ "\n", + /* 17*/ "Armbrust\n", + /* 18*/ "Armbrust\n", + /* 19*/ "Armbrust wurde aufgenommen\n", + /* 20*/ "Es sind zu viele neutrale Verluste zu beklagen.\n", + /* 21*/ "Verankerung wurde zerstrt.\n", + /* 22*/ "Verankerung kann nicht gelst werden.\n", + /* 23*/ "Autopilot wurde aktiviert.\n", + /* 24*/ "Der Flug der Air Force One wurde stabilisiert.\n", + /* 25*/ "Der Autopilot wurde zerstrt.\n", + /* 26*/ "Der Pr舖ident wurde schwer verletzt.\n", + /* 27*/ "Die Piloten wurden eliminiert.\n", + /* 28*/ "Die Piloten befinden sich in Sicherheit.\n", + /* 29*/ "Die Air Force One ist im Begriff, abzustrzen.\n", + /* 30*/ "Erlangen Sie die Fernznder-Mine.\n", + /* 31*/ "\n", + /* 32*/ "Fernznder-Mine\n", + /* 33*/ "Fernznder-Mine\n", + /* 34*/ "Fernznder-Mine aufgenommen\n", + /* 35*/ "Wer sind Sie, junge Dame?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, Sie befinden sich in Gefahr. Trent versucht, \nSie zu kidnappen.\n", + /* 38*/ "Was, zur Hlle, war das?\n", + /* 39*/ "Rasch! Wir mssen zur Fluchtkapsel. \nFolgen Sie mir!\n", + /* 40*/ "Sie knnen solche Anschuldigungen nicht vorbringen, ohne\n stichhaltige Beweise zu haben.\n", + /* 41*/ "Ich habe eine Aufzeichnung des Meetings von\nTrent und den anderen Verschwrern.\n", + /* 42*/ "Das ist mehr als berzeugend. Ich vertraue Ihnen.\nWas sollen wir jetzt tun?\n", + /* 43*/ "Hey, das ist nicht...\n", + /* 44*/ "Ein Eindringling...\n", + /* 45*/ "Wie sind Sie an Bord gekommen?\n", + /* 46*/ "Dann suchen wir mal nach dem Beweis.\n", + /* 47*/ "Das Bro des Pr舖identen befindet \nsich auf diesem Level.\n", + /* 48*/ "Irgendetwas stimmt nicht... Sie mssen zum Cockpit!\n", + /* 49*/ "Vielleicht kann das UFO mit einer Mine gelst werden.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalin-Kapsel\n", + /* 53*/ "Adrenalin-Kapsel\n", + /* 54*/ "Adrenalin-Kapsel aufgenommen\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Schlsselkarte\n", + /* 58*/ "Schlsselkarte\n", + /* 59*/ "Schlsselkarte aufgenommen\n", + /* 60*/ "Laderaum wurde abgesenkt.\n", + /* 61*/ "Laderaum wurde angehoben.\n", + /* 62*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 63*/ "Zugriff verweigert - Aufzugs-Karte erforderlich\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Aufzugs-Karte\n", + /* 67*/ "Aufzugs-Karte\n", + /* 68*/ "Aufzugs-Karte aufgenommen\n", + /* 69*/ "Die Zeitznder-Mine wurde ineffektiv eingesetzt.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "Jetzt kannst du ihn nicht mehr retten.\n", + /* 72*/ "Der Pr舖ident wird attackiert.\n", + /* 73*/ "Haben Sie nochmals ber meinen Vorschlag nachgedacht, Sir?\n", + /* 74*/ "Meine Antwort bleibt unver舅dert. Es tut mir leid, Trent, aber ich sage nein. Ich werde die Pelagic II nicht an dataDyne verleihen. Knnen wir uns jetzt bitte anderen Themen zuwenden?\n", + /* 75*/ "Aber das w舐e die beste Gelegenheit, um zu beweisen, dass die Regierung Vertrauen in die amerikanische Industrie hat, und...\n", + /* 76*/ "Verdammt noch mal! Wenn ich nein sage, dann meine ich nein! Ich werde meine Meinung dahingehend nicht 舅dern. Ich brauche meine Berater, um unvoreingenommen zu bleiben. In letzter Zeit haben Sie mir nicht unbedingt unparteiische Ratschl臠e erteilt. Hren Sie nun endlich damit auf. Das ist Ihre letzte Chance.\n", + /* 77*/ "Wie Sie wnschen, Sir.\n", + /* 78*/ "Meine letzte Chance? Ha! Du dummer Narr. Das war DEINE letzte Chance!\n", + /* 79*/ "Elvis! Elvis! Ich kann die Verankerung des UFOs nicht lsen! Kannst du das erledigen?\n", + /* 80*/ "Das ist ein Kinderspiel, Joanna. Pass auf und lerne!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Lerne was? Kannst du endlich mit dem Quatsch aufhren und schie゚en?\n", + /* 83*/ "Ende der Fahnenstange... Joanna, bereite dich auf den Aufprall vor!\n", + /* 84*/ "Die Piloten konnten die Air Force One stabilisieren.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_i.c b/src/files/lang/pal-final/rit_str_i.c new file mode 100644 index 000000000..7bb65c525 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, n tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Accerta rotta di volo Air Force One\n\nNon siamo a conoscenza dei dettagli del piano di Trent, ma riteniamo che il personale di volo sia in pericolo. Va nella cabina di pilotaggio e assicurati che stiano bene. Se accaduto l'irreparabile, attiva il pilota automatico!\n\n|Obiettivo 5: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, n tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ci significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare l prima di Trent o sta sicura che sar in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 2: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 3: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo pi semplice e veloce quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Trova e recupera l'attrezzatura\n", + /* 6*/ "Localizza il Presidente\n", + /* 7*/ "Porta il Presidente alla capsula\n", + /* 8*/ "Accerta rotta di volo Air Force One\n", + /* 9*/ "Stacca la capsula dall'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati balestra.\n", + /* 16*/ "\n", + /* 17*/ "Balestra\n", + /* 18*/ "Balestra\n", + /* 19*/ "Presa balestra.\n", + /* 20*/ "Implicate vittime civili.\n", + /* 21*/ "Danneggiato collegamento a capsula.\n", + /* 22*/ "Impossibile staccare capsula.\n", + /* 23*/ "Attivato pilota automatico.\n", + /* 24*/ "L'Air Force One stato stabilizzato.\n", + /* 25*/ "Distrutto pilota automatico.\n", + /* 26*/ "Il Presidente stato ucciso.\n", + /* 27*/ "I piloti sono stati uccisi.\n", + /* 28*/ "I piloti sono stati salvati.\n", + /* 29*/ "L'Air Force One sta per schiantarsi.\n", + /* 30*/ "Procurati mina a distanza.\n", + /* 31*/ "\n", + /* 32*/ "Mina distanza\n", + /* 33*/ "Mina distanza\n", + /* 34*/ "Presa mina a distanza.\n", + /* 35*/ "E lei chi sarebbe?\n", + /* 36*/ "Sicurezza, SICUREZZA!!!\n", + /* 37*/ "Signor Presidente, lei in pericolo. Trent sta \ntentando di rapirla!\n", + /* 38*/ "Cosa diavolo stato?!\n", + /* 39*/ "Dobbiamo raggiungere la capsula di salvataggio! \nMi segua!\n", + /* 40*/ "Non pu mica andare in giro a fare certe accuse \nsenza prove concrete!!! Spero che abbia \nuna valida spiegazione!\n", + /* 41*/ "Questa una registrazione della riunione \ntra Trent e gli altri cospiratori!\n", + /* 42*/ "Una prova schiacciante... Sono nelle sue mani! \nCosa dobbiamo fare?\n", + /* 43*/ "Ehi, non ...\n", + /* 44*/ "ネ un intruso...\n", + /* 45*/ "Come diavolo sei salita a bordo?\n", + /* 46*/ "ネ ora di recuperare le prove!\n", + /* 47*/ "L'ufficio del Presidente su \nquesto piano, Joanna!\n", + /* 48*/ "C' qualcosa che non quadra... Devi andare nella cabina di pilotaggio, presto!\n", + /* 49*/ "Forse la capsula si pu staccare con una mina.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Compressa di adrenalina\n", + /* 53*/ "Compressa di adrenalina\n", + /* 54*/ "Presa compressa di adrenalina.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Tessera magnetica\n", + /* 58*/ "Tessera magnetica\n", + /* 59*/ "Presa tessera magnetica.\n", + /* 60*/ "Abbassato bagagliaio.\n", + /* 61*/ "Alzato bagagliaio.\n", + /* 62*/ "Distrutto strumento essenziale alla missione.\n", + /* 63*/ "Accesso negato - Serve tessera ascensore.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Tessera ascensore\n", + /* 67*/ "Tessera ascensore\n", + /* 68*/ "Presa tessera ascensore.\n", + /* 69*/ "La mina a orologeria stata sprecata.\n", + /* 70*/ "Ah, ah, ah , ah!!!\n", + /* 71*/ "Oramai non puoi pi salvarlo!\n", + /* 72*/ "Stanno attaccando il Presidente!!!\n", + /* 73*/ "Ha pi pensato alla proposta che le ho fatto, signore?\n", + /* 74*/ "La mia risposta sempre la stessa, Trent! No, mi dispiace! Non metter il Pelagic II a disposizione della dataDyne. Ora possiamo cambiare argomento, per favore?\n", + /* 75*/ "Ma questa un'occasione d'oro per dimostrare che l'America ha piena fiducia nel suo tessuto industriale e che lo sostiene...\n", + /* 76*/ "Maledizione! Ho detto NO ed NO! Non mi far cambiare idea su questo punto Trent! I miei consiglieri devono essere imparziali e negli ultimi tempi non si pu proprio dire che lei lo sia stato! Lasciamo perdere e dimentichiamo l'accaduto! Questa la sua ultima possibilit, Trent!\n", + /* 77*/ "Come preferisce, signor Presidente!\n", + /* 78*/ "La MIA ultima possibilit? Si sbaglia di grosso: questa era la SUA!\n", + /* 79*/ "Elvis! Elvis! Non riesco a staccare il tubo dalla fusoliera! Tu ce la fai?\n", + /* 80*/ "Elementare, Joanna. Guarda qua!\n", + /* 81*/ "Eee... hop!\n", + /* 82*/ "Guarda cosa? La vuoi piantare di giocare e sparare una buona volta?!\n", + /* 83*/ "Non abbiamo scelta... Joanna, preparati all'impatto!\n", + /* 84*/ "I piloti hanno stabilizzato l'Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_s.c b/src/files/lang/pal-final/rit_str_s.c new file mode 100644 index 000000000..cd2cba581 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, deber疽 sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avin, y tr疇lo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser daados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Cuatro: - Asegurar la Trayectoria de Vuelo del Air Force One\n\nNo se conocen los detalles especficos del plan de Trent, pero se cree que la tripulacin est en peligro. Llega hasta la cabina y asegrate de su bienestar. Si ocurre lo peor, activa el piloto autom疸ico.\n\n|Objetivo Cinco: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avin, y tr疇lo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser daados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Cuatro: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente est en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avin. Esto lo convencer de la traicin de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos ensear al Presidente.\n\n|Objetivo Uno: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegrate de llegar all antes de que lo haga Trent, o puedes estar segura de que manipular la situacin a su favor.\n\n|Objetivo Dos: - Llevar al Presidente a la C疳sula de Escape\n\nExiste una c疳sula de escape de emergencia en la baha inferior del avin. Escolta al Presidente hasta la c疳sula, asegur疣dote de que no recibe ningn dao.\n\n|Objetivo Tres: - Separar el OVNI del Air Force One\n\n。Separa la conexin umbilical del Air Force One! La manera m疽 r疳ida de hacerlo es detonar una mina en la propia conexin. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localizar y recuperar el equipo\n", + /* 6*/ "Localizar al Presidente\n", + /* 7*/ "Llevar al Presidente a la c疳sula\n", + /* 8*/ "Asegurar trayectora del Air Force One\n", + /* 9*/ "Separar el OVNI del Air Force One\n", + /* 10*/ "Obt駭 la Maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obt駭 la Ballesta.\n", + /* 16*/ "\n", + /* 17*/ "Ballesta\n", + /* 18*/ "Ballesta\n", + /* 19*/ "Ballesta obtenida.\n", + /* 20*/ "Has causado demasiadas bajas neutrales.\n", + /* 21*/ "Conexin del OVNI daado.\n", + /* 22*/ "Incapaz de separar el OVNI.\n", + /* 23*/ "El Piloto Autom疸ico ha sido activado.\n", + /* 24*/ "El Air Force One ha sido estabilizado.\n", + /* 25*/ "El Piloto Autom疸ico ha sido destruido.\n", + /* 26*/ "El Presidente ha sido eliminado.\n", + /* 27*/ "Los pilotos han muerto.\n", + /* 28*/ "Los pilotos han sido salvados.\n", + /* 29*/ "El Air Force One est a punto de estrellarse.\n", + /* 30*/ "Obt駭 la mina remota.\n", + /* 31*/ "\n", + /* 32*/ "Mina remota\n", + /* 33*/ "Mina remota\n", + /* 34*/ "Mina remota obtenida.\n", + /* 35*/ "ソQui駭 es usted, jovencita?\n", + /* 36*/ "。。Seguridad, SEGURIDAD!!\n", + /* 37*/ "Sr. Presidente, est usted en peligro. Trent intenta \nsecuestrarle.\n", + /* 38*/ "。Qu demonios es eso!\n", + /* 39*/ "Debemos llevarle a la c疳sula de escape. \nSgame.\n", + /* 40*/ "No puede hacer acusaciones como 駸a sin evidencias.\n ソAsumo que tendr alguna?\n", + /* 41*/ "ノsta es una grabacin de una reunin entre \nTrent y los otros conspiradores.\n", + /* 42*/ "Parece abrumador... Estoy en sus manos. \nソQu hacemos ahora?\n", + /* 43*/ "Hey, t no eres...\n", + /* 44*/ "Es una intrusa...\n", + /* 45*/ "ソCmo ha subido a bordo?\n", + /* 46*/ "Ahora, recuperemos la evidencia.\n", + /* 47*/ "La habitacin del Presidente est en \neste nivel, Joanna.\n", + /* 48*/ "Algo va mal... 。Debes llegar a la cabina!\n", + /* 49*/ "Quiz una mina separe el OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalina\n", + /* 53*/ "Pastilla de Adrenalina\n", + /* 54*/ "Pastilla de Adrenalina obtenida.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Llave magn騁ica\n", + /* 58*/ "Llave magn騁ica \n", + /* 59*/ "Llave magn騁ica obtenida.\n", + /* 60*/ "La baha de carga ha sido bajada.\n", + /* 61*/ "La baha de carga ha sido subida.\n", + /* 62*/ "Objeto crtico de la misin destruido.\n", + /* 63*/ "Acceso denegado: llave magn騁ica del ascensor requerida.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Llave ascensor\n", + /* 67*/ "Llave magn騁ica del ascensor \n", + /* 68*/ "Llave magn騁ica del ascensor obtenida.\n", + /* 69*/ "La mina de tiempo ha sido desperdiciada.\n", + /* 70*/ "Ja, ja, ja, ja, ja.\n", + /* 71*/ "Ahora ya no podr疽 salvarle.\n", + /* 72*/ "Est疣 atacando al Presidente.\n", + /* 73*/ "ソHa reconsiderado algo m疽 la propuesta que le hice, seor?\n", + /* 74*/ "Mi respuesta es la misma: lo siento, Trent, pero no. No quiero prestar el Pelagic II a dataDyne. Por favor, ソpodemos ahora tratar otras cuestiones?\n", + /* 75*/ "Pero 駸ta es una oportunidad de oro para demostrar que Am駻ica tiene fe en sus industrias y que las apoya...\n", + /* 76*/ "。Maldicin! 。He dicho no y significa no! 。No pienso cambiar de opinin! Necesito que mis asesores sean imparciales, y ahora no me est疽 dando la imparcialidad que necesito. D駛alo, y no hablemos m疽 de ello. Es tu ltima oportunidad.\n", + /* 77*/ "Como quiera, seor.\n", + /* 78*/ "ソMi ltima oportunidad? 。Ja! Idiota. Fue la tuya...\n", + /* 79*/ "。Elvis! 。Elvis! 。No puedo soltar ese tubo del fuselaje! ソPuedes hacerlo t?\n", + /* 80*/ "Pan comido, Joanna. 。Mira esto!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "ソMirar, qu? ソQuieres dejar de juguetear? 。Dispara!\n", + /* 83*/ "No hay m疽 opciones... 。Joanna, prep疵ate para el impacto!\n", + /* 84*/ "Los pilotos han estabilizado el Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/runE.c b/src/files/lang/pal-final/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/runJ.c b/src/files/lang/pal-final/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/runP.c b/src/files/lang/pal-final/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_f.c b/src/files/lang/pal-final/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_g.c b/src/files/lang/pal-final/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_i.c b/src/files/lang/pal-final/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_s.c b/src/files/lang/pal-final/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevE.c b/src/files/lang/pal-final/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-final/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevJ.c b/src/files/lang/pal-final/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/pal-final/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevP.c b/src/files/lang/pal-final/sevP.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-final/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_f.c b/src/files/lang/pal-final/sev_str_f.c new file mode 100644 index 000000000..0394aff11 --- /dev/null +++ b/src/files/lang/pal-final/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Saboter le labo d'exp駻imentation ennemi\n\nDes exp駻iences sont conduites sur le corps de l'ambassadeur. Je dois mener bien ma t稍he de Protecteur, pour cela je dois d騁ruire ce corps.\n\n|Objectif 2: - D騁ruire le vaisseau maian captur饅n\nMon dernier objectif sera de d騁ruire les restes du vaisseau avec lequel je suis arriv sur Terre. Si quelqu'un d馗ouvre la ressemblance entre nos technologies et celles de l'Institut Carrington nos alli駸 seront en danger et j'aurai 馗hou dans ma mission.\n\n|Objectif 3: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 1*/ "SECTEUR 51, NEVADA, TERRE\n", + /* 2*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Saboter le labo d'exp駻imentation ennemi\n\nDes exp駻iences sont conduites sur le corps de l'ambassadeur. Je dois mener bien ma t稍he de Protecteur, pour cela je dois d騁ruire ce corps.\n\n|Objectif 2: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nProtocole de capture d'urgence activ. Appareil XD-310372 a subit de gros d馮穰s apr鑚 le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut plan鑼e: paranoa degr 'B+,' intol駻ance degr 'B,' x駭ophobie degr 'A.' D騁ruire 駲uipement afin d'emp鹹her toute 騁ude de technologie maian par les habitants de cette plan鑼e.\n\n|Objectif 1: - Envoyer un message de d騁resse aux alli駸\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connatront ma position et ma situation. Ils pourront ainsi d騁ruire tout 駘駑ent hors de ma port馥.\n\nFIN\n", + /* 4*/ "Saboter labo de tests\n", + /* 5*/ "D騁ruire vaisseau maian captur饅n", + /* 6*/ "Activer le signal de d騁resse\n", + /* 7*/ "Labo de tests sabot.\n", + /* 8*/ "Vaisseau maian captur d騁ruit.\n", + /* 9*/ "Signal de d騁resse activ.\n", + /* 10*/ "Objet crucial d騁ruit.\n", + /* 11*/ "Mission 馗hou馥 - impossible de quitter labo de tests.\n", + /* 12*/ "Voie de sortie alternative activ馥.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_g.c b/src/files/lang/pal-final/sev_str_g.c new file mode 100644 index 000000000..35de19d9a --- /dev/null +++ b/src/files/lang/pal-final/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibende Ausrstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, fr die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Krper Experimente durchgefhrt werden. Um meine Pflicht als Maianischer Protektor zu erfllen, muss ich dafr Sorge tragen, dass der Krper zerstrt wird.\n\n|2. Ziel: - Zerstren Sie das Maianische Schiff!\n\nMein letzter Akt der Pflichterfllung besteht darin, das Schiff, mit dem ich die Erde erreicht habe, zu zerstren. Sollte irgendjemand feststellen, dass die sich an Bord befindliche Technologie der des Carrington Instituts 臧nlich ist, geraten unsere Verbndeten auf der Erde in Gefahr, und meine Mission ist gescheitert.\n\n|3. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 1*/ "AREA 51, NEVADA, ERDE\n", + /* 2*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibende Ausrstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, fr die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Krper Experimente durchgefhrt werden. Um meine Pflicht als Maianischer Protektor zu erfllen, muss ich dafr Sorge tragen, dass der Krper zerstrt wird.\n\n|2. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige ワberlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Pr-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstren Sie die verbleibende Ausrstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Senden Sie ein Notsignal an Ihre Verbndeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, knnen sie meine Position feststellen. Um die technische Ausrstung, die ich nicht finde, wird sich dann das Institut kmmern.\n\nENDE\n", + /* 4*/ "Sabotieren Sie das Experiment!\n", + /* 5*/ "Zerstren Sie das Maianische Schiff!\n", + /* 6*/ "Senden Sie ein Notsignal!\n", + /* 7*/ "Medizinisches Experiment wurde sabotiert.\n", + /* 8*/ "Das Maianische Schiff wurde zerstrt.\n", + /* 9*/ "Notsignal wurde gesendet.\n", + /* 10*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 11*/ "MISSION FEHLGESCHLAGEN - Flucht ist nicht mehr mglich.\n", + /* 12*/ "Es wurde eine alternative Fluchtroute gefunden.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_i.c b/src/files/lang/pal-final/sev_str_i.c new file mode 100644 index 000000000..904104465 --- /dev/null +++ b/src/files/lang/pal-final/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Elimina la navicella Maian sequestrata\n\nL'ultimo mio dovere sar quello di distruggere quel che rimane della navicella Maian con cui sono arrivato sulla Terra. Se qualcuno scoprisse che la tecnologia di costruzione simile a quella delle 'invenzioni' del Carrington Institute, i nostri alleati sulla Terra sarebbero in grave pericolo e io avrei fallito la mia missione.\n\n|Obiettivo 3: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 1*/ "AREA 51, NEVADA, TERRA\n", + /* 2*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 4*/ "Sabotaggio esperimento medico nemico\n", + /* 5*/ "Elimina la navicella Maian sequestrata\n", + /* 6*/ "Invia segnale di pericolo\n", + /* 7*/ "L'esperimento medico stato sabotato.\n", + /* 8*/ "La navicella Maian stata distrutta.\n", + /* 9*/ "Il segnale di pericolo stato inviato.\n", + /* 10*/ "Distrutto strumento essenziale alla missione.\n", + /* 11*/ "Missione fallita - Impossibile uscire dal laboratorio\n", + /* 12*/ "Trovata via di fuga alternativa.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_s.c b/src/files/lang/pal-final/sev_str_s.c new file mode 100644 index 000000000..bae650920 --- /dev/null +++ b/src/files/lang/pal-final/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento M馘ico Enemigo\n\nEst疣 experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme de que el cuerpo es destruido.\n\n|Objetivo Dos: - Destruir la Nave Maian capturada\n\nMi ltimo acto y mi deber ser destruir lo que queda del vehculo en el que llegu a la Tierra. Si alguien descubre que su tecnologa es similar a la de las 'invenciones' del Instituto Carrington, nuestros aliados terrcolas estar疣 en peligro, y habremos fallado.\n\n|Objetivo Tres: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 1*/ "チREA 51, NEVADA, TIERRA\n", + /* 2*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento M馘ico Enemigo\n\nEst疣 experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme que el cuerpo es destruido.\n\n|Objetivo Dos: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha cado en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el nico superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnologa Maian y/o del personal.\n\n|Objetivo Uno: - Enviar una Seal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podr ayudarme. Si pudiera enviarles un mensaje, sabran dnde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podr疣 hacerlo.\n\nFIN\n", + /* 4*/ "Sabotear experimento m馘ico enemigo\n", + /* 5*/ "Destruir platillo Maian capturado\n", + /* 6*/ "Activar la seal de socorro\n", + /* 7*/ "El experimento m馘ico ha sido saboteado.\n", + /* 8*/ "El platillo Maian ha sido destruido.\n", + /* 9*/ "La seal de socorro ha sido enviada.\n", + /* 10*/ "Objeto crtico de la misin ha sido destruido.\n", + /* 11*/ "Misin fallada: no puedes escapar del laboratorio.\n", + /* 12*/ "Ruta de escape alternativa encontrada.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevbE.c b/src/files/lang/pal-final/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevbJ.c b/src/files/lang/pal-final/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevbP.c b/src/files/lang/pal-final/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_f.c b/src/files/lang/pal-final/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_g.c b/src/files/lang/pal-final/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_i.c b/src/files/lang/pal-final/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_s.c b/src/files/lang/pal-final/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevxE.c b/src/files/lang/pal-final/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxJ.c b/src/files/lang/pal-final/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxP.c b/src/files/lang/pal-final/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_f.c b/src/files/lang/pal-final/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_g.c b/src/files/lang/pal-final/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_i.c b/src/files/lang/pal-final/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_s.c b/src/files/lang/pal-final/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxbE.c b/src/files/lang/pal-final/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxbJ.c b/src/files/lang/pal-final/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxbP.c b/src/files/lang/pal-final/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_f.c b/src/files/lang/pal-final/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_g.c b/src/files/lang/pal-final/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_i.c b/src/files/lang/pal-final/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_s.c b/src/files/lang/pal-final/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/shoE.c b/src/files/lang/pal-final/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-final/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/shoJ.c b/src/files/lang/pal-final/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/pal-final/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/shoP.c b/src/files/lang/pal-final/shoP.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-final/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_f.c b/src/files/lang/pal-final/sho_str_f.c new file mode 100644 index 000000000..d69096fcb --- /dev/null +++ b/src/files/lang/pal-final/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion Skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situ la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, nous pouvons seulement garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Acc馘er au Centre du Sanctuaire\n\nTu dois parcourir et explorer le d馘ale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter une r駸istance acharn馥. Tu vas te d駱lacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Eliminer l'arm馥 Skedar\n\nLe haut commandement maian pense que des soldats skedars sont gard駸 dans des champs de stase l'int駻ieur de cette installation. Si cela est vrai, il faudra les d騁ruire. La derni鑽e chose dont nous avons besoin c'est une arm馥 de fanatiques psychotiques.\n\n|Objectif 5: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 1*/ "AUTEL DE BATAILLE SKEDAR\n", + /* 2*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes skedars se cache dans un Temple de la guerre plac la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, je peux seulement te garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Acc馘er au centre du Sanctuaire\n\nTu dois parcourir et explorer le d馘ale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter une r駸istance acharn馥. Tu vas te d駱lacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin d馗ouvert le sanctuaire de la religion skedar. Il se trouve sur une plan鑼e d駸ertique. Le chef des terroristes skedars se cache dans un Temple de la guerre situ la surface de la plan鑼e. La destruction du Temple et l'駘imination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement strat馮ique. De plus, je veux 黎re sr de l'駘imination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois ob駘isques la surface. Ils forment une sorte de g駭駻ateur de bouclier 駭erg騁ique qui serait susceptible de prot馮er le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait cr鳬 une fissure qui s駱are le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont install un gigantesque pont escamotable qui permet d'y acc馘er, je peux seulement te garantir qu'il sera extr麥ement bien gard.\n\n|Objectif 3: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, v駭駻 par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme leur d駸ir de conqu黎e galactique. La paix pourra ainsi r馮ner.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Identifier les cibles du Temple\n", + /* 6*/ "Activer le pont\n", + /* 7*/ "Acc馘er au centre du sanctuaire\n", + /* 8*/ "D騁ruire l'arm馥 secr鑼e Skedar\n", + /* 9*/ "Assassiner le chef des Skedars\n", + /* 10*/ "Obtenir Vue nocturne.\n", + /* 11*/ "\n", + /* 12*/ "Vue nocturne\n", + /* 13*/ "Vue nocturne\n", + /* 14*/ "Vue nocturne obtenue.\n", + /* 15*/ "Obtenir scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner obtenu.\n", + /* 20*/ "Obtenir Ampli cible.\n", + /* 21*/ "\n", + /* 22*/ "Ampli cible\n", + /* 23*/ "Ampli cible\n", + /* 24*/ "Ampli cible obtenu.\n", + /* 25*/ "Ampli cible positionn correctement.\n", + /* 26*/ "Ampli cible mal positionn.\n", + /* 27*/ "G駭駻ateur activ.\n", + /* 28*/ "Centre du sanctuaire Skedar atteint.\n", + /* 29*/ "Arm馥 secr鑼e Skedar d騁ruite.\n", + /* 30*/ "Ca ressemble un des piliers que je suis cens馥 trouver.\n", + /* 31*/ "Cette zone est plus stable. \nLe sanctuaire doit 黎re proche.\n", + /* 32*/ "OH, NON!!! Une arm馥 skedar en animation suspendue!\n", + /* 33*/ "Tr鑚 bien, il faut trancher la t黎e...le reste p駻ira lentement.\n", + /* 34*/ "Voici le saint des saints des fanatiques skedars. Ils pensent que cette plan鑼e est sacr馥. L'Autel de Bataille est le lieu le plus v駭駻 de cette plan鑼e.\n", + /* 35*/ "Je vois. Cet endroit est sacr pour eux. Mais ce n'est pas tout, il y a autre chose, n'est-ce pas?", + /* 36*/ "En effet. Depuis le temps que les Maians se battent contre les Skedars, nous n'avons jamais pu trouver cet endroit. Sa destruction est la cl de la victoire. Nous avons combattu jusqu' obtenir un cessez-le-feu, mais nous avons toujours 騁 sur nos gardes. La destruction de cet endroit pourra enfin donner une chance la paix.\n", + /* 37*/ "Nous devons 黎re certains qu'aucun fanatique ne survivra. Je vais m'occuper du chef. Il faudra que tu pr駱ares l'armada maian pour pulv駻iser ce satan temple.\n", + /* 38*/ "Il faudra que tu t'enfuies avant les bombardements, nous n'allons pas faire dans le d騁ail.\n", + /* 39*/ "Je ne compte pas vraiment m'騁erniser.\n", + /* 40*/ "Ouiii...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Par ici.\n", + /* 43*/ "Pas de probl鑪e. Attrape mon bras. On va te sortir de l.\n", + /* 44*/ "Non, vite! Donne-moi ton arme!\n", + /* 45*/ "Fous le camp!\n", + /* 46*/ "J'ai r騏ssi retarder le bombardement, la flotte est en attente. Ils vont commencer d鑚 que nous serons partis.\n", + /* 47*/ "Je m'en serais tir馥 si ce gros lourdaud ne m'avait pas attrap le pied.\n", + /* 48*/ "J'en suis sr, Joanna, j'en suis sr.\n", + /* 49*/ "Non, je te dis que je l'aurais fait.\n", + /* 50*/ "Mais je te crois.\n", + /* 51*/ "Fais tes pri鑽es au dieu de la guerre.\n", + /* 52*/ "Plus de grenades - Impossible d'entrer dans le Temple.\n", + /* 53*/ "Autre acc鑚 au Temple cr鳬.\n", + /* 54*/ "O es-tu? Tout va bien?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_g.c b/src/files/lang/pal-final/sho_str_g.c new file mode 100644 index 000000000..ec4420891 --- /dev/null +++ b/src/files/lang/pal-final/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth fhrt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gl舫big.\n\n|4. Ziel: - Vernichten Sie die geheime Skedar-Armee!\n\nDas Hohe Kommando der Maianer vermutet, dass eine gro゚e Anzahl von sich in Stasis befindlichen Skedar an geheimen Orten untergebracht ist. Der Schrein knnte einer dieser Orte sein. Wenn das der Fall ist, muss er zerstrt werden. Das Letzte, was wir jetzt brauchen knnen, ist ein nicht enden wollender Strom von psychotischen Fanatikern.\n\n|5. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth fhrt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gl舫big.\n\n|4. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anfhrer der terroristischen Skedar-Fraktion h舁t sich in einem Schrein auf der Oberfl臘he des Planeten auf. Die Zerstrung des Schreins und der Tod ihres Anfhrers wrde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfgbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels mssen fr die Bombardierung als Ziele markiert werden. Au゚erdem mssen wir absolut sichergehen, dass der Anfhrer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er ber einen starken Schutzschild verfgt, der jeglichem Beschuss standh舁t. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstren mssen, um den Anfhrer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilger舩e an jedem der drei Obelisken auf der Oberfl臘he. Sie sind Bestandteil eines besch臈igten, aber immer noch funktionstchtigen Schildgenerators. Wird dieser nicht au゚er Kraft gesetzt, knnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brcke!\n\nSie mssen ein Loch in die Au゚enmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet st舅dig erschttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brcke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie mssen aber davon ausgehen, dass die Brcke streng bewacht wird.\n\n|3. Ziel: - Eliminieren Sie den Anfhrer der Skedar!\n\nDer Anfhrer der Skedar genie゚t bei seinen Gefolgsleuten gro゚es Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhrliche Kriegszug durch die Galaxie knnte ein fr allemal gestoppt werden!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Identifizieren Sie die Ziele!\n", + /* 6*/ "Aktivieren Sie die Brcke!\n", + /* 7*/ "Gelangen Sie in den inneren Bereich!\n", + /* 8*/ "Vernichten Sie die geheime Armee!\n", + /* 9*/ "Eliminieren Sie den Anfhrer!\n", + /* 10*/ "Erlangen Sie das Nachtsichtger舩!\n", + /* 11*/ "\n", + /* 12*/ "Nachtsichtger舩\n", + /* 13*/ "Nachtsichtger舩\n", + /* 14*/ "Nachtsichtger舩 aufgenommen\n", + /* 15*/ "Erlangen Sie den Scanner!\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner aufgenommen\n", + /* 20*/ "Erlangen Sie das Peilger舩!\n", + /* 21*/ "\n", + /* 22*/ "Peilger舩\n", + /* 23*/ "Peilger舩\n", + /* 24*/ "Peilger舩 aufgenommen\n", + /* 25*/ "Peilger舩 wurde korrekt platziert.\n", + /* 26*/ "Peilger舩 wurde nicht korrekt platziert.\n", + /* 27*/ "Generator wurde reaktiviert.\n", + /* 28*/ "Der innere Bereich des Schreins wurde erreicht.\n", + /* 29*/ "Die geheime Skedar-Armee wurde vernichtet.\n", + /* 30*/ "Das scheint eine der drei S舫len zu sein.\n", + /* 31*/ "Die Stromversorgung in diesem Bereich wird immer konstanter. \nDer innere Bereich kann nicht weit entfernt sein.\n", + /* 32*/ "OH NEIN!!! Die geheime Armee befindet sich tats臘hlich in dem Schrein!\n", + /* 33*/ "Okay, es muss sein... Wenn der Kopf abgeschnitten wird, \nstirbt auch der Krper.\n", + /* 34*/ "Dies ist der heiligste Ort der Skedar. Der Planet scheint ihr heiliges Land zu sein. Der Schrein befindet sich am heiligsten Ort dieses heiligen Planeten.\n", + /* 35*/ "Lass mich mal resmieren: Hier ist es heilig. Aber das kann noch nicht alles sein, oder?\n", + /* 36*/ "Stimmt. In all der Zeit, in der die Maianer gegen die Skedar gek舂pft haben, konnten wir diesen Ort nicht ausfindig machen. Wir wussten, dass, solange dieser Ort besteht, der Krieg niemals enden wrde. Zwar konnten wir einen Waffenstillstand erzielen, mussten aber trotzdem stets wachsam sein. Die Zerstrung des Schreins w舐e eine Chance, wieder Frieden zu erlangen.\n", + /* 37*/ "Also mssen wir dafr sorgen, dass kein Skedar berlebt. Ich gehe rein und kmmere mich um den Anfhrer, und du koordinierst inzwischen den Angriff der Maianischen Flotte.\n", + /* 38*/ "Aber wenn du nicht rechtzeitig von dort verschwindest, hast du keine Chance.\n", + /* 39*/ "Das ist ein Fehler, den ich nicht begehen werde.\n", + /* 40*/ "Jaaa...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Hier drben!\n", + /* 43*/ "OK! Halt dich an mir fest! Wir bringen dich sofort hier raus.\n", + /* 44*/ "Nein! Rasch! Gib mir eine Waffe!\n", + /* 45*/ "Lass! Mich! Endlich! In! Frieden!!!\n", + /* 46*/ "Ich konnte das Bombardement der Flotte einstellen, um nach dir zu suchen. Der Angriff geht weiter, wenn wir hier raus sind.\n", + /* 47*/ "Ich h舩te es rechtzeitig geschafft, wenn mich der Kerl hier nicht erwischt h舩te.\n", + /* 48*/ "Natrlich, Joanna, natrlich.\n", + /* 49*/ "Ich h舩te es geschafft!\n", + /* 50*/ "Ich glaube dir.\n", + /* 51*/ "Bring dem Gott des Krieges dein Opfer dar!\n", + /* 52*/ "Granaten verbraucht - Zutritt unmglich.\n", + /* 53*/ "Es wurde ein alternativer Eingang erschaffen.\n", + /* 54*/ "Wo bist du? Bist du verletzt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_i.c b/src/files/lang/pal-final/sho_str_i.c new file mode 100644 index 000000000..ae79fe392 --- /dev/null +++ b/src/files/lang/pal-final/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che stato danneggiato, ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Distruggi l'esercito segreto Skedar \n\nIl Comandante Supremo Maian sospetta la presenza di altri guerrieri Skedar conservati in stasi in luoghi a noi ignoti e questo potrebbe essere uno di quelli, perci lo dovrai distruggere. L'ultima cosa di cui abbiamo bisogno ora un'orda di fanatici psicotici.\n\n|Obiettivo 5: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente regner la pace!\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA SKEDAR\n", + /* 2*/ "|Situazione:\n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che stato danneggiato, ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sar la pace!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC' da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che stato danneggiato, ma ancora attivo e perci in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuter a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sar sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Elimina il capo degli Skedar\n\nIl capo un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civilt e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sar la pace!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Identifica gli obiettivi nel tempio\n", + /* 6*/ "Attiva il ponte retrattile\n", + /* 7*/ "Trova l'accesso al Santuario Interno\n", + /* 8*/ "Distruggi l'esercito segreto Skedar\n", + /* 9*/ "Elimina il capo degli Skedar\n", + /* 10*/ "Procurati Vista Notturna.\n", + /* 11*/ "\n", + /* 12*/ "Vista Notturna\n", + /* 13*/ "Vista Notturna\n", + /* 14*/ "Presa Vista Notturna.\n", + /* 15*/ "Procurati scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Preso scanner.\n", + /* 20*/ "Procurati bersaglio.\n", + /* 21*/ "\n", + /* 22*/ "Bersaglio\n", + /* 23*/ "Bersaglio\n", + /* 24*/ "Preso bersaglio.\n", + /* 25*/ "Bersaglio piazzato correttamente.\n", + /* 26*/ "Bersaglio in posizione errata.\n", + /* 27*/ "Il generatore stato riattivato.\n", + /* 28*/ "Raggiunto Santuario Interno Skedar.\n", + /* 29*/ "Distrutto esercito segreto Skedar.\n", + /* 30*/ "Questo sembra uno degli obelischi.\n", + /* 31*/ "Qui il campo energetico sembra pi costante. \nIl Santuario Interno non pu essere lontano.\n", + /* 32*/ "OH, NO!!! Un esercito Skedar in stato di morte apparente!\n", + /* 33*/ "Benissimo, ecco fatto! Mozzandogli il capo \nil corpo morir!\n", + /* 34*/ "Questo il luogo pi SACRO per quei fanatici degli Skedar! Credono che questo pianeta sia SACRO ed inviolabile. Il Tempio di Guerra si trova nella parte pi SACRA di questo pianeta SACRO!\n", + /* 35*/ "Fammi capire bene... Ma, allora SACRO! Per c' anche dell'altro, vero?\n", + /* 36*/ "S! In tutto il tempo che noi Maian abbiamo lottato contro gli Skedar non siamo mai riusciti a scoprire questo posto. Sapevamo che la guerra non sarebbe mai finita finch non fosse stato distrutto: abbiamo costretto gli Skedar a una tregua, li abbiamo piegati a cessare il fuoco, ma comunque non potevamo mai abbassare la guardia. La distruzione di questo posto implicher una pace vera! \n", + /* 37*/ "Allora dobbiamo accertarci che non ci sfugga nessun fanatico: io entro e porto fuori il capo; tu chiami a raccolta la flotta Maian per radere al suolo il tempio!\n", + /* 38*/ "Se ti trovi ancora in giro quando fa irruzione la flotta, non avrai pi possibilit di salvezza!\n", + /* 39*/ "ネ un errore che intendo evitare!\n", + /* 40*/ "Proprio cos...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Da questa parte!\n", + /* 43*/ "Nessun problema! Afferra il mio braccio! Ti tireremo fuori in un batter d'occhio!\n", + /* 44*/ "No, presto! Dammi la pistola!\n", + /* 45*/ "VUOI LASCIARMI ANDARE?! PER LA MISERIA?!!\n", + /* 46*/ "La flotta ha interrotto il bombardamento per darmi il tempo di trovarti. Andranno avanti non appena saremo fuori di qui!\n", + /* 47*/ "Sarei riuscita a svignarmela in tempo, se quello non mi si fosse aggrappato al piede!\n", + /* 48*/ "Ma certo, Joanna, naturalmente!\n", + /* 49*/ "No, veramente!!!\n", + /* 50*/ "S, s, ti credo!\n", + /* 51*/ "Compi il tuo sacrificio in onore del Dio della Guerra.\n", + /* 52*/ "Granate esaurite - Impossibile entrare nel tempio.\n", + /* 53*/ "Creata entrata alternativa al tempio.\n", + /* 54*/ "Dove sei? Sei ferita?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_s.c b/src/files/lang/pal-final/sho_str_s.c new file mode 100644 index 000000000..1a2f061dd --- /dev/null +++ b/src/files/lang/pal-final/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos en el Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca a trav駸 del laberinto de corredores subterr疣eos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fan疸ica. ノste es un templo a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Destruir el Ej駻cito Secreto Skedar\n\nEl Alto Comando Maian sospecha que m疽 guerreros Skedar est疣 en estado de hibernacin en lugares desconocidos. ノste puede ser uno de esos lugares. Si as es, destryelos. La ltima cosa que necesitamos es enfrentarnos a una oleada de refuerzos sicticos.\n\n|Objetivo Cinco: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca en el laberinto de corredores subterr疣eos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fan疸ica. ノste es un templo dedicado a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazn de la religin Skedar: un planeta desierto que arde bajo tres soles. El lder de la faccin terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destruccin del Templo y la muerte de su lder destrozara la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el lder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, as que necesitar疽 destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un daado, pero todava funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeber疽 abrir un agujero en el muro exterior para acceder al interior del santuario: tu esc疣er de infrarrojos te ayudar a encontrar un punto d饕il en la estructura. Una vez dentro del permetro, hay otro problema. Aparentemente producido hace muchos aos por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente mvil para acceder al mismo, pero puedes estar segura de que estar bien protegido.\n\n|Objetivo Tres: - Eliminar al Lder Skedar\n\nEl lder es un guerrero reverenciado por los Skedar. Su muerte ser un duro mazazo a su moral y marcar el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Posicionar blancos en el templo\n", + /* 6*/ "Activar el puente\n", + /* 7*/ "Acceder al Interior Sacro\n", + /* 8*/ "Destruir ej駻cito secreto Skedar\n", + /* 9*/ "Eliminar al lder Skedar\n", + /* 10*/ "Obt駭 la Visin Nocturna.\n", + /* 11*/ "\n", + /* 12*/ "V. Nocturna\n", + /* 13*/ "Visin Nocturna\n", + /* 14*/ "Visin Nocturna obtenida.\n", + /* 15*/ "Obt駭 el Esc疣er.\n", + /* 16*/ "\n", + /* 17*/ "Esc疣er\n", + /* 18*/ "Esc疣er\n", + /* 19*/ "Esc疣er obtenido.\n", + /* 20*/ "Obt駭 el Amplificador de Blancos.\n", + /* 21*/ "\n", + /* 22*/ "Amplificador\n", + /* 23*/ "Amplificador\n", + /* 24*/ "Amplificador de Blancos obtenido.\n", + /* 25*/ "Amplificador colocado correctamente.\n", + /* 26*/ "Amplificador colocado incorrectamente.\n", + /* 27*/ "El Generador ha sido reactivado.\n", + /* 28*/ "El Interior Sacro Skedar ha sido alcanzado.\n", + /* 29*/ "El ej駻cito secreto Skedar ha sido derrotado.\n", + /* 30*/ "ノste parece ser uno de los pilares especiales.\n", + /* 31*/ "La energa es m疽 constante en este 疵ea. \nEl Interior Sacro no puede estar muy lejos.\n", + /* 32*/ "。。。OH, NO!!! 。Un ej駻cito Skedar en animacin suspendida!\n", + /* 33*/ "Vale, entonces... Cort駑osle la cabeza y el \ncuerpo perecer.\n", + /* 34*/ "ノste es el lugar m疽 sagrado de los fan疸icos Skedar. Ellos creen que este planeta es tierra sagrada. El Templo de Batalla est situado en la parte m疽 sagrada de este 'santo' planeta.\n", + /* 35*/ "A ver si me aclaro. Es sagrado, ソno? Pero hay bastante m疽 que eso, ソno es as?\n", + /* 36*/ "S. En todo el tiempo que los Maian hemos luchado contra los Skedar, no encontramos este lugar. Sabamos que hasta que no fuera destruido, la guerra no terminara. Luchamos con los Skedar hasta llegar a un punto muerto donde obtuvimos un alto el fuego, pero hay que estar en guardia. La destruccin de este lugar puede significar una paz verdadera.\n", + /* 37*/ "As que tenemos que asegurarnos de que ningn fan疸ico sobreviva. Entrar a por el lder. Tu tienes que traer a la flota Maian para derribar el Templo.\n", + /* 38*/ "Si est疽 en tierra cuando la flota llegue aqu, no tendr疽 ninguna oportunidad.\n", + /* 39*/ "ノse es un error que no pienso cometer.\n", + /* 40*/ "Siii...\n", + /* 41*/ "。Joanna! 。Joanna! \n", + /* 42*/ "。Elvis! 。Elvis! Aqu.\n", + /* 43*/ "Ningn problema. Ag疵rate a mis brazos. Te sacar enseguida.\n", + /* 44*/ "。No, r疳ido! 。Dame tu arma!\n", + /* 45*/ "。Quieres! 。Soltarme! 。De! 。Una! 。Vez!\n", + /* 46*/ "He podido detener el bombardeo de la flota mientras te buscaba. Empezar疣 de nuevo cuando estemos a salvo.\n", + /* 47*/ "Hubiera salido a tiempo si ese m... no me hubiera cogido del pie.\n", + /* 48*/ "Por supuesto, Joanna, por supuesto.\n", + /* 49*/ "No, de verdad.\n", + /* 50*/ "Te creo.\n", + /* 51*/ "Haz tu sacrificio al Dios de la Guerra.\n", + /* 52*/ "Granadas utilizadas. No puedes entrar al Templo.\n", + /* 53*/ "Creada entrada alternativa al Templo.\n", + /* 54*/ "ソDnde est疽? ソEst疽 herida?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/siloE.c b/src/files/lang/pal-final/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/siloJ.c b/src/files/lang/pal-final/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/siloP.c b/src/files/lang/pal-final/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_f.c b/src/files/lang/pal-final/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_g.c b/src/files/lang/pal-final/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_i.c b/src/files/lang/pal-final/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_s.c b/src/files/lang/pal-final/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/statE.c b/src/files/lang/pal-final/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-final/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/statJ.c b/src/files/lang/pal-final/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/pal-final/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/statP.c b/src/files/lang/pal-final/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-final/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_f.c b/src/files/lang/pal-final/stat_str_f.c new file mode 100644 index 000000000..d29db6670 --- /dev/null +++ b/src/files/lang/pal-final/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'arm馥 skedar.\n\n|Objectif 2: - R馮icide Acte deux\n\nIl y a un autre clone! Un d馭aut de fonctionnement des cuves g駭itrices a provoqu l'activation simultan馥 de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son fr鑽e. Une fois que vous l'aurez d騁ruit, la menace sera 馗art馥.\n\n|Objectif 3: - R馮icide Acte trois\n\nPardon, d駸ol, il y a un troisi鑪e Roi. Nos d騁ecteurs n'ont pu le rep駻er auparavant en raison de fortes perturbations dues aux bombardements massifs de la flotte. Ce Roi est mieux pr駱ar que les deux autres, il est imp駻atif qu'il soit 駘imin dans les plus brefs d駘ais. D駱鹹hez-vous, il ne faut pas qu'il rassemble ses arm馥s.\n\nFIN\n", + /* 1*/ "AUTEL DE COMBAT\n", + /* 2*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'arm馥 skedar.\n\n|Objectif 2: - R馮icide Acte deux\n\nIl y a un autre clone! Un d馭aut de fonctionnement des cuves g駭itrices a provoqu l'activation simultan馥 de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son fr鑽e. Une fois que vous l'aurez d騁ruit, la menace sera 馗art馥.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe bombardement de la flotte est termin. Des 駲uipes de Protecteurs maians sont constitu馥s pour mener des op駻ations la surface de la plan鑼e. Un balayage au spectre g駭騁ique a r騅駘 la pr駸ence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - R馮icide Acte Un\n\nCe clone du Roi skedar a 騁 activ quand Joanna Dark a 駘imin le Roi existant. Il est encore au stade juv駭ile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne regroupe les restes de l'arm馥 skedar.\n\nFIN\n", + /* 4*/ "Tuer Roi skedar\n", + /* 5*/ "Tuer Roi skedar 2\n", + /* 6*/ "Tuer Roi skedar 3\n", + /* 7*/ "Le Dirigeant maian a 騁 tu.\n", + /* 8*/ "Le Roi skedar a 騁 tu.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_g.c b/src/files/lang/pal-final/stat_str_g.c new file mode 100644 index 000000000..ca69f207e --- /dev/null +++ b/src/files/lang/pal-final/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Knigsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Beh舁ter hat dazu gefhrt, dass zwei Knige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gef臧rlicher ist. Wird er eliminiert, ist die Bedrohung vorber.\n\n|3. Ziel: - Knigsmord Teil Drei\n\nEs tut uns leid, aber es sieht so aus, als g臙e es noch einen dritten Knig. Aufgrund der starken Interferenzen nach dem Bombardement, konnten ihn unsere Scanner nicht erfassen. Dieser Knig konnte sich noch weiter entwickeln, als die beiden anderen. Das bedeutet, dass er noch gef臧rlicher ist. Die Notwendigkeit, ihn zu eliminieren, ist daher noch gr゚er.\n\nENDE\n", + /* 1*/ "KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Knigsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Beh舁ter hat dazu gefhrt, dass zwei Knige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gef臧rlicher ist. Wird er eliminiert, ist die Bedrohung vorber.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfl臘he des Planeten zu durchk舂men. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anw舐ter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Knigsmord Teil Eins\n\nAls Joanna Dark den Knig der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon msste in seinem momentanen Stadium sehr desorientiert sein. Daher drfte er nicht die gleiche Bedrohung darstellen, wie sein Vorg舅ger. Sie mssen ihn besiegen, bevor er die Kontrolle ber die verbleibenden Soldaten der Skedar-Armee erlangt!\n\nENDE\n", + /* 4*/ "Vernichten Sie den Skedar-Knig!\n", + /* 5*/ "Vernichten Sie den Skedar-Knig 2!\n", + /* 6*/ "Vernichten Sie den Skedar-Knig 3!\n", + /* 7*/ "Der Maianische Anfhrer wurde eliminiert.\n", + /* 8*/ "Der Skedar-Knig wurde eliminiert.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_i.c b/src/files/lang/pal-final/stat_str_i.c new file mode 100644 index 000000000..4294e1bfc --- /dev/null +++ b/src/files/lang/pal-final/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto pi tempo per ambientarsi e per questo motivo anche pi pericoloso. Una volta che lo avrai eliminato la minaccia non sussister pi.\n\n|Obiettivo 3: - Regicidio - Parte terza\n\nMi rincresce doverti comunicare che esiste un terzo clone del re. I nostri scanner hanno incontrato difficolt nel riconoscerlo a causa delle forti interferenze della superficie dovute alla veemenza dei bombardamenti. Attenzione questo re pi pericoloso degli altri due! ネ pertanto di vitale importanza che venga soppresso al pi presto.\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA\n", + /* 2*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto pi tempo per ambientarsi e per questo motivo anche pi pericoloso. Una volta che lo avrai eliminato la minaccia non al pi presto.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio\n\nQuesto clone del re degli Skedar stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra al pi presto.\n\nFINE\n", + /* 4*/ "Uccidi il re degli Skedar\n", + /* 5*/ "Uccidi il 2ー re degli Skedar\n", + /* 6*/ "Uccidi il 3ー re degli Skedar\n", + /* 7*/ "Il capo dei Maian stato ucciso.\n", + /* 8*/ "Il re degli Skedar stato ucciso.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_s.c b/src/files/lang/pal-final/stat_str_s.c new file mode 100644 index 000000000..4aaf6f579 --- /dev/null +++ b/src/files/lang/pal-final/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n。Hay otro clon! Un fallo en los tanques de clonacin Skedar hizo que dos Reyes fueran activados al mismo tiempo. ノste ha tenido m疽 tiempo para aclimatarse, por lo tanto es m疽 peligroso. Una vez sea destruido, la amenaza habr terminado.\n\n|Objetivo Tres: - Regicidio Parte Tres\n\nPerdn, perdn... Parece que existe un tercer Rey. Nuestros esc疣eres han tenido problemas de deteccin debido a la enorme cantidad de perturbaciones causadas por el bombardeo de la flota. A causa de ello, este Rey est m疽 preparado que los otros dos; esto hace que sea vital que el Rey sea destruido.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA\n", + /* 2*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n。Hay otro clon! Un fallo en los tanques de clonacin Skedar hizo que dos Reyes fueran activados al mismo tiempo. ノste ha tenido m疽 tiempo para aclimatarse, por lo tanto es m疽 peligroso. Una vez sea destruido, la amenaza habr terminado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian est疣 siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro gen騁ico nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark dispar y mat al Rey precedente. Estar confuso, y no ser tan peligroso como el anterior Rey, por el momento. Destryelo antes de que pueda tomar el control de los remanentes del ej駻cito Skedar.\n\nFIN\n", + /* 4*/ "Eliminar al Rey Skedar.\n", + /* 5*/ "Eliminar al Rey Skedar 2.\n", + /* 6*/ "Eliminar al Rey Skedar 3.\n", + /* 7*/ "El lder Maian ha muerto.\n", + /* 8*/ "El Rey Skedar ha muerto.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/titleE.c b/src/files/lang/pal-final/titleE.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/pal-final/titleE.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/titleJ.c b/src/files/lang/pal-final/titleJ.c new file mode 100644 index 000000000..4dc299aa6 --- /dev/null +++ b/src/files/lang/pal-final/titleJ.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons animator\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "(is watching)\n", + /* 15*/ "b jones\n", + /* 16*/ "(unknown purpose)\n", + /* 17*/ "steve malpass\n", + /* 18*/ "edge wrangler\n", + /* 19*/ "brian marshall\n", + /* 20*/ "code janitor\n", + /* 21*/ "russell irwin\n", + /* 22*/ "pak man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "pad jockey\n", + /* 25*/ "ross bury\n", + /* 26*/ "pixel pusher\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonsz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "background artist\n", + /* 35*/ "additional\n", + /* 36*/ "dean smith\n", + /* 37*/ "kevin bayliss\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "lee musgrave\n", + /* 45*/ "mark betteridge\n", + /* 46*/ "chris marlow\n", + /* 47*/ "phillip dunne\n", + /* 48*/ "johnni christensen\n", + /* 49*/ "robin beanland\n", + /* 50*/ "steven hurst\n", + /* 51*/ "voice talent\n", + /* 52*/ "eveline fischer\n", + /* 53*/ "chris sutherland\n", + /* 54*/ "chris seavor\n", + /* 55*/ "john silke\n", + /* 56*/ "development tools\n", + /* 57*/ "richard gale\n", + /* 58*/ "mark green\n", + /* 59*/ "mark wilson\n", + /* 60*/ "hardware support\n", + /* 61*/ "pete cox\n", + /* 62*/ "paul mikell\n", + /* 63*/ "doug crouch\n", + /* 64*/ "thanks\n", + /* 65*/ "neil gallagher\n", + /* 66*/ "jonathon o'conner\n", + /* 67*/ "gareth glover\n", + /* 68*/ "motion capture\n", + /* 69*/ "alan tipper\n", + /* 70*/ "des easen\n", + /* 71*/ "jim ballard\n", + /* 72*/ "michelle tipper\n", + /* 73*/ "testing (rare)\n", + /* 74*/ "huw ward\n", + /* 75*/ "david wong\n", + /* 76*/ "adam munton\n", + /* 77*/ "luke munton\n", + /* 78*/ "garry phelps\n", + /* 79*/ "jon silke\n", + /* 80*/ "matthew carter\n", + /* 81*/ "gavin price\n", + /* 82*/ "gareth stevenson\n", + /* 83*/ "joe stamper\n", + /* 84*/ "stephen stamper\n", + /* 85*/ "testing (noa)\n", + /* 86*/ "nintendo guy\n", + /* 87*/ "nintendo gal\n", + /* 88*/ "rare miami\n", + /* 89*/ "eileen hochberg\n", + /* 90*/ "joel hochberg\n", + /* 91*/ "rare twycross\n", + /* 92*/ "chris stamper\n", + /* 93*/ "tim stamper\n", + /* 94*/ "nintendo\n", + /* 95*/ "ken lobb\n", + /* 96*/ "howard lincoln\n", + /* 97*/ "mr arrakawa\n", + /* 98*/ "mr yamauchi\n", + /* 99*/ "copyright rare 2000\n", + /*100*/ "perfect dark, the pd device and\n", + /*101*/ "perfecthead are trademarks\n", + /*102*/ "rare\n", + /*103*/ "designs on the future\n", + /*104*/ "t&a support\n", + /*105*/ "emma scully\n", + /*106*/ "claire phelan\n", + /*107*/ "joanna dark is forever\n", + /*108*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*109*/ "testing (noe)\n", + /*110*/ "supervisor\n", + /*111*/ "kai 'jellybean' neumann\n", + /*112*/ "deputy supervisor\n", + /*113*/ "maurice 'pathfinder' tisdale\n", + /*114*/ "coordinators\n", + /*115*/ "patrick 'capricorn' thieret\n", + /*116*/ "andreas 'brennero' dietz\n", + /*117*/ "editor\n", + /*118*/ "assistant editor\n", + /*119*/ "assistant editors\n", + /*120*/ "localization (french)\n", + /*121*/ "julien 'sexy boy' bardakoff\n", + /*122*/ "jean-baptiste 'ours noir' fleury\n", + /*123*/ "nicolas 'darth lapinou' gourio\n", + /*124*/ "nicolas 'el betal' robert\n", + /*125*/ "localization (german)\n", + /*126*/ "micky 'scorpio's movement' auer\n", + /*127*/ "jan 'ian' peitzmeier\n", + /*128*/ "localization (italian)\n", + /*129*/ "elenor isbitish\n", + /*130*/ "calimero tiiiun\n", + /*131*/ "localization (spanish)\n", + /*132*/ "antonio 'toro' greppi\n", + /*133*/ "carlos 'yoshio' montilla\n", + /*134*/ "susa & natalia\n", + /*135*/ "localization\n", + /*136*/ "product coordinator\n", + /*137*/ "andy 'fiedl' fey\n", + /*138*/ "product supervisor\n", + /*139*/ "tanja 'personalized sarcasm' baar\n", + /*140*/ "product localization manager\n", + /*141*/ "kai '0 to 100' zeh\n", + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, + /*152*/ NULL, + /*153*/ NULL, + /*154*/ NULL, + /*155*/ NULL, + /*156*/ NULL, + /*157*/ NULL, + /*158*/ NULL, + /*159*/ NULL, + /*160*/ NULL, + /*161*/ NULL, + /*162*/ NULL, + /*163*/ NULL, + /*164*/ NULL, + /*165*/ NULL, + /*166*/ NULL, + /*167*/ NULL, + /*168*/ NULL, + /*169*/ NULL, + /*170*/ NULL, + /*171*/ NULL, + /*172*/ NULL, + /*173*/ NULL, + /*174*/ NULL, + /*175*/ NULL, + /*176*/ NULL, + /*177*/ NULL, + /*178*/ NULL, + /*179*/ NULL, + /*180*/ NULL, + /*181*/ NULL, + /*182*/ NULL, + /*183*/ NULL, +}; diff --git a/src/files/lang/pal-final/titleP.c b/src/files/lang/pal-final/titleP.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/pal-final/titleP.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_f.c b/src/files/lang/pal-final/title_str_f.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/pal-final/title_str_f.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_g.c b/src/files/lang/pal-final/title_str_g.c new file mode 100644 index 000000000..37e3b0196 --- /dev/null +++ b/src/files/lang/pal-final/title_str_g.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "waffen und visuelle hhepunkte\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "bewegung und erschtterung\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality-techniker\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs der zukunft\n", + /* 11*/ "chris darling\n", + /* 12*/ "waffenspezialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grauzonen\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "locations und stimmen\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manisch-walisischer designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "hintergrnde\n", + /* 27*/ "martin penny\n", + /* 28*/ "maestro grande\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "der maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dynamische backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "die schrecklichen vier\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trents vasallen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "stimmen in der dunkelheit\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techniker\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hardware-support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'ich falleeeee' fell\n", + /* 91*/ "doug 'duck dich' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminatoren\n", + /* 94*/ "huw ward\n", + /* 95*/ "david wong\n", + /* 96*/ "adam munton\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dunkle kommandanten\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in der sonne\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "der perfekte kern\n", + /*129*/ "- dunkler als du\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfekte rechtschreibung\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark fr immer\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_i.c b/src/files/lang/pal-final/title_str_i.c new file mode 100644 index 000000000..32d6fc491 --- /dev/null +++ b/src/files/lang/pal-final/title_str_i.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armi e orgasmi visivi\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "muovi e sbatti\n", + /* 7*/ "darkmark\n", + /* 8*/ "tecnico effetti reali\n", + /* 9*/ "chris tilston\n", + /* 10*/ "design futuristico\n", + /* 11*/ "chris darling\n", + /* 12*/ "specialista armi\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "area grigia\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "dio di voci e luoghi\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "designer galles-mania\n", + /* 25*/ "ross bury\n", + /* 26*/ "sfondi bionici\n", + /* 27*/ "martin penny\n", + /* 28*/ "guru suoni\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "musica, maestro! \n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "sfondi dinamici\n", + /* 35*/ "cecchini dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "i terribili quattro\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "gli scagnozzi di trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voci al buio\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "tecnici ci\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "supporto hardware\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "squadra dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "fermo immagine\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "tra le immagini\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "sterminatori rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandanti dark\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare alla luce del sole\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "verifica prodotto (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "verifica prodotto (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "il cuore perfect\n", + /*129*/ "-pi buio di te!\n", + /*130*/ "la casa nell'albero\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "ortografia perfect\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark e pd device\n", + /*147*/ "sono trademark\n", + /*148*/ "rare\n", + /*149*/ "design del futuro\n", + /*150*/ "perfect dark per sempre\n", + /*151*/ "verifica prodotto (noe)\n", + /*152*/ "supervisore\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "aiuto supervisore\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinatori\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "redattore\n", + /*160*/ "aiuto redattore\n", + /*161*/ "aiuto redattori\n", + /*162*/ "localizzazione (francese)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localizzazione (tedesco)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localizzazione (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localizzazione (spagnolo)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localizzazione\n", + /*178*/ "coordinatore prodotto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisore prodotto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "manager localizzazione prodotto\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_s.c b/src/files/lang/pal-final/title_str_s.c new file mode 100644 index 000000000..69567bb3c --- /dev/null +++ b/src/files/lang/pal-final/title_str_s.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armas y orgasmos visuales\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mueve y menea\n", + /* 7*/ "darkmark\n", + /* 8*/ "ingeniero de animacin\n", + /* 9*/ "chris tilston\n", + /* 10*/ "diseos futuristas\n", + /* 11*/ "chris darling\n", + /* 12*/ "especialista en armas\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "zona gris\n", + /* 15*/ "b jones\n", + /* 16*/ "culto al cuerpo\n", + /* 17*/ "steve malpass\n", + /* 18*/ "lugares perfectos\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "hombre bien empaquetado\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manaco diseador gal駸\n", + /* 25*/ "ross bury\n", + /* 26*/ "escenarios binicos\n", + /* 27*/ "martin penny\n", + /* 28*/ "to del sonido\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "maestro musical\n", + /* 31*/ "david clynick\n", + /* 32*/ "incondicional del ruido\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "artista de escenarios\n", + /* 35*/ "francotiradores dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "los cuatro terribles\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "secuaces de trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voces en la oscuridad\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "t馗nicos ic\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "soporte hard\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "equipo dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "captura de movimientos\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "en movimiento\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "exterminadores rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandantes oscuros\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare en el sol\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testeo (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testeo (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "el ncleo perfecto\n", + /*129*/ "- m疽 oscuro que t -\n", + /*130*/ "casa en el tronco\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "deletreo perfecto\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark y el dispositivo pd\n", + /*147*/ "son marcas registradas\n", + /*148*/ "rare\n", + /*149*/ "diseando el futuro\n", + /*150*/ "perfect dark es para siempre\n", + /*151*/ "testeo (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "vicesupervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinadores\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "traductor principal\n", + /*160*/ "traductor asistente\n", + /*161*/ "traductores asistentes\n", + /*162*/ "localizacin (franc駸)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localizacin (alem疣)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localizacin (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localizacin (espaol)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia & ruth\n", + /*177*/ "localizacin\n", + /*178*/ "coordinador producto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisora producto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "director dpto. localizacin\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/traE.c b/src/files/lang/pal-final/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-final/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/traJ.c b/src/files/lang/pal-final/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/pal-final/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/traP.c b/src/files/lang/pal-final/traP.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-final/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_f.c b/src/files/lang/pal-final/tra_str_f.c new file mode 100644 index 000000000..91bd5746d --- /dev/null +++ b/src/files/lang/pal-final/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash ont 騁 transf駻駸 dans le Secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans le vaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Localiser l'Auto-chirurgien\n\nTous les vaisseaux maians sont 駲uip駸 d'une 'capsule auto-chirurgicale'. C'est le moyen le plus rapide de r饌nimer votre compagnon. Ces appareils sont r馮l駸 sur la physiologie maian. Vous trouverez ce dispositif dans l'駱ave ou dans les restes du vaisseau transf駻駸 aux labos.\n\n|Objectif 2: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 3: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu p駭騁rer dans le hangar auparavant, cela aurait grill sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derri鑽e laquelle se trouverait un vaisseau maian.\n\n|Objectif 4: - R饌nimer le garde du corps maian\n\nR饌nimez le Maian avant de vous enfuir: une civi鑽e anti-grav pourrait se r騅駘er assez encombrante en cas de crise. Une fois qu'il sera debout et op駻ationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 5: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ馥s auparavant.\n\nFIN\n", + /* 1*/ "SECTEUR 51 - FUITE\n", + /* 2*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash ont 騁 transf駻駸 dans le Secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans le vaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu p駭騁rer dans le hangar auparavant, cela aurait grill sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derri鑽e laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - R饌nimer le garde du corps maian\n\nR饌nimez le Maian avant de vous enfuir: une civi鑽e anti-grav pourrait se r騅駘er assez encombrante en cas de crise. Une fois qu'il sera debout et op駻ationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 4: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ馥s auparavant.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a 騁 abattu au-dessus du Nevada. Les d饕ris et les corps trouv駸 sur le site du crash ont 騁 transf駻駸 dans le Secteur 51. Un agent espion nous a inform de la pr駸ence possible d'un rescap. Votre mission sera de sauver et de r馗up駻er le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux r駱onses. Je peux seulement vous dire que la cr饌ture que vous avez sauv est un Maian, garde du corps de l'ambassadeur qui 騁ait dans le vaisseau abattu. Le reste des donn馥s vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contact. Il pense qu'il a 騁 d馗ouvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu p駭騁rer dans le hangar auparavant, cela aurait grill sa couverture, mais nous n'avons plus le temps pour ce genre de consid駻ation. Prot馮ez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derri鑽e laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez bord. Vous devriez pouvoir vous envoler et passer au travers des d馭enses que vous aurez d駸activ馥s auparavant.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localiser Medkit extraterrestre\n", + /* 10*/ "Rencontrer l'espion de l'IC\n", + /* 11*/ "R饌nimer Elvis avec le Medkit\n", + /* 12*/ "Localiser le hangar secret\n", + /* 13*/ "Quitter le Secteur 51\n", + /* 14*/ "Joanna - Ici Jonathan. Vous 黎es en grave danger.\n", + /* 15*/ "Ils ont inond cette zone avec du gaz empoisonn.\n", + /* 16*/ "Allez dans le labo o se trouve notre ami. \nIl y a une cache.\n", + /* 17*/ "Je vous contacterai quand vous y serez! Bonne chance!\n", + /* 18*/ "Bon travail, Jo. Nous devons nous rejoindre. Ils \ndeviennent m馭iants.\n", + /* 19*/ "Passez par le conduit ouvert \ndans un des labos. D駱鹹hez-vous.\n", + /* 20*/ "Obtenir Medkit extraterr.\n", + /* 21*/ "Cassandra De Vries: \n", + /* 22*/ "Medkit\n", + /* 23*/ "", + /* 24*/ "Medkit extraterr. obtenu.\n", + /* 25*/ "Joanna - par ici.\n", + /* 26*/ "Nous devons retrouver notre ami.\n", + /* 27*/ "Bien, nous y sommes presque. Couvrez-moi, Jo...\n", + /* 28*/ "Ok - Restez derri鑽e.\n", + /* 29*/ "Jonathan a 騁 tu.\n", + /* 30*/ "Elvis a 騁 tu.\n", + /* 31*/ "Le hangar secret a 騁 d馗ouvert.\n", + /* 32*/ "Ok, Jo - allons-y.\n", + /* 33*/ "Medkit extraterr. activ.\n", + /* 34*/ "Op駻ation Medkit annul馥.\n", + /* 35*/ "Medkit administr.\n", + /* 36*/ "Objet crucial d騁ruit.\n", + /* 37*/ "Ouverture porte ext駻ieure hangar.\n", + /* 38*/ "Fermeture porte ext駻ieure hangar.\n", + /* 39*/ "Ouverture porte int駻ieure hangar.\n", + /* 40*/ "fermeture porte int駻ieure hangar.\n", + /* 41*/ "C'est la seule sortie possible.\n", + /* 42*/ "Tu es le seul pouvoir piloter, Elvis. Alors au boulot.\n", + /* 43*/ "Mais nous ne pouvons pas te laisser derri鑽e.\n", + /* 44*/ "Il doit y avoir une solution.\n", + /* 45*/ "L'un de nous devra rester en arri鑽e pour \nouvrir le hangar.\n", + /* 46*/ "Je vais prendre cette hoverbike. Couvrez-moi \nj'ouvre les portes.\n", + /* 47*/ "Jonathan, allez avec Elvis. Je vais voir les consoles.\n", + /* 48*/ "C'est trop dangereux, Jo...\n", + /* 49*/ "Je devrais m'en sortir... Aie confiance.\n", + /* 50*/ "...Ok.\n", + /* 51*/ "Merde, Joanna... Couvrez-moi!\n", + /* 52*/ "Je vais bloquer les marches - Occupez-vous de la rampe.\n", + /* 53*/ "Les portes du hangar sont ouvertes.\n", + /* 54*/ "Les portes du bloc m馘ical sont ouvertes.\n", + /* 55*/ "Le Medkit doit se trouver par-l.\n", + /* 56*/ "Il faut rejoindre Jonathan, avant qu'il ne \nsoit trop tard.\n", + /* 57*/ "Cette odeur... de l'huile... je l'ai sentie dans \nles autres hangars.\n", + /* 58*/ "Avec cette Jetbike je vais pouvoir m'enfuir \navant la fermeture des portes.\n", + /* 59*/ "Gros probl鑪e: c'est un monoplace!\n", + /* 60*/ "Deux peuvent y entrer, pas plus.\n", + /* 61*/ "Aucun style en plus, c'est d駱rimant.\n", + /* 62*/ "Ce sp馗imen est la propri騁 du gouvernement. Il ne doit pas quitter cette base.\n", + /* 63*/ "Voyons voir comment cette petite voleuse va s'en sortir avec les gaz. Elle y repensera deux fois avant de venir semer le bordel ici!\n", + /* 64*/ "C'est quoi ce bruit? Mais, mais... du gaz!\n", + /* 65*/ "Ah non! C'est pas 軋 qui 騁ait pr騅u!\n", + /* 66*/ "Non, arr黎er! Je veux pas mourir. Elle... Arggghhh!\n", + /* 67*/ "Pauvre idiot! Allons nous-en.\n", + /* 68*/ "Eternuements, toussotements, pleures.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Je suis vivant. Je pensais 黎re mort comme les autres. Vous 黎es de l'Institut? Je vous reconnais. Vous m'avez aid. Merci beaucoup.\n", + /* 71*/ "Vous... Vous parlez notre langue?\n", + /* 72*/ "Impressionnante d馘uction.\n", + /* 73*/ "Nnnghhh... \n", + /* 74*/ "Qu'avez-vous?\n", + /* 75*/ "J'ai mal au cr穗e. Chez nous c'est assez douloureux, nous avons une grosse t黎e.\n", + /* 76*/ "Pouvez-vous marcher? Nous devons partir au plus vite.\n", + /* 77*/ "Je suis d'accord. Quel est votre nom?\n", + /* 78*/ "Agent Dark, Joanna pour les intimes.\n", + /* 79*/ "Tr鑚 bien, Joanna, je suis Gardien Prime. Mais vous pouvez m'appeler... Elvis!\n", + /* 80*/ "La console est d饕ranch馥.\n", + /* 81*/ "Mais, qu'est-ce que vous faites? \nCette pi鐵e est cens馥 黎re scell馥! \nVous ne connaissez pas les proc馘ures \nd'autopsie?\n", + /* 82*/ "Le Directeur Easton sera mis au courant, \njeune fille.\n", + /* 83*/ "Vous ne pouvez pas prendre 軋! Ca appartient au \nGouvernement! C'est intol駻able! C'est... c'est... \ntotalement anti-professionnel !!\n", + /* 84*/ "Les proc馘ures, c'est trop barbant pour moi!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_g.c b/src/files/lang/pal-final/tra_str_g.c new file mode 100644 index 000000000..bc24e0e0f --- /dev/null +++ b/src/files/lang/pal-final/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Finden Sie die den Auto-Chirugen der Aliens!\n\nAlle Maianischen Schiffe sind mit einem Ger舩 ausgestattet, das man als automatischen Chirurgen bezeichnen knnte. Da dieses Ger舩 auf Maianische Physiologie ausgerichtet ist, stellt es den einfachsten und sichersten Weg dar, den Bodyguard wieder zu Bewusstsein zu bringen. Das Ger舩 befindet sich entweder unter den Trmmern des Schiffs, oder es wurde bereits ins Labor zur Analyse gebracht.\n\n|2. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|3. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|4. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, mssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umst舅den nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|5. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 1*/ "AREA 51 - FLUCHT\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, mssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umst舅den nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|4. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrmmer und die ワberreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns bermittelt, dass es mglicherweise einen ワberlebenden gibt. Die Mission lautet: Retten Sie den ワberlebenden!\n\n|Carrington - \n\nIch wei゚, Sie haben Fragen, Jo. Aber ich befrchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden knnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel frher aufgeflogen w舐e. ワber diesen Umstand mssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rcken frei, w臧rend er versucht, den Trcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Flchten Sie aus der Area 51!\n\nZuerst mssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschlie゚end gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen au゚er Kraft gesetzt worden ist.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie das Medipack!\n", + /* 10*/ "Treffen Sie sich mit Jonathan!\n", + /* 11*/ "Wiederbeleben Sie den Maianer!\n", + /* 12*/ "Finden Sie den geheimen Hangar!\n", + /* 13*/ "Flchten Sie aus der Area 51!\n", + /* 14*/ "Joanna - Hier spricht Jonathan. Du befindest dich in Gefahr.\n", + /* 15*/ "Die gesamte Zone wurde mit Nervengas kontaminiert.\n", + /* 16*/ "Bring unseren Freund ins Sicherheitslabor. \nDort kannst du ihn verstecken.\n", + /* 17*/ "Ich kontaktiere dich, wenn du dort bist. Viel Glck!\n", + /* 18*/ "Gute Arbeit, Jo. Wir mssen uns treffen. Ich \nglaube, sie haben mich erkannt.\n", + /* 19*/ "Geh durch den Wartungsschacht, den ich in einem \nder Sicherheitslabors gefffnet habe. Beeil dich!\n", + /* 20*/ "Erlangen Sie das extraterrestrische Medipack!\n", + /* 21*/ "Cassandra De Vries\n", + /* 22*/ "Medipack\n", + /* 23*/ "", + /* 24*/ "Medipack aufgenommen\n", + /* 25*/ "Joanna! Hier drben.\n", + /* 26*/ "Wir mssen zu unserem Freund zurck.\n", + /* 27*/ "Wir sind schon ganz nahe. Gib mir Deckung, Jo...\n", + /* 28*/ "Okay - Bleib zurck!\n", + /* 29*/ "Jonathan wurde eliminiert.\n", + /* 30*/ "Elvis wurde eliminiert.\n", + /* 31*/ "Der geheime Hangar wurde gefunden.\n", + /* 32*/ "Okay, Jo - gehen wir.\n", + /* 33*/ "Medipack aktiviert\n", + /* 34*/ "Medipack-Atkivit舩 unterbrochen\n", + /* 35*/ "Medipack wurde verabreicht.\n", + /* 36*/ "Wichtiges Objekt wurde zerstrt.\n", + /* 37*/ "トu゚eres Hangartor wird geffnet.\n", + /* 38*/ "トu゚eres Hangartor wird geschlossen.\n", + /* 39*/ "Inneres Hangartor wird geffnet.\n", + /* 40*/ "Inneres Hangartor wird geschlossen.\n", + /* 41*/ "Das ist der einzige Weg hier raus.\n", + /* 42*/ "Du bist der einzige, der das Ding fliegen kann, Elvis, also los!\n", + /* 43*/ "Aber wir knnen dich nicht zurcklassen.\n", + /* 44*/ "Es muss doch einen Weg hier raus geben.\n", + /* 45*/ "Einer von uns muss hier bleiben, um die \nHangartore zu ffnen.\n", + /* 46*/ "Ich flchte mit dem Hoverbike. Gebt mir Deckung, \nw臧rend ich die Tore ffne!\n", + /* 47*/ "Jonathan, geh mit Elvis. Ich kmmere mich um die Konsolen.\n", + /* 48*/ "Es ist gef臧rlich, Jo...\n", + /* 49*/ "Ich komme schon klar... Vertrau mir.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Verdammt, Joanna... Gib mir Deckung!\n", + /* 52*/ "Ich sichere die Treppe - kmmere du dich um die Rampe.\n", + /* 53*/ "Die Hangartore sind jetzt offen.\n", + /* 54*/ "Die Tren zum Sicherheitslabor wurden entriegelt.\n", + /* 55*/ "Das Medipack muss hier irgendwo sein.\n", + /* 56*/ "Ich muss mich mit Jonathan treffen, bevor\ner noch tiefer in Schwierigkeiten ger舩.\n", + /* 57*/ "Dieser Geruch... ヨl... Ich habe es schon in den \nanderen Hangars gerochen.\n", + /* 58*/ "Ich sollte auf dem Hoverbike entkommen, bevor\nalle Ausg舅ge geschlossen werden.\n", + /* 59*/ "Oh nein! Wir haben ein Problem. Hier ist nur fr EINEN Platz!\n", + /* 60*/ "Zwei passen rein, aber das warエs dann schon.\n", + /* 61*/ "Und es ist nicht sehr stilvoll - wenn du wei゚t, wovon ich spreche.\n", + /* 62*/ "Ich lasse das nicht zu. Dieses Exemplar ist Regierungseigentum und darf die Basis nicht verlassen.\n", + /* 63*/ "Mal sehen, wie diese selbstgef舁lige Diebin mit Nervengas klarkommt. Sie wird es sich in Zukunft berlegen, sich mit mir anzulegen!\n", + /* 64*/ "Was ist das fr ein Ger舫sch! Es ist... GAS!\n", + /* 65*/ "Neeiiin! Das war anders geplant!\n", + /* 66*/ "Aufhren! Ich will noch nicht... Sie... Arggghhh!\n", + /* 67*/ "Du Idiot! Wir mssen raus hier.\n", + /* 68*/ "Keuchen, rcheln und husten.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Ich bin am Leben. Ich dachte, ich wrde so wie die anderen auseinander genommen. Sie mssen vom Institut sein. Ich habe Sie schon mal gesehen. Danke, dass Sie mir geholfen haben.\n", + /* 71*/ "Sie... sie sprechen unsere Sprache?\n", + /* 72*/ "Vorsicht, mit ihr ist nicht zu scherzen.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "Was ist los?\n", + /* 75*/ "Ich habe Kopfschmerzen. Und mit einem Kopf von dieser Gr゚e will das was hei゚en.\n", + /* 76*/ "Knnen Sie gehen? Wir mssen hier weg, bevor sie uns noch dichter auf den Fersen sind.\n", + /* 77*/ "Ich denke schon. Wie hei゚en Sie?\n", + /* 78*/ "Ich bin Agent Dark. Oder Joanna, falls Sie das bevorzugen.\n", + /* 79*/ "Gut, Joanna, ich bin der Protektor Eins. Aber nennen Sie... nenn mich einfach Elvis!\n", + /* 80*/ "Konsole ist nicht aktiv.\n", + /* 81*/ "Was zur Hlle machen Sie hier? \nDieser Raum ist nur fr autorisiertes Personal! \nWissen Sie den gar nichts ber die Vorschriften \nbei Autopsien?\n", + /* 82*/ "Direktor Easton wird darber informiert werden, \njunge Dame.\n", + /* 83*/ "Sie drfen das nicht! Das ist Regierungseigentum! \nDas ist nicht tolerabel! Das ist... das ist... \nunprofessionell!!!\n", + /* 84*/ "Ich habe fr Vorschriften nicht viel brig!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_i.c b/src/files/lang/pal-final/tra_str_i.c new file mode 100644 index 000000000..3c30a308a --- /dev/null +++ b/src/files/lang/pal-final/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Trova dispositivo AutoChirurgo alieno\n\nTutti i mezzi Maian portano un dispositivo chiamato AutoChirurgo. Il suo uso il modo pi veloce e sicuro per svegliare un Maian, dal momento che progettato per agire sulla fisiologia Maian. Dovrebbe trovarsi tra i resti del velivolo o altrimenti tra gli oggetti portati al laboratorio per l'analisi.\n\n|Obiettivo 2: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 3: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 4: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poich un idrovolante non la cosa pi semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 5: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 1*/ "AREA 51 - FUGA\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poich un idrovolante non la cosa pi semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 4: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato un Maian ed una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che nella lista nera e che il suo arresto ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non riuscito ad infiltrarsi nell'hangar segreto prima, poich questo avrebbe significato mandare a monte la sua copertura, ma ora non pi il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Fuga dall'Area 51\n\nCi significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Trova l'AutoChirurgo alieno\n", + /* 10*/ "Appuntamento con l'agente segreto\n", + /* 11*/ "Rivitalizza guardia del corpo Maian\n", + /* 12*/ "Raggiungi l'hangar segreto\n", + /* 13*/ "Fuga dall'Area 51\n", + /* 14*/ "Joanna, qui Jonathan. Sei in grave pericolo!\n", + /* 15*/ "Hanno inondato l'area di gas nervino.\n", + /* 16*/ "Porta il nostro amico al laboratorio \ndi contenimento. L c' un nascondiglio.\n", + /* 17*/ "Mi metter di nuovo in contatto con te \nquando sei sul posto. In bocca al lupo!\n", + /* 18*/ "Bel lavoro, Jo! Dobbiamo incontrarci. Stanno \niniziando a sospettare di me.\n", + /* 19*/ "Usa lo sportello di manutenzione che \nho aperto in uno dei laboratori. Veloce!\n", + /* 20*/ "Procurati AutoChirurgo\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "AutoChirurgo\n", + /* 23*/ "", + /* 24*/ "Preso AutoChirurgo\n", + /* 25*/ "Joanna! Da questa parte!\n", + /* 26*/ "Dobbiamo trovare il nostro amico!\n", + /* 27*/ "Bene, siamo in zona! Coprimi, Jo...\n", + /* 28*/ "Bene, ora sta indietro!\n", + /* 29*/ "Jonathan stato ucciso!\n", + /* 30*/ "Elvis stato ucciso!\n", + /* 31*/ "Localizzato hangar segreto.\n", + /* 32*/ "Perfetto, Jo! Andiamo!\n", + /* 33*/ "Attivato AutoChirurgo alieno.\n", + /* 34*/ "Interrotta operazione AutoChirurgo.\n", + /* 35*/ "Somministrato AutoChirurgo alieno.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Porta esterna hangar in apertura.\n", + /* 38*/ "Porta esterna hangar in chiusura.\n", + /* 39*/ "Porta interna hangar in apertura.\n", + /* 40*/ "Porta interna hangar in chiusura.\n", + /* 41*/ "ネ l'unico modo per uscire di qui!\n", + /* 42*/ "Sei l'unico in grado di pilotarlo, Elvis, e allora fallo!\n", + /* 43*/ "Non possiamo mica lasciarti qui!\n", + /* 44*/ "Ci dev'essere un altro modo per uscire di qui!\n", + /* 45*/ "Uno di noi deve rimanere indietro \nper aprire le porte dell'hangar.\n", + /* 46*/ "Ci andr io con l'aeromoto! Coprimi \nmentre apro le porte!\n", + /* 47*/ "Jonathan, va con Elvis. Io mi occupo dei quadri comando.\n", + /* 48*/ "ネ pericoloso, Jo...\n", + /* 49*/ "Tutto sotto controllo! Fidati!\n", + /* 50*/ "Va bene!\n", + /* 51*/ "Dannazione, Joanna... coprimi!\n", + /* 52*/ "Io copro le scale, tu prendi la rampa!\n", + /* 53*/ "Le porte dell'hangar sono aperte.\n", + /* 54*/ "Aperte porte sala di contenimento.\n", + /* 55*/ "L'AutoChirurgo deve essere qui da qualche parte.\n", + /* 56*/ "Meglio che mi metta in contatto con Jonathan, prima che \nsi cacci in qualche altro guaio!\n", + /* 57*/ "Questo odore... petrolio... l'ho gi sentito \nnegli altri hangar.\n", + /* 58*/ "L'aeromoto dovrebbe farcela a portarmi fuori \nprima che chiudano la base.\n", + /* 59*/ "Oh, no! Abbiamo un problema. ネ una monoposto!\n", + /* 60*/ "Ce ne stanno al massimo due e non di pi!\n", + /* 61*/ "E poi... non ha stile! Non so se rendo...\n", + /* 62*/ "Non lo ammetto! Quell'esemplare propriet governativa e non pu assolutamente uscire dalla base.\n", + /* 63*/ "Vediamo come se la cava questa sfacciata criminale con l'impianto di difesa a gas. Ci penser due volte la prossima volta prima di fare la furba con me!\n", + /* 64*/ "Cos' quel rumore? Non pu... ネ gas!\n", + /* 65*/ "Accidenti! Questo non era previsto!\n", + /* 66*/ "Fermati, per favore! Non posso morire adesso! Lei... Noooo!\n", + /* 67*/ "Idiota... Dobbiamo uscire di qua! Subito!!!\n", + /* 68*/ "Gasp, soffoco! Soffoco!\n", + /* 69*/ "***aaah...! aaah! aha! aha!***\n", + /* 70*/ "Sono vivo! Credevo che mi avrebbero fatto a fettine come gli altri... Sei dell'istituto, vero? Ti riconosco, mi ricordo di te. Mi hai aiutato, sono in debito con te!\n", + /* 71*/ "Parli... Parli la nostra lingua?\n", + /* 72*/ "Per... sveglia!!!", + /* 73*/ "Aaahhh... che male!\n", + /* 74*/ "Che succede?\n", + /* 75*/ "Ho mal di testa! E con un testone come il mio, non c' niente da ridere!\n", + /* 76*/ "Riesci a camminare? Dobbiamo uscire di qui prima che riescano a farci fuori!\n", + /* 77*/ "S, penso di farcela. Come ti chiami?\n", + /* 78*/ "Sono l'Agente Dark... o Joanna, se preferisci!\n", + /* 79*/ "Bene, Joanna! Io sono il Difensore 1, ma puoi chiamarmi... Elvis!\n", + /* 80*/ "Quadro comandi inattivo\n", + /* 81*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /* 82*/ "Il direttor Easton lo verr \na sapere, signorina!\n", + /* 83*/ "Non pu prendere quello! ネ propriet governativa! \nネ intollerabile! ネ... ... \n inammissibile!!!\n", + /* 84*/ "Non mi interessa un fico secco della procedura!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_s.c b/src/files/lang/pal-final/tra_str_s.c new file mode 100644 index 000000000..9d77f5302 --- /dev/null +++ b/src/files/lang/pal-final/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Localizar el Dispositivo Aliengena de AutoCiruga\n\nTodas las naves Maian llevan un dispositivo de AutoCiruga. Utilizarlo es el m騁odo m疽 r疳ido y seguro de despertarle, ya que ha sido diseado para la fisiologa Maian. Debe encontrarse entre los restos de la nave, o si no, con los objetos que han sido llevados a analizar al laboratorio.\n\n|Objetivo Dos: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Tres: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos guardan una nave Maian intacta.\n\n|Objetivo Cuatro: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa m疽 f當il de manejar. Cuando est despejado y en pie, deber ser capaz de hacer volar la nave Maian fuera del チrea 51.\n\n|Objetivo Cinco: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 1*/ "チREA 51 - ESCAPE\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa m疽 f當il de manejar. Cuando est despejado y en pie, deber ser capaz de hacer volar la nave Maian fuera del チrea 51.\n\n|Objetivo Cuatro: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al チrea 51. Un espa infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misin consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa s que tienes preguntas, Joanna, y temo que 駸te no es el momento de contestarlas. Puedo decirte que el pequeo tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora est bajo sospecha y espera ser arrestado en cuestin de minutos. Encu駭trale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podra haber sido descubierto, aunque ya da igual preocuparse por ello. Mant駭 alejados a los guardas de Jonathan mientras 駘 abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Escapar del チrea 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y t deber駟s subir a la misma con 駘, y os llevar volando a trav駸 de las defensas a駻eas de las que te encargaste antes.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localizar paquete m馘ico aliengena\n", + /* 10*/ "Encontrar al espa del IC\n", + /* 11*/ "Revive al Guardaespaldas Maian\n", + /* 12*/ "Localizar el hangar secreto\n", + /* 13*/ "Escapar del チrea 51\n", + /* 14*/ "ソJoanna? Jonathan al habla. Est疽 en peligro de muerte.\n", + /* 15*/ "Han inundado el 疵ea con gas nervioso.\n", + /* 16*/ "Lleva a nuestro amigo al laboratorio de contencin. \nAll hay un lugar secreto.\n", + /* 17*/ "Contactar contigo cuando est駸 all. 。Buena suerte!\n", + /* 18*/ "Buen trabajo, Joanna. Necesitamos vernos. Est疣 \nsospechando de m.\n", + /* 19*/ "Usa la escotilla de mantenimiento que he abierto \nen uno de los laboratorios de contencin. Deprisa.\n", + /* 20*/ "Obt駭 el paquete m馘ico aliengena.\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "Paq. m馘ico\n", + /* 23*/ "", + /* 24*/ "Paquete m馘ico aliengena obtenido.\n", + /* 25*/ "Joanna. Aqu.\n", + /* 26*/ "Necesitamos volver con nuestro amigo.\n", + /* 27*/ "Bien, estamos cerca. Cbreme, Joanna...\n", + /* 28*/ "Vale. Ap疵tate.\n", + /* 29*/ "Jonathan ha muerto.\n", + /* 30*/ "Elvis ha muerto.\n", + /* 31*/ "El hangar secreto ha sido localizado.\n", + /* 32*/ "Bien, Joanna. Vamos.\n", + /* 33*/ "Paquete m馘ico aliengena activado.\n", + /* 34*/ "Operacin del paquete m馘ico abortada.\n", + /* 35*/ "El paquete m馘ico aliengena ha sido administrado.\n", + /* 36*/ "Objeto crtico de la misin destruido.\n", + /* 37*/ "Puerta exterior del hangar abierta.\n", + /* 38*/ "Puerta exterior del hangar cerrada.\n", + /* 39*/ "Puerta interior del hangar abierta.\n", + /* 40*/ "Puerta interior del hangar cerrada.\n", + /* 41*/ "Es el nico camino para salir de aqu.\n", + /* 42*/ "Eres el nico que puede pilotarlo, Elvis, as que entra.\n", + /* 43*/ "Pero no podemos dejarte atr疽.\n", + /* 44*/ "Tiene que haber un camino para salir de aqu.\n", + /* 45*/ "Uno de nosotros debe quedarse atr疽 para abrir \nlas puertas del hangar.\n", + /* 46*/ "Saldr en esa aeromoto. Cubridme mientras \nabro las puertas.\n", + /* 47*/ "Jonathan, ve con Elvis. Yo me ocupar de las consolas.\n", + /* 48*/ "Es peligroso, Joanna...\n", + /* 49*/ "Puedo encargarme... Cr馥me.\n", + /* 50*/ "...De acuerdo.\n", + /* 51*/ "Maldicin, Joanna... 。cbreme!\n", + /* 52*/ "Cubrir las escaleras. T toma la rampa.\n", + /* 53*/ "Las puertas del hangar est疣 abiertas.\n", + /* 54*/ "Puertas de contencin m馘ica abiertas.\n", + /* 55*/ "El paquete m馘ico debera estar por aqu.\n", + /* 56*/ "Es hora de contactar con Jonathan, antes de que \nse meta en m疽 problemas.\n", + /* 57*/ "Ese olor... aceite... He olido eso en los \notros hangares.\n", + /* 58*/ "La aeromoto me sacar de aqu antes de que \ncierren la base.\n", + /* 59*/ "。Oh, no! Tenemos un problema. 。Es monoplaza!\n", + /* 60*/ "Cabran dos, pero ninguno m疽.\n", + /* 61*/ "Adem疽, no tiene estilo. ソSabes lo que quiero decir?\n", + /* 62*/ "No os voy a dejar. Ese esp馗imen es propiedad del gobierno y no debe abandonar la base.\n", + /* 63*/ "Veamos qu tal se porta esa confiada ladrona con nuestro gas del sistema de defensa. 。Se lo pensar dos veces antes de jorobarme otra vez!\n", + /* 64*/ "ソQu es ese ruido? No puede ser... 。Gas!\n", + /* 65*/ "。Noooo, esto no deba ocurrir!\n", + /* 66*/ "。Por favor, para! Se supone que no debo morir. Ella... 。Arggghhh!\n", + /* 67*/ "。Idiota! Ser mejor que salgamos de aqu.\n", + /* 68*/ "Arrgghh... Cof, cof...\n", + /* 69*/ "***。Aahh...! 。Aahaa...! 。Aaaaahhh! Aha. Ahh.***\n", + /* 70*/ "Estoy vivo. Pensaba que haba cado como los otros. Eres del Instituto, ソno es as? Te conozco de antes. Me ayudaste. Gracias.\n", + /* 71*/ "T... ソT hablas nuestro idioma?\n", + /* 72*/ "Mrala... qu lista es...\n", + /* 73*/ "Earrggghh... eerggh...\n", + /* 74*/ "ソQu pasa?\n", + /* 75*/ "Tengo dolor de cabeza. Y con una cabeza tan grande como 駸ta, no es cuestin de broma.\n", + /* 76*/ "ソPuedes andar? Debemos irnos antes de que organicen nuestra caza.\n", + /* 77*/ "Creo que s. ソCmo te llamas?\n", + /* 78*/ "Soy la Agente Dark. O Joanna, si lo prefieres...\n", + /* 79*/ "Bien, Joanna, soy Protector Uno. Pero t puedes llamarme... 。Elvis!\n", + /* 80*/ "La consola no est activa.\n", + /* 81*/ "ソQu demonios se supone que haces? \n。Se supone que esto es una habitacin sellada! \nソNo sabes nada acerca de los procedimientos \npara autopsias?\n", + /* 82*/ "El Director Easton se va a enterar de esto, \njovencita.\n", + /* 83*/ "。No puedes coger eso! 。Es propiedad del gobierno! \n。Esto es intolerable! 。No es... 。No es... \n...profesional!!\n", + /* 84*/ "。No es que me importen mucho los procedimientos!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/uffE.c b/src/files/lang/pal-final/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uffJ.c b/src/files/lang/pal-final/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uffP.c b/src/files/lang/pal-final/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_f.c b/src/files/lang/pal-final/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_g.c b/src/files/lang/pal-final/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_i.c b/src/files/lang/pal-final/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_s.c b/src/files/lang/pal-final/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/waxE.c b/src/files/lang/pal-final/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-final/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/waxJ.c b/src/files/lang/pal-final/waxJ.c new file mode 100644 index 000000000..f130240d2 --- /dev/null +++ b/src/files/lang/pal-final/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/waxP.c b/src/files/lang/pal-final/waxP.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-final/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_f.c b/src/files/lang/pal-final/wax_str_f.c new file mode 100644 index 000000000..7ea91de72 --- /dev/null +++ b/src/files/lang/pal-final/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes cr騁ins de scientifiques de la dataDyne Corporation ne sont plus autoris駸 poursuivre leurs recherches gr稍e notre technologie. Tu placeras une bombe dans l'ascenseur qui d騁ruira toutes leurs donn馥s et toutes les preuves physiques de notre coop駻ation.\n\n|Objectif 2: - Eliminer le Capitaine de dataDyne\n\nTu devras effacer cette cr饌ture pour annuler toute possibilit de repr駸ailles contre les Skedars par des 駘駑ents r駸iduels de cette corporation infid鑞e. L'id馥 d'humains r騏ssissant menacer notre puissante race est plus que ridicule, mais nous ne devons pas ignorer la force de la vendetta.\n\n|Objectif 3: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette chienne humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes cr騁ins de scientifiques de la dataDyne Corporation ne sont plus autoris駸 poursuivre leurs recherches gr稍e notre technologie. Tu placeras une bombe dans l'ascenseur qui d騁ruira toutes leurs donn馥s et toutes les preuves physiques de notre coop駻ation.\n\n|Objectif 2: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incomp騁ence, s'est r騅駘馥 incapable de servir convenablement la cause des Skedars. Tu dois p駭騁rer dans son quartier g駭駻al pour la capturer. Elle sera ensuite pr駸ent馥 devant le Grand Conseil skedar et elle r駱ondra de ses fautes.\n\n|Objectif 1: - Trouver - escorter De Vries H駘iport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer te suivre jusqu'au toit o une de nos navettes viendra vous r馗up駻er. Il serait compromettant pour toi que cette cr饌ture soit bless馥 avant l'heure de son jugement.\n\nFIN\n", + /* 4*/ "Trouver - escorter De Vries H駘iport\n", + /* 5*/ "Placer explosifs dans ascenseur Labo\n", + /* 6*/ "Assassiner chef s馗urit dataDyne\n", + /* 7*/ "Sortez de mon bureau...\n", + /* 8*/ "Si tu veux vivre, suis-moi jusqu' l'h駘iport.\n", + /* 9*/ "Ne me tuez pas!\n", + /* 10*/ "Comment osez-vous me d駻anger!\n", + /* 11*/ "Vous allez regretter cette intrusion.\n", + /* 12*/ "Partez! Imm馘iatement!\n", + /* 13*/ "Vous n'oserez pas tirer!\n", + /* 14*/ "Cassandra a 騁 immobilis馥.\n", + /* 15*/ "Cassandra a 騁 captur馥.\n", + /* 16*/ "Le chef de la S馗urit a 騁 駘imin.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bombe skedar\n", + /* 20*/ "Bombe skedar\n", + /* 21*/ "Bombe skedar obtenue.\n", + /* 22*/ "La Bombe skedar a 騁 plac馥 correctement.\n", + /* 23*/ "La Bombe skedar a explos.\n", + /* 24*/ "Porte d'ascenseur verrouill馥 - La bombe ne peut 黎re plac馥.\n", + /* 25*/ "Ascenseur d駸activ.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_g.c b/src/files/lang/pal-final/wax_str_g.c new file mode 100644 index 000000000..16fb3516c --- /dev/null +++ b/src/files/lang/pal-final/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unf臧igen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um s舂tliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Eliminieren Sie den Sicherheitschef!\n\nEntfernen Sie dieses Individuum, um jegliche Repressalien durch verbleibende Elemente der abtrnnigen Firma gegen die Skedar von vorneherein auszuschlie゚en. So lachhaft die Vorstellung, dass die Menschen die Skedar auslschen knnten, auch sein mag, man darf die Macht einer Vendetta nicht untersch舩zen.\n\n|3. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unf臧igen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um s舂tliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau fr Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, mssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es w舐e unklug, ihr vorzeitig Schaden zuzufgen.\n\nENDE\n", + /* 4*/ "Eskortieren Sie Cassandra zum Helipad!\n", + /* 5*/ "Platzieren Sie den Sprengsatz!\n", + /* 6*/ "Eliminieren Sie den Sicherheitschef!\n", + /* 7*/ "Raus aus meinem Bro!\n", + /* 8*/ "Wenn Sie am Leben bleiben wollen, folgen Sie mir zum Helipad!\n", + /* 9*/ "Sie werden nicht auf mich schie゚en!\n", + /* 10*/ "Wie knnen Sie es wagen, mich zu stren?\n", + /* 11*/ "Sie werden es bereuen, hier eingedrungen zu sein.\n", + /* 12*/ "Wenn ich Sie w舐e, wrde ich verschwinden... SOFORT!\n", + /* 13*/ "Sie werden nicht auf mich schie゚en!\n", + /* 14*/ "Cassandra wurde eliminiert.\n", + /* 15*/ "Cassandra wurde erfolgreich gefangengenommen.\n", + /* 16*/ "Sicherheitschef eliminiert\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar-Bombe\n", + /* 20*/ "Skedar-Bombe\n", + /* 21*/ "Skedar-Bombe aufgenommen\n", + /* 22*/ "Die Skedar-Bombe wurde erfolgreich platziert.\n", + /* 23*/ "Die Skedar-Bombe ist detoniert.\n", + /* 24*/ "Die Aufzugstren sind verriegelt - Bombe kann nicht platziert werden.\n", + /* 25*/ "Aufzug inaktiv\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_i.c b/src/files/lang/pal-final/wax_str_i.c new file mode 100644 index 000000000..4a37745b7 --- /dev/null +++ b/src/files/lang/pal-final/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Elimina il presidente dataDyne\n\nElimina questo squallido individuo per prevenire ogni possibile tentativo di rappresaglia da parte di elementi residuali di questa azienda traditrice. Per quanto possa essere assurdo pensare che una sola persona possa annientare la razza umana, non dobbiamo sottovalutare la forza dell'odio e della vendetta.\n\n|Obiettivo 3: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sar prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 4*/ "Scova e scorta De Vries all'eliporto\n", + /* 5*/ "Piazza ordigno esplosivo in ascensore\n", + /* 6*/ "Elimina il presidente dataDyne\n", + /* 7*/ "Esci subito dal mio ufficio...\n", + /* 8*/ "Va all'eliporto se tieni alla pelle!\n", + /* 9*/ "Non vorrai mica spararmi...\n", + /* 10*/ "Come osi disturbarmi!\n", + /* 11*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 12*/ "Se fossi in te girerei al largo!\n", + /* 13*/ "Non vorrai mica spararmi...\n", + /* 14*/ "Cassandra immobilizzata!\n", + /* 15*/ "Cassandra stata catturata!\n", + /* 16*/ "Il capo della sicurezza stato eliminato.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Presa bomba Skedar\n", + /* 22*/ "La bomba Skedar in posizione corretta.\n", + /* 23*/ "La bomba Skedar esplosa.\n", + /* 24*/ "Porte ascensore bloccate: impossibile piazzare bomba.\n", + /* 25*/ "L'ascensore stato disattivato.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_s.c b/src/files/lang/pal-final/wax_str_s.c new file mode 100644 index 000000000..290b2e67c --- /dev/null +++ b/src/files/lang/pal-final/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitir que los ineptos cientficos de la Corporacin dataDyne continen investigando con nuestra tecnologa. Deber疽 colocar una bomba en el ascensor para destruir completamente sus investigaciones, adem疽 de las posibles evidencias fsicas.\n\n|Objetivo Dos: - Eliminar al Capit疣 de dataDyne\n\nSuprime a este individuo para acabar con cualquier represalia dirigida contra los Skedar por elementos residuales de la traidora corporacin. Aunque el concepto de un humano eliminando a la raza Skedar pueda resultar gracioso, no debemos cegarnos ante la fuerza de la venganza.\n\n|Objetivo Tres: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitir que los ineptos cientficos de la Corporacin dataDyne continen investigando con nuestra tecnologa. Deber疽 colocar una bomba en el ascensor para destruir completamente sus investigaciones, adem疽 de las posibles evidencias fsicas.\n\n|Objetivo Dos: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporacin humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captrala, para as poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crmenes contra nosotros, debes obligarla a llegar al tejado, donde ser recogida por una lanzadera en el helipuerto. Sera bastante insensato por tu parte permitir que ella sufra un dao prematuro.\n\nFIN\n", + /* 4*/ "Buscar/guiar a Cassandra al helipuerto\n", + /* 5*/ "Colocar explosivo en ascensor del lab.\n", + /* 6*/ "Eliminar al Capit疣 de dataDyne\n", + /* 7*/ "Fuera de mi oficina...\n", + /* 8*/ "Ve al helipuerto si quieres vivir.\n", + /* 9*/ "。No me disparar疽!\n", + /* 10*/ "。Cmo te atreves a molestarme!\n", + /* 11*/ "Vas a lamentar esta intrusin, chica.\n", + /* 12*/ "Si yo fuera t, me marchara... 。AHORA!\n", + /* 13*/ "。No me disparar疽!\n", + /* 14*/ "Cassandra ha sido inmovilizada.\n", + /* 15*/ "Cassandra ha sido capturada con 騙ito.\n", + /* 16*/ "El jefe de seguridad ha sido eliminado.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Bomba Skedar recogida.\n", + /* 22*/ "La Bomba Skedar ha sido colocada con 騙ito.\n", + /* 23*/ "La Bomba Skedar ha sido detonada.\n", + /* 24*/ "Ascensor bloqueado. La bomba no puede ser colocada.\n", + /* 25*/ "El ascensor ha sido desactivado.\n", + /* 26*/ NULL, + /* 27*/ NULL, +};